Analysis
-
max time kernel
157s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
07-03-2022 11:07
Static task
static1
Behavioral task
behavioral1
Sample
ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe
Resource
win7-20220223-en
General
-
Target
ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe
-
Size
1.8MB
-
MD5
2ffbb53eb0913f749d8ffd248c34dd9f
-
SHA1
d0d27fce8b392b69a296109e70d53eeec3ea1dfc
-
SHA256
ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0
-
SHA512
c21308ad4a8cb2179c4f2e8105a5a552143f70f8a15cd3095803ee3b951a649373a71c6725337028757d8a6191961d028ff1f3ee9e3958e39eed49889e0ec067
Malware Config
Extracted
darkcomet
Sazan
eriqmallamlaml.duckdns.org:1604
DC_MUTEX-EKSW656
-
InstallPath
svchost.exe
-
gencode
9epU0FMovytS
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
svchost
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
Processes:
YouTubeUrlDirector.exeYouTubeDirector2.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\9epU0FMovytS\\svchost.exe" YouTubeUrlDirector.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\9epU0FMovytS\\svchost.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP\\svchosts.exe" YouTubeDirector2.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
svchost.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe -
Executes dropped EXE 4 IoCs
Processes:
YouTubeDirector2.exeYouTubeUrlDirector.exesvchosts.exesvchost.exepid process 3500 YouTubeDirector2.exe 3580 YouTubeUrlDirector.exe 3420 svchosts.exe 2980 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exe upx C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exe upx C:\Users\Admin\AppData\Roaming\APP\svchosts.exe upx C:\Users\Admin\AppData\Roaming\APP\svchosts.exe upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exeYouTubeDirector2.exeYouTubeUrlDirector.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation YouTubeDirector2.exe Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation YouTubeUrlDirector.exe -
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
YouTubeDirector2.exesvchost.exeiexplore.exeYouTubeUrlDirector.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SYSTEM = "C:\\Users\\Admin\\AppData\\Roaming\\APP\\svchosts.exe" YouTubeDirector2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\9epU0FMovytS\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\9epU0FMovytS\\svchost.exe" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\9epU0FMovytS\\svchost.exe" YouTubeUrlDirector.exe -
Drops file in System32 directory 4 IoCs
Processes:
YouTubeUrlDirector.exedescription ioc process File opened for modification C:\Windows\SysWOW64\9epU0FMovytS\ YouTubeUrlDirector.exe File created C:\Windows\SysWOW64\svchost.exe YouTubeUrlDirector.exe File created C:\Windows\SysWOW64\9epU0FMovytS\svchost.exe YouTubeUrlDirector.exe File opened for modification C:\Windows\SysWOW64\9epU0FMovytS\svchost.exe YouTubeUrlDirector.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2980 set thread context of 1916 2980 svchost.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
YouTubeUrlDirector.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ YouTubeUrlDirector.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1916 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
