Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 23:47
Static task
static1
Behavioral task
behavioral1
Sample
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe
Resource
win10v2004-20220414-en
General
-
Target
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe
-
Size
1.6MB
-
MD5
c8bee82b1d76257b8977b3f373827100
-
SHA1
60535191909cefb0932e1ab71c42a05ecff3f84f
-
SHA256
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112
-
SHA512
bd3e786a9728fe145ca6bfba5802473be1a5c60f2691d48e39c8d4f33023f06c154ada1778cc495d4d292c28dcc908eb9114239ccfc39c2573d7d53a8b43f0be
Malware Config
Extracted
raccoon
e5a98a0423e8a05c07c85512b1c0eb7a8fff35a1
-
url4cnc
https://telete.in/brikitiki
Extracted
azorult
http://195.245.112.115/index.php
Extracted
oski
pabloq.ug
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Oski
Oski is an infostealer targeting browser data, crypto wallets.
-
Raccoon Stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1040-64-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral1/memory/1040-66-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral1/memory/1040-68-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral1/memory/1040-69-0x000000000043FA93-mapping.dmp family_raccoon behavioral1/memory/1040-73-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon behavioral1/memory/1040-80-0x0000000000400000-0x0000000000493000-memory.dmp family_raccoon -
Executes dropped EXE 5 IoCs
Processes:
Lime_az.exeLime_az.exeLime_os.exeLime_os.exeLime_os.exepid process 1292 Lime_az.exe 1760 Lime_az.exe 1272 Lime_os.exe 1648 Lime_os.exe 320 Lime_os.exe -
Loads dropped DLL 5 IoCs
Processes:
WScript.exeLime_az.exeWScript.exeLime_os.exepid process 2020 WScript.exe 1292 Lime_az.exe 1848 WScript.exe 1272 Lime_os.exe 1272 Lime_os.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exeLime_az.exeLime_os.exedescription pid process target process PID 1856 set thread context of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1292 set thread context of 1760 1292 Lime_az.exe Lime_az.exe PID 1272 set thread context of 320 1272 Lime_os.exe Lime_os.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exeLime_az.exeLime_os.exepid process 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 1292 Lime_az.exe 1292 Lime_az.exe 1272 Lime_os.exe 1272 Lime_os.exe 1272 Lime_os.exe 1272 Lime_os.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exeLime_az.exeLime_os.exedescription pid process Token: SeDebugPrivilege 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe Token: SeDebugPrivilege 1292 Lime_az.exe Token: SeDebugPrivilege 1272 Lime_os.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exeWScript.exeLime_az.exeWScript.exeLime_os.exedescription pid process target process PID 1856 wrote to memory of 2020 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe WScript.exe PID 1856 wrote to memory of 2020 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe WScript.exe PID 1856 wrote to memory of 2020 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe WScript.exe PID 1856 wrote to memory of 2020 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe WScript.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 1856 wrote to memory of 1040 1856 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe 43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe PID 2020 wrote to memory of 1292 2020 WScript.exe Lime_az.exe PID 2020 wrote to memory of 1292 2020 WScript.exe Lime_az.exe PID 2020 wrote to memory of 1292 2020 WScript.exe Lime_az.exe PID 2020 wrote to memory of 1292 2020 WScript.exe Lime_az.exe PID 1292 wrote to memory of 1848 1292 Lime_az.exe WScript.exe PID 1292 wrote to memory of 1848 1292 Lime_az.exe WScript.exe PID 1292 wrote to memory of 1848 1292 Lime_az.exe WScript.exe PID 1292 wrote to memory of 1848 1292 Lime_az.exe WScript.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1848 wrote to memory of 1272 1848 WScript.exe Lime_os.exe PID 1848 wrote to memory of 1272 1848 WScript.exe Lime_os.exe PID 1848 wrote to memory of 1272 1848 WScript.exe Lime_os.exe PID 1848 wrote to memory of 1272 1848 WScript.exe Lime_os.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1292 wrote to memory of 1760 1292 Lime_az.exe Lime_az.exe PID 1272 wrote to memory of 1648 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 1648 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 1648 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 1648 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe PID 1272 wrote to memory of 320 1272 Lime_os.exe Lime_os.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ohwrvu.vbs"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Ckrbrl.vbs"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"C:\Users\Admin\AppData\Local\Temp\Lime_os.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"C:\Users\Admin\AppData\Local\Temp\Lime_az.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"C:\Users\Admin\AppData\Local\Temp\43289193e35ad500026942fe9da85b24142625f3dba0e26b88f646bde55a0112.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Ckrbrl.vbsFilesize
