Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
07-01-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
sodinokibi.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
sodinokibi.exe
Resource
win10-en-20211208
General
-
Target
sodinokibi.exe
-
Size
143KB
-
MD5
a3749c66f65d247d8a6fae1be26d3ef9
-
SHA1
c394464bba56e62ddfe2c9073932fb656fb78b6c
-
SHA256
d191761ac8a7b0a3525764664609a8fccfa3732d331c525e9c1c9eb0a7068a9c
-
SHA512
65bc1dba7e4de098e6b27b13b1e0723f703f645e4a4c6e53b7b03ec096a70d48ec2aca7e8bcd911ced61bab35e95983510604421ef35a593278414bfbb1cb01c
Malware Config
Extracted
C:\72qded01v-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/4332188DDD0FACF6
http://decryptor.top/4332188DDD0FACF6
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
sodinokibi.exedescription ioc process File renamed C:\Users\Admin\Pictures\AssertUnregister.png => \??\c:\users\admin\pictures\AssertUnregister.png.72qded01v sodinokibi.exe File renamed C:\Users\Admin\Pictures\CopyEdit.tif => \??\c:\users\admin\pictures\CopyEdit.tif.72qded01v sodinokibi.exe File renamed C:\Users\Admin\Pictures\ConvertToStep.png => \??\c:\users\admin\pictures\ConvertToStep.png.72qded01v sodinokibi.exe File renamed C:\Users\Admin\Pictures\CopyGet.tif => \??\c:\users\admin\pictures\CopyGet.tif.72qded01v sodinokibi.exe File renamed C:\Users\Admin\Pictures\ResolveUnregister.crw => \??\c:\users\admin\pictures\ResolveUnregister.crw.72qded01v sodinokibi.exe File renamed C:\Users\Admin\Pictures\UndoSend.png => \??\c:\users\admin\pictures\UndoSend.png.72qded01v sodinokibi.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
sodinokibi.exedescription ioc process File opened (read-only) \??\P: sodinokibi.exe File opened (read-only) \??\Y: sodinokibi.exe File opened (read-only) \??\E: sodinokibi.exe File opened (read-only) \??\N: sodinokibi.exe File opened (read-only) \??\K: sodinokibi.exe File opened (read-only) \??\O: sodinokibi.exe File opened (read-only) \??\U: sodinokibi.exe File opened (read-only) \??\W: sodinokibi.exe File opened (read-only) \??\A: sodinokibi.exe File opened (read-only) \??\F: sodinokibi.exe File opened (read-only) \??\L: sodinokibi.exe File opened (read-only) \??\M: sodinokibi.exe File opened (read-only) \??\R: sodinokibi.exe File opened (read-only) \??\V: sodinokibi.exe File opened (read-only) \??\X: sodinokibi.exe File opened (read-only) \??\Z: sodinokibi.exe File opened (read-only) \??\B: sodinokibi.exe File opened (read-only) \??\J: sodinokibi.exe File opened (read-only) \??\I: sodinokibi.exe File opened (read-only) \??\Q: sodinokibi.exe File opened (read-only) \??\S: sodinokibi.exe File opened (read-only) \??\T: sodinokibi.exe File opened (read-only) \??\D: sodinokibi.exe File opened (read-only) \??\G: sodinokibi.exe File opened (read-only) \??\H: sodinokibi.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
sodinokibi.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sn8i19h.bmp" sodinokibi.exe -
Drops file in Program Files directory 19 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification \??\c:\program files\MergeBlock.i64 sodinokibi.exe File opened for modification \??\c:\program files\ReceiveRestore.mht sodinokibi.exe File created \??\c:\program files (x86)\d60dff40.lock sodinokibi.exe File opened for modification \??\c:\program files\ClearJoin.mp4 sodinokibi.exe File opened for modification \??\c:\program files\UpdateOpen.cr2 sodinokibi.exe File opened for modification \??\c:\program files\WatchBackup.rar sodinokibi.exe File opened for modification \??\c:\program files\WatchStep.eps sodinokibi.exe File opened for modification \??\c:\program files\JoinRepair.svg sodinokibi.exe File opened for modification \??\c:\program files\ResolveDismount.wmv sodinokibi.exe File opened for modification \??\c:\program files\RequestDismount.emf sodinokibi.exe File opened for modification \??\c:\program files\ShowAdd.ini sodinokibi.exe File opened for modification \??\c:\program files\UnlockSelect.pot sodinokibi.exe File opened for modification \??\c:\program files\UnprotectRename.asf sodinokibi.exe File created \??\c:\program files (x86)\72qded01v-readme.txt sodinokibi.exe File opened for modification \??\c:\program files\ExportPush.rm sodinokibi.exe File opened for modification \??\c:\program files\GrantSave.svgz sodinokibi.exe File opened for modification \??\c:\program files\MoveReceive.xhtml sodinokibi.exe File created \??\c:\program files\72qded01v-readme.txt sodinokibi.exe File created \??\c:\program files\d60dff40.lock sodinokibi.exe -
Drops file in Windows directory 64 IoCs
Processes:
