Overview
overview
10Static
static
10021865faa3...bf.dll
windows7_x64
10021865faa3...bf.dll
windows10-2004_x64
1026de26ea18...ff.dll
windows7_x64
1026de26ea18...ff.dll
windows10-2004_x64
10305e8e14bc...f8.dll
windows7_x64
10305e8e14bc...f8.dll
windows10-2004_x64
1047ea7ae3c9...94.dll
windows7_x64
1047ea7ae3c9...94.dll
windows10-2004_x64
1051ab9788b9...77.dll
windows7_x64
1051ab9788b9...77.dll
windows10-2004_x64
10587547a79f...fd.dll
windows7_x64
10587547a79f...fd.dll
windows10-2004_x64
1058878537dc...14.dll
windows7_x64
1058878537dc...14.dll
windows10-2004_x64
106909c2801f...37.dll
windows7_x64
106909c2801f...37.dll
windows10-2004_x64
1069ac3f3a76...85.dll
windows7_x64
1069ac3f3a76...85.dll
windows10-2004_x64
106ce8fbedc5...f2.dll
windows7_x64
106ce8fbedc5...f2.dll
windows10-2004_x64
107a91436b7a...0c.dll
windows7_x64
107a91436b7a...0c.dll
windows10-2004_x64
108f5843efe1...d4.dll
windows7_x64
108f5843efe1...d4.dll
windows10-2004_x64
1098d07ae48b...0b.dll
windows7_x64
1098d07ae48b...0b.dll
windows10-2004_x64
109c5c2af628...c7.dll
windows7_x64
109c5c2af628...c7.dll
windows10-2004_x64
109e00cf7d03...0d.dll
windows7_x64
109e00cf7d03...0d.dll
windows10-2004_x64
109e7db9c87f...2b.dll
windows7_x64
109e7db9c87f...2b.dll
windows10-2004_x64
10Analysis
-
max time kernel
4294229s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
14-03-2022 11:20
Static task
static1
Behavioral task
behavioral1
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
021865faa3b24771036f065fc7bd26230e5294e471ab21334e85010b1e9196bf.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
26de26ea18887ba25628c2d3e8834c00ce76b8c84d8be770f31b79c83b681cff.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
305e8e14bc1552266f47de8bde90c3aaf7f22432424a2be97414a79a7dc77df8.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
47ea7ae3c9a8f8bb1b5525fb962f092d08a981d4cfdb41ce0d1d81ebfa35cc94.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
51ab9788b91c7fa71567e1d3abb19f6d2542f2a75f0f11a5b2e4c1fd05387d77.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
587547a79fd6f8c7fb625a43b3d7f6dd24505ab86d404dd5b54d62038d9479fd.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
58878537dcf0d621aeffb66a32a40c52fa8588c832d631b988e59673bede9914.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
6909c2801f5d2d0a61baa68622a31aaecaaa1bdce1911e809e9246ed616cbe37.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
69ac3f3a76d2fdee0f031545587254ab8abc9f48d7d0b1cb54b6caea3d35bb85.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
7a91436b7a51dfd164632e7da459c4fb35f8edfea1dea8c438ee75e3f2e0400c.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
8f5843efe1c817ec78ecc53206b70df0badb70dda8cfdb18fefd2ab9bff0e9d4.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
98d07ae48bad89ce3395dd0a67deafc5a8dd941b151b03cca0dbdfef033bbf0b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
9c5c2af628233f118a88fb03f859e0f92f4393c8dd7c8204afe15af161f568c7.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
9e00cf7d03bf640ddd50390008308926ae82f906ece239e65f628182086e030d.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
9e7db9c87fc4374a2c88cc5f1bdc540205e161423010b2ee826b88b7b3503f2b.dll
Resource
win7-20220310-en
General
-
Target
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll
-
Size
469KB
-
MD5
1494919946474545be95298955974403
-
SHA1
4eb68f8e0efa346aa8cd1976554a26f787537f41
-
SHA256
6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2
-
SHA512
912cdb166f92a447d61d94420bfad02776ad22babb390da1f4e72cb2a523e8e3ed5b2b6dc063d73ad6dd22d0704f2f9022355698a2fd93734a62ab61de770247
Malware Config
Extracted
qakbot
403.10
obama147
1639647898
136.143.11.232:443
