Analysis
-
max time kernel
151s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 23:10
Static task
static1
Behavioral task
behavioral1
Sample
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
Resource
win10v2004-20220414-en
General
-
Target
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe
-
Size
4.4MB
-
MD5
f928736eeb374926b60aa36b64b80746
-
SHA1
ff479c35c28dc942b0319acdbfa09db9b1f07f75
-
SHA256
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
-
SHA512
d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
Malware Config
Signatures
-
NirSoft MailPassView 11 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1992-68-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1992-70-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1992-72-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1992-77-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1992-74-0x000000000047FDAE-mapping.dmp MailPassView behavioral1/memory/1992-79-0x0000000000400000-0x0000000000484000-memory.dmp MailPassView behavioral1/memory/1672-92-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1672-93-0x0000000000411654-mapping.dmp MailPassView behavioral1/memory/1672-96-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1672-98-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1672-100-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 10 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1992-68-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1992-70-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1992-72-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1992-77-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1992-74-0x000000000047FDAE-mapping.dmp WebBrowserPassView behavioral1/memory/1992-79-0x0000000000400000-0x0000000000484000-memory.dmp WebBrowserPassView behavioral1/memory/1620-102-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1620-103-0x0000000000442628-mapping.dmp WebBrowserPassView behavioral1/memory/1620-106-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral1/memory/1620-108-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 15 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-68-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1992-70-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1992-72-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1992-77-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1992-74-0x000000000047FDAE-mapping.dmp Nirsoft behavioral1/memory/1992-79-0x0000000000400000-0x0000000000484000-memory.dmp Nirsoft behavioral1/memory/1672-92-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1672-93-0x0000000000411654-mapping.dmp Nirsoft behavioral1/memory/1672-96-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1672-98-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1672-100-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1620-102-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1620-103-0x0000000000442628-mapping.dmp Nirsoft behavioral1/memory/1620-106-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral1/memory/1620-108-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
tni.exewlrmdr.exewlrmdr.execsrss.exepid process 2044 tni.exe 1916 wlrmdr.exe 1992 wlrmdr.exe 1428 csrss.exe -
Loads dropped DLL 3 IoCs
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exepid process 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe 1916 wlrmdr.exe 1916 wlrmdr.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
wlrmdr.execsrss.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" wlrmdr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" wlrmdr.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wlrmdr = "C:\\Windows\\wlrmdr.exe" csrss.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 whatismyipaddress.com 5 whatismyipaddress.com 6 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
wlrmdr.exewlrmdr.exedescription pid process target process PID 1916 set thread context of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1992 set thread context of 1672 1992 wlrmdr.exe vbc.exe PID 1992 set thread context of 1620 1992 wlrmdr.exe vbc.exe -
Drops file in Windows directory 3 IoCs
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exedescription ioc process File created C:\Windows\wlrmdr.exe 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe File opened for modification C:\Windows\wlrmdr.exe 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe File opened for modification C:\Windows\wlrmdr.exe wlrmdr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exepid process 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe 1428 csrss.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