sodinokibi.exedescription ioc process File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_sl-si_40fad639bb52c987_comctl32.dll.mui_0da4e682 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_et-ee_9ae4f76b8d42c00d.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-lsa-extension_31bf3856ad364e35_10.0.15063.0_none_da4e3d83edc5d78f.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-font-bitmap-system_31bf3856ad364e35_10.0.15063.0_none_946aa6202fade3c5_cvgasys.fon_a23acca1 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-ntfs_31bf3856ad364e35_10.0.15063.0_none_b78502f655ba52fb.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.15063.0_de-de_34657c991714ac40_netiougc.exe.mui_ad7a9e4d sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.15063.0_de-de_0a33dfb3366f64ad_vdsutil.dll.mui_0caf9b0e sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-g..licy-base.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_0b6d675d9b5baa75_gpapi.dll.mui_ef0a9748 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..-credprov.resources_31bf3856ad364e35_10.0.15063.0_de-de_5b30b8d2ceff1a98.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_en-us_3095a2f55ebfb3fd.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.15063.0_en-us_8febce1621bba7d7_bootmgr.efi.mui_be5d0075 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-efs-service.resources_31bf3856ad364e35_10.0.15063.0_es-es_5dc2450f85c73ba2.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-t..services-publicapis_31bf3856ad364e35_10.0.15063.0_none_d844c496ff23f583_wtsapi32.dll_470d4d41 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase.resources_31bf3856ad364e35_10.0.15063.0_de-de_c63a9485ff920a4d_rasdiag.dll.mui_15cb4ec4 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..geservice.resources_31bf3856ad364e35_10.0.15063.0_en-us_80f9be2c08ee2caf_storsvc.dll.mui_2fc7b1d3 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-w..gon-tools.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_5590b20187c8e1aa.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.15063.0_de-de_c555f926322a28c7_comctl32.dll.mui_0da4e682 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wininit_31bf3856ad364e35_10.0.15063.0_none_420692083d1f600a_wmsgapi.dll_2b5c2330 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-cryptdll-dll_31bf3856ad364e35_10.0.15063.0_none_210709721af4ec88_cryptdll.dll_e0da7eac sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_915abbd08935e3bf_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-usermodensi.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_fa3c6c973ffbb5e7.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.15063.0_de-de_3cea917b11996ccf.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-appid.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_f415df720d034833.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-security-spp_31bf3856ad364e35_10.0.15063.0_none_35c9db038e226e49_sppmig.dll_22b5b188 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_92b2e4a927d14296_wmiutils.dll.mui_42583eaf sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-c..ermodepnp.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_9f1f19283dd496cd_drvinst.exe.mui_e88f4c73 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..-usermode.resources_31bf3856ad364e35_10.0.15063.0_en-us_d7f85fce907a2ddd.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..gc-kspsvc.resources_31bf3856ad364e35_10.0.15063.0_de-de_019026ab35c7b65e_ngcsvc.dll.mui_96312421 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wbiosrvc.resources_31bf3856ad364e35_10.0.15063.0_en-us_fca37a8068e89c2a.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.15063.0_th-th_2b7ff2d3c288b51c_comctl32.dll.mui_0da4e682 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2ed7c061e8031d3f.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-time-service.resources_31bf3856ad364e35_10.0.15063.0_es-es_63e502efcd134d2d_w32time.dll.mui_b382d4b4 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_1758c8aaa6a3ed16.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..n-cmdline.resources_31bf3856ad364e35_10.0.15063.0_en-us_e0b140b70658212e.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.15063.0_es-es_c7c88d7dc401c162_memtest.efi.mui_71e15c22 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-coresystemminpnp_31bf3856ad364e35_10.0.15063.0_none_1b70ea73251f149e_drvcfg.exe_8370a674 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-cryptsp-dll_31bf3856ad364e35_10.0.15063.0_none_3a7147463f9b3bd0_cryptsp.dll_ae5341e1 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_bg-bg_69d60750c30ce9db_msimsg.dll.mui_72e8994f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_networking-mpssvc-svc.