YouTubeDirector2.exeYouTubeUrlDirector.exesvchosts.exedescription pid process Token: SeIncreaseQuotaPrivilege 3500 YouTubeDirector2.exe Token: SeSecurityPrivilege 3500 YouTubeDirector2.exe Token: SeTakeOwnershipPrivilege 3500 YouTubeDirector2.exe Token: SeLoadDriverPrivilege 3500 YouTubeDirector2.exe Token: SeSystemProfilePrivilege 3500 YouTubeDirector2.exe Token: SeSystemtimePrivilege 3500 YouTubeDirector2.exe Token: SeProfSingleProcessPrivilege 3500 YouTubeDirector2.exe Token: SeIncBasePriorityPrivilege 3500 YouTubeDirector2.exe Token: SeCreatePagefilePrivilege 3500 YouTubeDirector2.exe Token: SeBackupPrivilege 3500 YouTubeDirector2.exe Token: SeRestorePrivilege 3500 YouTubeDirector2.exe Token: SeShutdownPrivilege 3500 YouTubeDirector2.exe Token: SeDebugPrivilege 3500 YouTubeDirector2.exe Token: SeSystemEnvironmentPrivilege 3500 YouTubeDirector2.exe Token: SeChangeNotifyPrivilege 3500 YouTubeDirector2.exe Token: SeRemoteShutdownPrivilege 3500 YouTubeDirector2.exe Token: SeUndockPrivilege 3500 YouTubeDirector2.exe Token: SeManageVolumePrivilege 3500 YouTubeDirector2.exe Token: SeImpersonatePrivilege 3500 YouTubeDirector2.exe Token: SeCreateGlobalPrivilege 3500 YouTubeDirector2.exe Token: 33 3500 YouTubeDirector2.exe Token: 34 3500 YouTubeDirector2.exe Token: 35 3500 YouTubeDirector2.exe Token: 36 3500 YouTubeDirector2.exe Token: SeIncreaseQuotaPrivilege 3580 YouTubeUrlDirector.exe Token: SeSecurityPrivilege 3580 YouTubeUrlDirector.exe Token: SeTakeOwnershipPrivilege 3580 YouTubeUrlDirector.exe Token: SeLoadDriverPrivilege 3580 YouTubeUrlDirector.exe Token: SeSystemProfilePrivilege 3580 YouTubeUrlDirector.exe Token: SeSystemtimePrivilege 3580 YouTubeUrlDirector.exe Token: SeProfSingleProcessPrivilege 3580 YouTubeUrlDirector.exe Token: SeIncBasePriorityPrivilege 3580 YouTubeUrlDirector.exe Token: SeCreatePagefilePrivilege 3580 YouTubeUrlDirector.exe Token: SeBackupPrivilege 3580 YouTubeUrlDirector.exe Token: SeRestorePrivilege 3580 YouTubeUrlDirector.exe Token: SeShutdownPrivilege 3580 YouTubeUrlDirector.exe Token: SeDebugPrivilege 3580 YouTubeUrlDirector.exe Token: SeSystemEnvironmentPrivilege 3580 YouTubeUrlDirector.exe Token: SeChangeNotifyPrivilege 3580 YouTubeUrlDirector.exe Token: SeRemoteShutdownPrivilege 3580 YouTubeUrlDirector.exe Token: SeUndockPrivilege 3580 YouTubeUrlDirector.exe Token: SeManageVolumePrivilege 3580 YouTubeUrlDirector.exe Token: SeImpersonatePrivilege 3580 YouTubeUrlDirector.exe Token: SeCreateGlobalPrivilege 3580 YouTubeUrlDirector.exe Token: 33 3580 YouTubeUrlDirector.exe Token: 34 3580 YouTubeUrlDirector.exe Token: 35 3580 YouTubeUrlDirector.exe Token: 36 3580 YouTubeUrlDirector.exe Token: SeIncreaseQuotaPrivilege 3420 svchosts.exe Token: SeSecurityPrivilege 3420 svchosts.exe Token: SeTakeOwnershipPrivilege 3420 svchosts.exe Token: SeLoadDriverPrivilege 3420 svchosts.exe Token: SeSystemProfilePrivilege 3420 svchosts.exe Token: SeSystemtimePrivilege 3420 svchosts.exe Token: SeProfSingleProcessPrivilege 3420 svchosts.exe Token: SeIncBasePriorityPrivilege 3420 svchosts.exe Token: SeCreatePagefilePrivilege 3420 svchosts.exe Token: SeBackupPrivilege 3420 svchosts.exe Token: SeRestorePrivilege 3420 svchosts.exe Token: SeShutdownPrivilege 3420 svchosts.exe Token: SeDebugPrivilege 3420 svchosts.exe Token: SeSystemEnvironmentPrivilege 3420 svchosts.exe Token: SeChangeNotifyPrivilege 3420 svchosts.exe Token: SeRemoteShutdownPrivilege 3420 svchosts.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchosts.exeiexplore.exepid process 3420 svchosts.exe 1916 iexplore.