120.150.218.241:995
218.101.110.3:995
93.48.58.123:2222
190.73.3.148:2222
186.64.87.213:443
65.100.174.110:443
24.95.61.62:443
41.228.22.180:443
86.97.9.219:443
103.142.10.177:443
140.82.49.12:443
24.152.219.253:995
117.248.109.38:21
136.232.34.70:443
93.48.80.198:995
173.21.10.71:2222
78.180.163.25:995
194.36.28.26:443
45.9.20.200:2211
68.186.192.69:443
39.49.9.35:995
216.238.71.31:995
207.246.112.221:443
207.246.112.221:995
216.238.72.121:443
216.238.72.121:995
216.238.71.31:443
76.25.142.196:443
105.198.236.99:995
73.151.236.31:443
67.165.206.193:993
71.74.12.34:443
73.5.119.219:443
94.60.254.81:443
65.100.174.110:8443
72.252.201.34:995
100.1.119.41:443
108.4.67.252:443
109.12.111.14:443
24.55.112.61:443
80.6.192.58:443
176.24.150.197:443
89.101.97.139:443
102.65.38.67:443
27.223.92.142:995
75.188.35.168:995
24.229.150.54:995
68.204.7.158:443
89.137.52.44:443
117.198.149.221:443
86.148.6.51:443
63.143.92.99:995
182.176.180.73:443
187.192.61.177:80
73.140.38.124:443
96.37.113.36:993
217.165.7.254:995
75.169.58.229:32100
27.5.4.111:2222
197.89.144.207:443
86.98.36.211:443
106.220.76.130:443
129.208.139.229:995
45.46.53.140:2222
190.229.210.128:465
91.178.126.51:995
189.18.181.24:995
185.53.147.51:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 976 regsvr32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\e60e4426 = d8a1d2ef5d9926dfd87d9f47f1572f6bcbb9f3226fcc8b6f559a78c2907a1f70149020dc049e5764f7eba516f7fa21d4cd986cc4e3f9937866f3d068a19c1ee7aac8998bd81b624bcd4fb0f6508647bbe274efa426e02e4817564c4b043b665f0990e195e10f3a explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\21fb4cb5 = d9abd5ca980f4be3427702aa41875614e43f6c5e7ece2e explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\d3919468 = 850c6d270c5a97d4165178a609aef285235b16b134a9c310a4323eb1ed658576d86f350c3e4cad5beaa0ee89402dfb8b3d196d5f4fc9f65a7872dc77ff64584e2cfd6bd36082856f028fc1161bd215b84b74da3c9b explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Xotimiyjltdtin explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\e44f645a = 7c33192359dfa27a8e6aad12f75944deb4635d16a577b642bd808495d4905c4022c2ae703ea8f4f0c1ac3d8e2667520ecc3fa8095c999601e2ba530c5f45eb7338f8c3a8a519bcc82657f503a49287 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\5cf3033f = eebcc8d89644b9e20b77ca92c3ec88e9c0b093078f81c9d0fddc811e1ea3a89e44c5d47e9886c99b021ebc7fda05e0fdd91a54e20e19fd38008db5ed4d4e42c9a2c74508642bfdd01123d5d4a94f9feba09e03ef22c4d0d4f994ad184786ccfaa5a1a5f5d49f5b8003a524 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\99472bd0 = 12d6661181552c8f04979692c45fe6dea648878a5185c82883819effc533681c36d622ee30ab12a42af07e0b849ee1d4edd446898630e61ae989a4478df5b7c0fd7a9fb6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\5eb22343 = 606085919f758ad8ab93a2b593e3d18c4dbf17b24eb9d281f1c7d75186f002ecb1b964a8aa250896e738114eeeafcd0bb09581562e1bc0d57b7da7c106ae737d8ce10fc2b0048e0209bdb3a4c3b3c2b2c708c37bd6e916662f98 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\acd8fb9e = f63f5ac4c99799de01a251020de20abb2bc058e778987003c462a58e56496d45c4c4cc34b22b80fc explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Xotimiyjltdtin\d3919468 = 850c7a270c5aa2cb47254051abcb1bc25c35a43a7ecbc10b52cbf6780c2fb2382adf6e2b9b1d91616db68673eba6e17a1c3bb4e7f53fb4a5bd4f02d2cecbbb0b explorer.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 1952 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe 976 regsvr32.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 1952 regsvr32.exe 976 regsvr32.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
