Analysis
-
max time kernel
271s -
max time network
286s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-09-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe
Resource
win7-20220812-en
General
-
Target
ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe
-
Size
246KB
-
MD5
e6315c0db5f71599df36d466d4a625cc
-
SHA1
d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
-
SHA256
ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
-
SHA512
6846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
SSDEEP
3072:igrSLIRLP9sEd7LyJLRRY5cjM2P9Q85i8u0TRki1duyuybAugRv8P3wbbD03QN4k:xLW/4j8u0TjcYYRg3CAQN4Ap
Malware Config
Extracted
systembc
109.107.187.226:4001
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
Processes:
rovwer.exesocksupd.exerovwer.exewinupdater.exehqpoifx.exerovwer.exehqpoifx.exerovwer.exerovwer.exerovwer.exepid process 844 rovwer.exe 812 socksupd.exe 552 rovwer.exe 584 winupdater.exe 852 hqpoifx.exe 1020 rovwer.exe 304 hqpoifx.exe 1268 rovwer.exe 1860 rovwer.exe 1616 rovwer.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1000004001\winupdater.exe upx \Users\Admin\AppData\Local\Temp\1000004001\winupdater.exe upx C:\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exe upx behavioral1/memory/584-87-0x0000000000C50000-0x0000000001EEF000-memory.dmp upx behavioral1/memory/584-97-0x0000000000C50000-0x0000000001EEF000-memory.dmp upx behavioral1/memory/584-131-0x0000000000C50000-0x0000000001EEF000-memory.dmp upx -
Loads dropped DLL 6 IoCs
Processes:
ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exerovwer.exepid process 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe 844 rovwer.exe 844 rovwer.exe 844 rovwer.exe 844 rovwer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\socksupd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000003001\\socksupd.exe" rovwer.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\winupdater.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000004001\\winupdater.exe" rovwer.exe -
Drops file in Windows directory 2 IoCs
Processes:
socksupd.exedescription ioc process File created C:\Windows\Tasks\hqpoifx.job socksupd.exe File opened for modification C:\Windows\Tasks\hqpoifx.job socksupd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
socksupd.exepowershell.exepid process 812 socksupd.exe 1540 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1540 powershell.exe -
Suspicious use of WriteProcessMemory 47 IoCs
Processes:
ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exerovwer.exetaskeng.exewinupdater.exedescription pid process target process PID 1344 wrote to memory of 844 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe rovwer.exe PID 1344 wrote to memory of 844 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe rovwer.exe PID 1344 wrote to memory of 844 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe rovwer.exe PID 1344 wrote to memory of 844 1344 ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe rovwer.exe PID 844 wrote to memory of 1676 844 rovwer.exe schtasks.exe PID 844 wrote to memory of 1676 844 rovwer.exe schtasks.exe PID 844 wrote to memory of 1676 844 rovwer.exe schtasks.exe PID 844 wrote to memory of 1676 844 rovwer.exe schtasks.exe PID 844 wrote to memory of 812 844 rovwer.exe socksupd.exe PID 844 wrote to memory of 812 844 rovwer.exe socksupd.exe PID 844 wrote to memory of 812 844 rovwer.exe socksupd.exe PID 844 wrote to memory of 812 844 rovwer.exe socksupd.exe PID 1708 wrote to memory of 552 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 552 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 552 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 552 1708 taskeng.exe rovwer.exe PID 844 wrote to memory of 584 844 rovwer.exe winupdater.exe PID 844 wrote to memory of 584 844 rovwer.exe winupdater.exe PID 844 wrote to memory of 584 844 rovwer.exe winupdater.exe PID 844 wrote to memory of 584 844 rovwer.exe winupdater.exe PID 1708 wrote to memory of 852 