95B
MD53550c103bad5b787e0ffeae513b57daa
SHA1dcb236be3035555c6fcb077aa82f583c2559c46b
SHA256b2218f291548cbcfceb39563f47384e83a647f0e2eda8ad1f7c2c4909817008e
SHA512e02641998aca9b90caf29f3f357c6eeb77dc6831e029fe434b0e68c9aaa58775123496af0e6964d5139014fbeba3c0ca5c778e9ef1b01c5901019c8edc56d6ee
-
C:\Users\Admin\AppData\Local\Temp\Lime_az.exeFilesize
1022KB
MD50c9dbc9a459190bdbbea8740d1a7c003
SHA17f94768946e359d5f5f5dabfa6c3e23d0aca05c4
SHA256794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7
SHA512667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4
-
C:\Users\Admin\AppData\Local\Temp\Lime_az.exeFilesize
1022KB
MD50c9dbc9a459190bdbbea8740d1a7c003
SHA17f94768946e359d5f5f5dabfa6c3e23d0aca05c4
SHA256794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7
SHA512667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4
-
C:\Users\Admin\AppData\Local\Temp\Lime_az.exeFilesize
1022KB
MD50c9dbc9a459190bdbbea8740d1a7c003
SHA17f94768946e359d5f5f5dabfa6c3e23d0aca05c4
SHA256794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7
SHA512667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
C:\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
C:\Users\Admin\AppData\Local\Temp\Ohwrvu.vbsFilesize
95B
MD5c7424fe30a1afff4d1bb201834feabfd
SHA17cc755d4d900645df7ed19d1da87fb4048e647af
SHA2569b6b55e7ce08eb22cf38a86953897b49559c43752f398d90038771a6d006080b
SHA51251fcdb3932f13daabff50bdb5a20d6aa0a18057cc296cfe80ff3e468403f8690dfc2b454265beba0126cf6f08cc2961161405d33e0f7c3159754f0ae0865632c
-
\Users\Admin\AppData\Local\Temp\Lime_az.exeFilesize
1022KB
MD50c9dbc9a459190bdbbea8740d1a7c003
SHA17f94768946e359d5f5f5dabfa6c3e23d0aca05c4
SHA256794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7
SHA512667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4
-
\Users\Admin\AppData\Local\Temp\Lime_az.exeFilesize
1022KB
MD50c9dbc9a459190bdbbea8740d1a7c003
SHA17f94768946e359d5f5f5dabfa6c3e23d0aca05c4
SHA256794a69405d4e0f876bed7975a4969cae18a49eb1faa18065642f1ff348b53ad7
SHA512667452032bd9fdc6b872efaf5149ac379ca0f42d9fbf13e69f3e0817f22906b820e1f6ca65f61c1b882de17f40791f1f54fbb2435c0281a0fd0b84685e59e8f4
-
\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
\Users\Admin\AppData\Local\Temp\Lime_os.exeFilesize
614KB
MD549e8a4630cef01ce6e9044c79f0b4df9
SHA13cef9a06f4a19be528626f0a7d98c94950ced9db
SHA2569157e16a62ae374fa6fb6dbdf3fe844dca6a410ec774bd28e6945d39cdde45bb
SHA512a5bc871334e6db8c893078281a15e52421c55d2916efd323aa46142e23b13f0632a4a0ec8132ed43db5b61ce47bb5925e42b024881f6a5f6667d8db08dbce6f0
-
memory/320-125-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-113-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-123-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-115-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-110-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-120-0x0000000000417A8B-mapping.dmp
-
memory/320-111-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-119-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/320-117-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1040-60-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-62-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-68-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-58-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-80-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-66-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-73-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-64-0x0000000000400000-0x0000000000493000-memory.dmpFilesize
588KB
-
memory/1040-69-0x000000000043FA93-mapping.dmp
-
memory/1272-102-0x0000000000FF0000-0x0000000001090000-memory.dmpFilesize
640KB
-
memory/1272-94-0x0000000000000000-mapping.dmp
-
memory/1272-106-0x0000000000C80000-0x0000000000CD6000-memory.dmpFilesize
344KB
-
memory/1292-81-0x0000000005110000-0x00000000051DA000-memory.dmpFilesize
808KB
-
memory/1292-78-0x0000000001080000-0x0000000001186000-memory.dmpFilesize
1.0MB
-
memory/1292-76-0x0000000000000000-mapping.dmp
-
memory/1760-92-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-105-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-89-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-93-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-96-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-101-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-97-0x000000000041A684-mapping.dmp
-
memory/1760-86-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-85-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-126-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1848-82-0x0000000000000000-mapping.dmp
-
memory/1856-55-0x0000000075CE1000-0x0000000075CE3000-memory.dmpFilesize
8KB
-
memory/1856-56-0x00000000060B0000-0x000000000621E000-memory.dmpFilesize
1.4MB
-
memory/1856-54-0x0000000000E10000-0x0000000000FBA000-memory.dmpFilesize
1.7MB
-
memory/2020-57-0x0000000000000000-mapping.dmp