csrss.exewlrmdr.exedescription pid process Token: SeDebugPrivilege 1428 csrss.exe Token: SeDebugPrivilege 1992 wlrmdr.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exewlrmdr.exewlrmdr.exedescription pid process target process PID 1504 wrote to memory of 2044 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 1504 wrote to memory of 2044 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 1504 wrote to memory of 2044 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 1504 wrote to memory of 2044 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe tni.exe PID 1504 wrote to memory of 1916 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 1504 wrote to memory of 1916 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 1504 wrote to memory of 1916 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 1504 wrote to memory of 1916 1504 377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1992 1916 wlrmdr.exe wlrmdr.exe PID 1916 wrote to memory of 1428 1916 wlrmdr.exe csrss.exe PID 1916 wrote to memory of 1428 1916 wlrmdr.exe csrss.exe PID 1916 wrote to memory of 1428 1916 wlrmdr.exe csrss.exe PID 1916 wrote to memory of 1428 1916 wlrmdr.exe csrss.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1672 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe PID 1992 wrote to memory of 1620 1992 wlrmdr.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe"C:\Users\Admin\AppData\Local\Temp\377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\tni.exe"C:\Users\Admin\AppData\Roaming\tni.exe"2⤵
- Executes dropped EXE
-
C:\Windows\wlrmdr.exe"C:\Windows\wlrmdr.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\wlrmdr.exe"C:\Windows\wlrmdr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
-
C:\Users\Admin\AppData\Roaming\csrss.exe"C:\Users\Admin\AppData\Roaming\csrss.exe" -keyhide -prochide 1992 -reg C:\Windows\wlrmdr.exe -proc 1992 C:\Windows\wlrmdr.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Users\Admin\AppData\Roaming\tni.exeFilesize
4.0MB
MD5f1b0754b98de84caa935d559a5e1de0e
SHA1bc781f71922fe03416a045980991e7806a412542
SHA256a1c6e7db9375bd95104d6b7056350c75fea9c73ed1acd458269deb86fb7cf993
SHA512245bfe6bb18d5ba244013a66d643430469115ce065354dc0c3b3144c11b3d1f89efc4bae9946732bbf065ef255b96ccdf3ab0c6eec8ff494c4794c7e8a91d65d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
C:\Windows\wlrmdr.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
\Users\Admin\AppData\Roaming\csrss.exeFilesize
4.4MB
MD5f928736eeb374926b60aa36b64b80746
SHA1ff479c35c28dc942b0319acdbfa09db9b1f07f75
SHA256377c0e0f9495b4204ad0d4081f6d9c38a261ba7b2573ca06cb8460c19f5dbf37
SHA512d361722daca8e21601a4267eae03152d147ec657332c396eec2d6ef268fa54b3da9eec736e3539774dacc608c5e395a251d48c263ce853b518b1fdcf722e075d
-
\Users\Admin\AppData\Roaming\tni.exeFilesize
4.0MB
MD5f1b0754b98de84caa935d559a5e1de0e
SHA1bc781f71922fe03416a045980991e7806a412542
SHA256a1c6e7db9375bd95104d6b7056350c75fea9c73ed1acd458269deb86fb7cf993
SHA512245bfe6bb18d5ba244013a66d643430469115ce065354dc0c3b3144c11b3d1f89efc4bae9946732bbf065ef255b96ccdf3ab0c6eec8ff494c4794c7e8a91d65d
-
memory/1428-101-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1428-91-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1428-86-0x0000000000000000-mapping.dmp
-
memory/1504-64-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1504-54-0x0000000076561000-0x0000000076563000-memory.dmpFilesize
8KB
-
memory/1504-55-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1504-59-0x0000000009280000-0x000000000B060000-memory.dmpFilesize
29.9MB
-
memory/1620-102-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1620-103-0x0000000000442628-mapping.dmp
-
memory/1620-106-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1620-108-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1672-93-0x0000000000411654-mapping.dmp
-
memory/1672-92-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1672-96-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1672-98-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1672-100-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1916-82-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1916-90-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1916-60-0x0000000000000000-mapping.dmp
-
memory/1992-72-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-70-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-74-0x000000000047FDAE-mapping.dmp
-
memory/1992-97-0x0000000000C55000-0x0000000000C66000-memory.dmpFilesize
68KB
-
memory/1992-77-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-99-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/1992-109-0x0000000000C55000-0x0000000000C66000-memory.dmpFilesize
68KB
-
memory/1992-79-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-68-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-66-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-65-0x0000000000400000-0x0000000000484000-memory.dmpFilesize
528KB
-
memory/1992-83-0x0000000074BD0000-0x000000007517B000-memory.dmpFilesize
5.7MB
-
memory/2044-57-0x0000000000000000-mapping.dmp
-
memory/2044-81-0x0000000000400000-0x00000000021DF180-memory.dmpFilesize
29.9MB