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 852 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 852 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 852 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 1020 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1020 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1020 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1020 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 304 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 304 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 304 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 304 1708 taskeng.exe hqpoifx.exe PID 1708 wrote to memory of 1268 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1268 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1268 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1268 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1860 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1860 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1860 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1860 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1616 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1616 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1616 1708 taskeng.exe rovwer.exe PID 1708 wrote to memory of 1616 1708 taskeng.exe rovwer.exe PID 584 wrote to memory of 1540 584 winupdater.exe powershell.exe PID 584 wrote to memory of 1540 584 winupdater.exe powershell.exe PID 584 wrote to memory of 1540 584 winupdater.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe"C:\Users\Admin\AppData\Local\Temp\ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exe"C:\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exe"C:\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {BC9B2753-2464-4885-956A-9BECA31CC39D} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe2⤵
- Executes dropped EXE
-
C:\ProgramData\xenopmq\hqpoifx.exeC:\ProgramData\xenopmq\hqpoifx.exe start22⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe2⤵
- Executes dropped EXE
-
C:\ProgramData\xenopmq\hqpoifx.exeC:\ProgramData\xenopmq\hqpoifx.exe start22⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeC:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\xenopmq\hqpoifx.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
C:\ProgramData\xenopmq\hqpoifx.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
C:\ProgramData\xenopmq\hqpoifx.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
C:\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
C:\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
C:\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exeFilesize
5.1MB
MD541bc228717c87799ec41f178ad2cfbbf
SHA13edef885988004a575dbbfac2d7a9849f93837d9
SHA256a2b44911354d50d59e5e0b93bf5857353ec6598d71f37e2dc3053fa48e6b9e5b
SHA512d98e9b3606ab7be9bd12027529fe3cfef81a7dd2696641439f35046770c744a72afe28c46a4c3154022c44c5915216d8e86f1d7bef853fa28a4e2b82361fd918
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
C:\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
\Users\Admin\AppData\Local\Temp\1000003001\socksupd.exeFilesize
197KB
MD557eb1430903457db36a36023304f8a38
SHA1831f481eebdf994a1cfacca5a9f53e1f6f93e0fd
SHA2561962f91125c15839d9e18b7273f1831cae8a191c574577210dda1a424e9e7628
SHA512a33af94ab2083e6beb5631ce4ff8c5340b4bf10e7a15727aef6817ec4dfd7c6771f90abc8bca397319d571cc8c165c7182528bab2e962f168530b7a496da683e
-
\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exeFilesize
5.1MB
MD541bc228717c87799ec41f178ad2cfbbf
SHA13edef885988004a575dbbfac2d7a9849f93837d9
SHA256a2b44911354d50d59e5e0b93bf5857353ec6598d71f37e2dc3053fa48e6b9e5b
SHA512d98e9b3606ab7be9bd12027529fe3cfef81a7dd2696641439f35046770c744a72afe28c46a4c3154022c44c5915216d8e86f1d7bef853fa28a4e2b82361fd918
-
\Users\Admin\AppData\Local\Temp\1000004001\winupdater.exeFilesize
5.1MB
MD541bc228717c87799ec41f178ad2cfbbf
SHA13edef885988004a575dbbfac2d7a9849f93837d9