regsvr32.exeregsvr32.exeexplorer.exetaskeng.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1732 wrote to memory of 1952 1732 regsvr32.exe regsvr32.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1952 wrote to memory of 1292 1952 regsvr32.exe explorer.exe PID 1292 wrote to memory of 2004 1292 explorer.exe schtasks.exe PID 1292 wrote to memory of 2004 1292 explorer.exe schtasks.exe PID 1292 wrote to memory of 2004 1292 explorer.exe schtasks.exe PID 1292 wrote to memory of 2004 1292 explorer.exe schtasks.exe PID 272 wrote to memory of 996 272 taskeng.exe regsvr32.exe PID 272 wrote to memory of 996 272 taskeng.exe regsvr32.exe PID 272 wrote to memory of 996 272 taskeng.exe regsvr32.exe PID 272 wrote to memory of 996 272 taskeng.exe regsvr32.exe PID 272 wrote to memory of 996 272 taskeng.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 996 wrote to memory of 976 996 regsvr32.exe regsvr32.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 976 wrote to memory of 1220 976 regsvr32.exe explorer.exe PID 1220 wrote to memory of 1380 1220 explorer.exe reg.exe PID 1220 wrote to memory of 1380 1220 explorer.exe reg.exe PID 1220 wrote to memory of 1380 1220 explorer.exe reg.exe PID 1220 wrote to memory of 1380 1220 explorer.exe reg.exe PID 1220 wrote to memory of 700 1220 explorer.exe reg.exe PID 1220 wrote to memory of 700 1220 explorer.exe reg.exe PID 1220 wrote to memory of 700 1220 explorer.exe reg.exe PID 1220 wrote to memory of 700 1220 explorer.exe reg.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn siljuxfri /tr "regsvr32.exe -s \"C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll\"" /SC ONCE /Z /ST 12:24 /ET 12:364⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {980A1415-6452-4816-958B-54132D19C5BC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dll"3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Dlobcozl" /d "0"5⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Ycpuxvesi" /d "0"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dllMD5
1494919946474545be95298955974403
SHA14eb68f8e0efa346aa8cd1976554a26f787537f41
SHA2566ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2
SHA512912cdb166f92a447d61d94420bfad02776ad22babb390da1f4e72cb2a523e8e3ed5b2b6dc063d73ad6dd22d0704f2f9022355698a2fd93734a62ab61de770247
-
\??\PIPE\wkssvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\6ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2.dllMD5
1494919946474545be95298955974403
SHA14eb68f8e0efa346aa8cd1976554a26f787537f41
SHA2566ce8fbedc5fd65785ce950cd2c6e670f89c6f3e9cdd41d6abcf86b61eee911f2
SHA512912cdb166f92a447d61d94420bfad02776ad22babb390da1f4e72cb2a523e8e3ed5b2b6dc063d73ad6dd22d0704f2f9022355698a2fd93734a62ab61de770247
-
memory/976-75-0x00000000001B0000-0x0000000000228000-memory.dmpFilesize
480KB
-
memory/976-74-0x0000000000D40000-0x0000000000EC0000-memory.dmpFilesize
1.5MB
-
memory/976-73-0x0000000000300000-0x000000000037B000-memory.dmpFilesize
492KB
-
memory/976-71-0x00000000001B0000-0x0000000000228000-memory.dmpFilesize
480KB
-
memory/1220-81-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1292-66-0x0000000000080000-0x00000000000A1000-memory.dmpFilesize
132KB
-
memory/1292-65-0x00000000740D1000-0x00000000740D3000-memory.dmpFilesize
8KB
-
memory/1292-62-0x00000000000F0000-0x00000000000F2000-memory.dmpFilesize
8KB
-
memory/1732-54-0x000007FEFB6E1000-0x000007FEFB6E3000-memory.dmpFilesize
8KB
-
memory/1952-61-0x0000000000180000-0x0000000000200000-memory.dmpFilesize
512KB
-
memory/1952-60-0x0000000002020000-0x00000000021A0000-memory.dmpFilesize
1.5MB
-
memory/1952-59-0x0000000077040000-0x00000000771C0000-memory.dmpFilesize
1.5MB
-
memory/1952-58-0x0000000001E50000-0x0000000001ECB000-memory.dmpFilesize
492KB
-
memory/1952-55-0x0000000075441000-0x0000000075443000-memory.dmpFilesize
8KB