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_d1a17ff4b8eda663_mpssvc.dll.mui_4b194b5f sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_zh-tw_37f9af358af4f949.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.15063.0_en-us_4f11d10363ebf375.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-svc.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_c74cd5a2848ce468.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-defender-service_31bf3856ad364e35_10.0.15063.0_none_d6b9fc078f9b4d5a_mpclient.dll_0a78b638 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_networking-mpssvc-svc.resources_31bf3856ad364e35_10.0.15063.0_de-de_f9e061c50cc99b3e.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-rasautodial_31bf3856ad364e35_10.0.15063.0_none_2b428241d2829ac6.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-ui-xaml-phone_31bf3856ad364e35_10.0.15063.0_none_ec0ee8641d359fdf_windows.ui.xaml.phone.dll_f3375243 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.15063.0_cs-cz_9120bc15bf67e669.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.15063.0_es-es_718d54164909dde7.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_10.0.15063.0_sl-si_3f840760de482318.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.isolationautomation_6595b64144ccf1df_1.0.15063.0_none_10f67b1bc734d81b.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-c..ermodepnp.resources_31bf3856ad364e35_10.0.15063.0_es-es_06bc4d7b7f634266.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_316509567a07b25f.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_10.0.15063.0_en-us_0f2e55c68b9b08e2.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..re-bootmanager-pcat_31bf3856ad364e35_10.0.15063.0_none_781ef03933a1cb3c_bootmgr_07e7e7fe sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.15063.0_de-de_d846e1155eb73b0a.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-duser_31bf3856ad364e35_10.0.15063.0_none_6b88878235493b61.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.15063.0_en-us_8c54ed7ef50a1538.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-time-service_31bf3856ad364e35_10.0.15063.0_none_99bb3ce8a6195e97.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmpdui.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2d3314094995484e.manifest sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmpdui.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_c3d533af484301a2_wmpdui.dll.mui_92411657 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_10.0.15063.0_fr-fr_2a2f66220fcb97e2_winload.efi.mui_35ee487d sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..onmanager.resources_31bf3856ad364e35_10.0.15063.0_es-es_0f0afbc0839bfc5f_partmgr.sys.mui_b800c491 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasbase-raspptp_31bf3856ad364e35_10.0.15063.0_none_ab02f81220a59684_raspptp.sys_25e89db1 sodinokibi.exe File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-user32.resources_31bf3856ad364e35_10.0.15063.0_ja-jp_7de2193a2131f2d5.manifest sodinokibi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 3728 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
sodinokibi.exepid process 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe 2384 sodinokibi.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1100 vssvc.exe Token: SeRestorePrivilege 1100 vssvc.exe Token: SeAuditPrivilege 1100 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
sodinokibi.execmd.exedescription pid process target process PID 2384 wrote to memory of 3624 2384 sodinokibi.exe cmd.exe PID 2384 wrote to memory of 3624 2384 sodinokibi.exe cmd.exe PID 2384 wrote to memory of 3624 2384 sodinokibi.exe cmd.exe PID 3624 wrote to memory of 3728 3624 cmd.exe vssadmin.exe PID 3624 wrote to memory of 3728 3624 cmd.exe vssadmin.exe PID 3624 wrote to memory of 3728 3624 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"C:\Users\Admin\AppData\Local\Temp\sodinokibi.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2384-116-0x0000000003040000-0x0000000003041000-memory.dmpFilesize
4KB
-
memory/2384-115-0x0000000003030000-0x000000000303A000-memory.dmpFilesize
40KB
-
memory/2384-117-0x0000000003050000-0x0000000003051000-memory.dmpFilesize
4KB
-
memory/2384-118-0x00000000031A0000-0x00000000031A1000-memory.dmpFilesize
4KB
-
memory/2384-119-0x00000000031B0000-0x00000000031B6000-memory.dmpFilesize
24KB
-
memory/3624-120-0x0000000000000000-mapping.dmp
-
memory/3728-121-0x0000000000000000-mapping.dmp