SHA256a2b44911354d50d59e5e0b93bf5857353ec6598d71f37e2dc3053fa48e6b9e5b
SHA512d98e9b3606ab7be9bd12027529fe3cfef81a7dd2696641439f35046770c744a72afe28c46a4c3154022c44c5915216d8e86f1d7bef853fa28a4e2b82361fd918
-
\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
\Users\Admin\AppData\Local\Temp\b3f32abb88\rovwer.exeFilesize
246KB
MD5e6315c0db5f71599df36d466d4a625cc
SHA1d5c3975b8eee303d5dc5d5f273c59ba4d810bc23
SHA256ee37368824372234e4ac430592ac3286044e692adab63a11f00b7023e8025cb2
SHA5126846d951e9d6c3c2f6af44c669f539ab64c6c73a39b5de7db9637cd40e105f98c4c7d007a7691ba4db942721cc22757e0a72080552ac7d54db008beb5f5c5cd0
-
memory/304-104-0x0000000000000000-mapping.dmp
-
memory/304-112-0x00000000002EB000-0x00000000002FC000-memory.dmpFilesize
68KB
-
memory/304-113-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/552-71-0x0000000000000000-mapping.dmp
-
memory/552-76-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/552-75-0x000000000071B000-0x0000000000738000-memory.dmpFilesize
116KB
-
memory/584-82-0x0000000000000000-mapping.dmp
-
memory/584-131-0x0000000000C50000-0x0000000001EEF000-memory.dmpFilesize
18.6MB
-
memory/584-97-0x0000000000C50000-0x0000000001EEF000-memory.dmpFilesize
18.6MB
-
memory/584-87-0x0000000000C50000-0x0000000001EEF000-memory.dmpFilesize
18.6MB
-
memory/812-79-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/812-78-0x0000000000220000-0x0000000000225000-memory.dmpFilesize
20KB
-
memory/812-77-0x000000000066B000-0x000000000067C000-memory.dmpFilesize
68KB
-
memory/812-69-0x0000000000000000-mapping.dmp
-
memory/812-95-0x000000000066B000-0x000000000067C000-memory.dmpFilesize
68KB
-
memory/844-86-0x00000000036E0000-0x000000000497F000-memory.dmpFilesize
18.6MB
-
memory/844-83-0x000000000067B000-0x0000000000698000-memory.dmpFilesize
116KB
-
memory/844-85-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/844-65-0x000000000067B000-0x0000000000698000-memory.dmpFilesize
116KB
-
memory/844-96-0x00000000036E0000-0x000000000497F000-memory.dmpFilesize
18.6MB
-
memory/844-57-0x0000000000000000-mapping.dmp
-
memory/844-66-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/852-93-0x000000000075B000-0x000000000076C000-memory.dmpFilesize
68KB
-
memory/852-103-0x000000000075B000-0x000000000076C000-memory.dmpFilesize
68KB
-
memory/852-90-0x0000000000000000-mapping.dmp
-
memory/852-94-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/1020-102-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/1020-98-0x0000000000000000-mapping.dmp
-
memory/1268-105-0x0000000000000000-mapping.dmp
-
memory/1268-110-0x00000000006BB000-0x00000000006D8000-memory.dmpFilesize
116KB
-
memory/1268-111-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/1344-54-0x0000000074F41000-0x0000000074F43000-memory.dmpFilesize
8KB
-
memory/1344-59-0x000000000068B000-0x00000000006A8000-memory.dmpFilesize
116KB
-
memory/1344-61-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/1344-60-0x0000000000300000-0x0000000000338000-memory.dmpFilesize
224KB
-
memory/1540-125-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmpFilesize
8KB
-
memory/1540-130-0x00000000023DB000-0x00000000023FA000-memory.dmpFilesize
124KB
-
memory/1540-129-0x00000000023D4000-0x00000000023D7000-memory.dmpFilesize
12KB
-
memory/1540-128-0x00000000023D4000-0x00000000023D7000-memory.dmpFilesize
12KB
-
memory/1540-127-0x000007FEF2B90000-0x000007FEF36ED000-memory.dmpFilesize
11.4MB
-
memory/1540-126-0x000007FEF36F0000-0x000007FEF4113000-memory.dmpFilesize
10.1MB
-
memory/1540-124-0x0000000000000000-mapping.dmp
-
memory/1616-123-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/1616-122-0x00000000006BB000-0x00000000006D8000-memory.dmpFilesize
116KB
-
memory/1616-119-0x0000000000000000-mapping.dmp
-
memory/1676-63-0x0000000000000000-mapping.dmp
-
memory/1860-118-0x0000000000400000-0x0000000000597000-memory.dmpFilesize
1.6MB
-
memory/1860-117-0x000000000026B000-0x0000000000288000-memory.dmpFilesize
116KB
-
memory/1860-114-0x0000000000000000-mapping.dmp