Analysis
-
max time kernel
151s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
16-07-2022 23:49
Static task
static1
Behavioral task
behavioral1
Sample
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe
Resource
win7-20220715-en
General
-
Target
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe
-
Size
2.1MB
-
MD5
e4ea85000f7e19cd745aaebca5309b58
-
SHA1
562370dcc59955b44bbf5509c7467c70e8256d11
-
SHA256
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
-
SHA512
4126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
MicrosoftCare.exe537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MicrosoftCare.exe -
XMRig Miner payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/956-54-0x0000000000180000-0x00000000006CF000-memory.dmp xmrig behavioral1/memory/1316-58-0x000000000044D0EC-mapping.dmp xmrig behavioral1/memory/1316-57-0x0000000000400000-0x00000000004B5000-memory.dmp xmrig behavioral1/memory/700-64-0x0000000000180000-0x00000000006CF000-memory.dmp xmrig behavioral1/memory/956-65-0x0000000000180000-0x00000000006CF000-memory.dmp xmrig behavioral1/memory/700-66-0x0000000000180000-0x00000000006CF000-memory.dmp xmrig behavioral1/memory/776-73-0x0000000000180000-0x00000000006CF000-memory.dmp xmrig -
Executes dropped EXE 3 IoCs
Processes:
MicrosoftCare.exeMicrosoftCare.exeMicrosoftCare.exepid process 700 MicrosoftCare.exe 776 MicrosoftCare.exe 1472 MicrosoftCare.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
MicrosoftCare.exe537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MicrosoftCare.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MicrosoftCare.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
MicrosoftCare.exeMicrosoftCare.exe537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Wine MicrosoftCare.exe Key opened \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Wine MicrosoftCare.exe Key opened \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Wine 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe Key opened \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Wine MicrosoftCare.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exeMicrosoftCare.exepid process 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 700 MicrosoftCare.exe 776 MicrosoftCare.exe 1472 MicrosoftCare.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exedescription pid process target process PID 956 set thread context of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 1476 schtasks.exe 1864 schtasks.exe 1012 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exepid process 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 700 MicrosoftCare.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe -
Suspicious behavior: RenamesItself 3 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exeMicrosoftCare.exeMicrosoftCare.exepid process 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe 700 MicrosoftCare.exe 776 MicrosoftCare.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exetaskeng.exeMicrosoftCare.exeMicrosoftCare.exedescription pid process target process PID 956 wrote to memory of 1476 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 956 wrote to memory of 1476 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 956 wrote to memory of 1476 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 956 wrote to memory of 1476 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe schtasks.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 956 wrote to memory of 1316 956 537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe tasklist.exe PID 1492 wrote to memory of 700 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 700 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 700 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 700 1492 taskeng.exe MicrosoftCare.exe PID 700 wrote to memory of 1864 700 MicrosoftCare.exe schtasks.exe PID 700 wrote to memory of 1864 700 MicrosoftCare.exe schtasks.exe PID 700 wrote to memory of 1864 700 MicrosoftCare.exe schtasks.exe PID 700 wrote to memory of 1864 700 MicrosoftCare.exe schtasks.exe PID 1492 wrote to memory of 776 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 776 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 776 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 776 1492 taskeng.exe MicrosoftCare.exe PID 776 wrote to memory of 1012 776 MicrosoftCare.exe schtasks.exe PID 776 wrote to memory of 1012 776 MicrosoftCare.exe schtasks.exe PID 776 wrote to memory of 1012 776 MicrosoftCare.exe schtasks.exe PID 776 wrote to memory of 1012 776 MicrosoftCare.exe schtasks.exe PID 1492 wrote to memory of 1472 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 1472 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 1472 1492 taskeng.exe MicrosoftCare.exe PID 1492 wrote to memory of 1472 1492 taskeng.exe MicrosoftCare.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe"C:\Users\Admin\AppData\Local\Temp\537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\tasklist.exe"C:\Windows\System32\tasklist.exe"2⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\taskeng.exetaskeng.exe {07F8D384-AC7C-4A3C-869D-9515A4304E10} S-1-5-21-3440072777-2118400376-1759599358-1000:NKWDSIWE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f3⤵
- Creates scheduled task(s)
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Windows\SystemCare\Microsoft /tr "C:\ProgramData\MicrosoftCare.exe" /st 00:00 /sc daily /du 9999:59 /ri 1 /f3⤵
- Creates scheduled task(s)
-
C:\ProgramData\MicrosoftCare.exeC:\ProgramData\MicrosoftCare.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
C:\ProgramData\MicrosoftCare.exeFilesize
2.1MB
MD5e4ea85000f7e19cd745aaebca5309b58
SHA1562370dcc59955b44bbf5509c7467c70e8256d11
SHA256537534bb72f2f3945b9d4fcbfc30425eb4f9faeaac120fc560a130a11121e68b
SHA5124126a75fb73aafe6cc4d09bcbe601c9238ee6ecd044f342c65e659c7b5abb8a28e9f69d891975d68175edc0777c2c39ce11e7ae354257a58e3d25b2f3e23ae47
-
memory/700-67-0x00000000777F0000-0x0000000077970000-memory.dmpFilesize
1.5MB
-
memory/700-64-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/700-60-0x0000000000000000-mapping.dmp
-
memory/700-66-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/700-62-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/776-68-0x0000000000000000-mapping.dmp
-
memory/776-70-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/776-74-0x00000000777F0000-0x0000000077970000-memory.dmpFilesize
1.5MB
-
memory/776-73-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/776-72-0x00000000777F0000-0x0000000077970000-memory.dmpFilesize
1.5MB
-
memory/956-55-0x00000000777F0000-0x0000000077970000-memory.dmpFilesize
1.5MB
-
memory/956-54-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/956-65-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/1012-71-0x0000000000000000-mapping.dmp
-
memory/1316-57-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1316-58-0x000000000044D0EC-mapping.dmp
-
memory/1472-75-0x0000000000000000-mapping.dmp
-
memory/1472-77-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/1472-78-0x0000000000180000-0x00000000006CF000-memory.dmpFilesize
5.3MB
-
memory/1472-79-0x00000000777F0000-0x0000000077970000-memory.dmpFilesize
1.5MB
-
memory/1476-56-0x0000000000000000-mapping.dmp
-
memory/1864-63-0x0000000000000000-mapping.dmp