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exeYouTubeDirector2.exeYouTubeUrlDirector.execmd.execmd.exesvchost.exeiexplore.exedescription pid process target process PID 4372 wrote to memory of 3500 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeDirector2.exe PID 4372 wrote to memory of 3500 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeDirector2.exe PID 4372 wrote to memory of 3500 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeDirector2.exe PID 4372 wrote to memory of 3580 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeUrlDirector.exe PID 4372 wrote to memory of 3580 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeUrlDirector.exe PID 4372 wrote to memory of 3580 4372 ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe YouTubeUrlDirector.exe PID 3500 wrote to memory of 3420 3500 YouTubeDirector2.exe svchosts.exe PID 3500 wrote to memory of 3420 3500 YouTubeDirector2.exe svchosts.exe PID 3500 wrote to memory of 3420 3500 YouTubeDirector2.exe svchosts.exe PID 3580 wrote to memory of 4400 3580 YouTubeUrlDirector.exe cmd.exe PID 3580 wrote to memory of 4400 3580 YouTubeUrlDirector.exe cmd.exe PID 3580 wrote to memory of 4400 3580 YouTubeUrlDirector.exe cmd.exe PID 3580 wrote to memory of 1300 3580 YouTubeUrlDirector.exe cmd.exe PID 3580 wrote to memory of 1300 3580 YouTubeUrlDirector.exe cmd.exe PID 3580 wrote to memory of 1300 3580 YouTubeUrlDirector.exe cmd.exe PID 4400 wrote to memory of 404 4400 cmd.exe attrib.exe PID 4400 wrote to memory of 404 4400 cmd.exe attrib.exe PID 4400 wrote to memory of 404 4400 cmd.exe attrib.exe PID 1300 wrote to memory of 4768 1300 cmd.exe attrib.exe PID 1300 wrote to memory of 4768 1300 cmd.exe attrib.exe PID 1300 wrote to memory of 4768 1300 cmd.exe attrib.exe PID 3580 wrote to memory of 2980 3580 YouTubeUrlDirector.exe svchost.exe PID 3580 wrote to memory of 2980 3580 YouTubeUrlDirector.exe svchost.exe PID 3580 wrote to memory of 2980 3580 YouTubeUrlDirector.exe svchost.exe PID 2980 wrote to memory of 1916 2980 svchost.exe iexplore.exe PID 2980 wrote to memory of 1916 2980 svchost.exe iexplore.exe PID 2980 wrote to memory of 1916 2980 svchost.exe iexplore.exe PID 2980 wrote to memory of 1916 2980 svchost.exe iexplore.exe PID 2980 wrote to memory of 1916 2980 svchost.exe iexplore.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe PID 1916 wrote to memory of 4052 1916 iexplore.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 404 attrib.exe 4768 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe"C:\Users\Admin\AppData\Local\Temp\ed2538ba3fdaff85cbb11894c32ec8e1d46049c89b44f9cb823d383c79df54b0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exe"C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\APP\svchosts.exe"C:\Users\Admin\AppData\Roaming\APP\svchosts.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exe"C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exe" +s +h4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\9epU0FMovytS\svchost.exe"C:\Windows\system32\9epU0FMovytS\svchost.exe"3⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Modifies security service
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exenotepad5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exeMD5
d9dd2b842d717b9aa8fad033003035d4
SHA18b67a072188d7d15e306f25c23056fa0ac8c5fd2
SHA256d5986aa38791dd0f540e0516c639c9f83655f091b04c223e2670c2c40808faaf
SHA5124b035a9e12d35caed99ab8c494cde521146dbaa723a0e0c1e3101db2975344e9cc8f8541029a85207030c090907951896b39b9855f24d84eb13742b9a072537b
-
C:\Users\Admin\AppData\Local\Temp\YouTubeDirector2.exeMD5
d9dd2b842d717b9aa8fad033003035d4
SHA18b67a072188d7d15e306f25c23056fa0ac8c5fd2
SHA256d5986aa38791dd0f540e0516c639c9f83655f091b04c223e2670c2c40808faaf
SHA5124b035a9e12d35caed99ab8c494cde521146dbaa723a0e0c1e3101db2975344e9cc8f8541029a85207030c090907951896b39b9855f24d84eb13742b9a072537b
-
C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exeMD5
1c2ea4ad5b316200fe3b7d434c815cfd
SHA1015642d4e98117d612959ce4593a4b5bb8a4ac2d
SHA25640be24df080430231b0dd0be73477b10b0946e7887b8083c677d3fabe91fffd7
SHA51242a1dc29296cb7b112cc4b99c881fb274cc8772b5e2db851afa6a395217e27735d3b2639a2e7c39de1edb99a07dc689c7b22cfbda478082acf35d9de73196e70
-
C:\Users\Admin\AppData\Local\Temp\YouTubeUrlDirector.exeMD5
1c2ea4ad5b316200fe3b7d434c815cfd
SHA1015642d4e98117d612959ce4593a4b5bb8a4ac2d
SHA25640be24df080430231b0dd0be73477b10b0946e7887b8083c677d3fabe91fffd7
SHA51242a1dc29296cb7b112cc4b99c881fb274cc8772b5e2db851afa6a395217e27735d3b2639a2e7c39de1edb99a07dc689c7b22cfbda478082acf35d9de73196e70
-
C:\Users\Admin\AppData\Roaming\APP\svchosts.exeMD5
d9dd2b842d717b9aa8fad033003035d4
SHA18b67a072188d7d15e306f25c23056fa0ac8c5fd2
SHA256d5986aa38791dd0f540e0516c639c9f83655f091b04c223e2670c2c40808faaf
SHA5124b035a9e12d35caed99ab8c494cde521146dbaa723a0e0c1e3101db2975344e9cc8f8541029a85207030c090907951896b39b9855f24d84eb13742b9a072537b
-
C:\Users\Admin\AppData\Roaming\APP\svchosts.exeMD5
d9dd2b842d717b9aa8fad033003035d4
SHA18b67a072188d7d15e306f25c23056fa0ac8c5fd2
SHA256d5986aa38791dd0f540e0516c639c9f83655f091b04c223e2670c2c40808faaf
SHA5124b035a9e12d35caed99ab8c494cde521146dbaa723a0e0c1e3101db2975344e9cc8f8541029a85207030c090907951896b39b9855f24d84eb13742b9a072537b
-
C:\Windows\SysWOW64\9epU0FMovytS\svchost.exeMD5
1c2ea4ad5b316200fe3b7d434c815cfd
SHA1015642d4e98117d612959ce4593a4b5bb8a4ac2d
SHA25640be24df080430231b0dd0be73477b10b0946e7887b8083c677d3fabe91fffd7
SHA51242a1dc29296cb7b112cc4b99c881fb274cc8772b5e2db851afa6a395217e27735d3b2639a2e7c39de1edb99a07dc689c7b22cfbda478082acf35d9de73196e70
-
C:\Windows\SysWOW64\9epU0FMovytS\svchost.exeMD5
1c2ea4ad5b316200fe3b7d434c815cfd
SHA1015642d4e98117d612959ce4593a4b5bb8a4ac2d
SHA25640be24df080430231b0dd0be73477b10b0946e7887b8083c677d3fabe91fffd7
SHA51242a1dc29296cb7b112cc4b99c881fb274cc8772b5e2db851afa6a395217e27735d3b2639a2e7c39de1edb99a07dc689c7b22cfbda478082acf35d9de73196e70
-
memory/3420-146-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/3500-145-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/3580-144-0x0000000002130000-0x0000000002131000-memory.dmpFilesize
4KB
-
memory/4052-149-0x00000000009D0000-0x00000000009D1000-memory.dmpFilesize
4KB
-
memory/4372-137-0x0000000005420000-0x00000000059C4000-memory.dmpFilesize
5.6MB
-
memory/4372-136-0x0000000005560000-0x00000000055B6000-memory.dmpFilesize
344KB
-
memory/4372-135-0x0000000005440000-0x000000000544A000-memory.dmpFilesize
40KB
-
memory/4372-134-0x00000000054C0000-0x0000000005552000-memory.dmpFilesize
584KB
-
memory/4372-130-0x00000000009C0000-0x00000000009F4000-memory.dmpFilesize
208KB
-
memory/4372-133-0x00000000059D0000-0x0000000005F74000-memory.dmpFilesize
5.6MB
-
memory/4372-132-0x0000000074440000-0x0000000074BF0000-memory.dmpFilesize
7.7MB
-
memory/4372-131-0x0000000005340000-0x00000000053DC000-memory.dmpFilesize
624KB