Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe
Resource
win10v2004-20220812-en
General
-
Target
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe
-
Size
244KB
-
MD5
c8f046db4ece8e5bc2654c7037267b96
-
SHA1
f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
-
SHA256
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
-
SHA512
bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
SSDEEP
6144:OWzEq1LqpOlwKhQB98/HLnOMOvWtIC8EeSL3WnV:OWzE+upOxhQBq/HLOMfZWV
Malware Config
Extracted
amadey
3.50
193.56.146.174/g84kvj4jck/index.php
1h3art.me/i4kvjd3xc/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
rovwer.exemine.exegntuud.exerovwer.exeAmadey.exe3000.exerovwer.exegntuud.exerovwer.exepid process 2040 rovwer.exe 432 mine.exe 1184 gntuud.exe 1496 rovwer.exe 1968 Amadey.exe 1180 3000.exe 1776 rovwer.exe 1436 gntuud.exe 836 rovwer.exe -
Loads dropped DLL 6 IoCs
Processes:
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exerovwer.exemine.exegntuud.exepid process 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe 2040 rovwer.exe 432 mine.exe 1184 gntuud.exe 2040 rovwer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\mine.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000209000\\mine.exe" rovwer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exerovwer.execmd.exemine.exegntuud.exetaskeng.exedescription pid process target process PID 868 wrote to memory of 2040 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe rovwer.exe PID 868 wrote to memory of 2040 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe rovwer.exe PID 868 wrote to memory of 2040 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe rovwer.exe PID 868 wrote to memory of 2040 868 a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe rovwer.exe PID 2040 wrote to memory of 952 2040 rovwer.exe schtasks.exe PID 2040 wrote to memory of 952 2040 rovwer.exe schtasks.exe PID 2040 wrote to memory of 952 2040 rovwer.exe schtasks.exe PID 2040 wrote to memory of 952 2040 rovwer.exe schtasks.exe PID 2040 wrote to memory of 1988 2040 rovwer.exe cmd.exe PID 2040 wrote to memory of 1988 2040 rovwer.exe cmd.exe PID 2040 wrote to memory of 1988 2040 rovwer.exe cmd.exe PID 2040 wrote to memory of 1988 2040 rovwer.exe cmd.exe PID 1988 wrote to memory of 1984 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1984 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1984 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1984 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1180 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1180 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1180 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1180 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1096 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1096 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1096 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1096 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1776 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1776 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1776 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 1776 1988 cmd.exe cmd.exe PID 1988 wrote to memory of 584 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 584 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 584 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 584 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1880 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1880 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1880 1988 cmd.exe cacls.exe PID 1988 wrote to memory of 1880 1988 cmd.exe cacls.exe PID 2040 wrote to memory of 432 2040 rovwer.exe mine.exe PID 2040 wrote to memory of 432 2040 rovwer.exe mine.exe PID 2040 wrote to memory of 432 2040 rovwer.exe mine.exe PID 2040 wrote to memory of 432 2040 rovwer.exe mine.exe PID 432 wrote to memory of 1184 432 mine.exe gntuud.exe PID 432 wrote to memory of 1184 432 mine.exe gntuud.exe PID 432 wrote to memory of 1184 432 mine.exe gntuud.exe PID 432 wrote to memory of 1184 432 mine.exe gntuud.exe PID 1184 wrote to memory of 1456 1184 gntuud.exe schtasks.exe PID 1184 wrote to memory of 1456 1184 gntuud.exe schtasks.exe PID 1184 wrote to memory of 1456 1184 gntuud.exe schtasks.exe PID 1184 wrote to memory of 1456 1184 gntuud.exe schtasks.exe PID 1236 wrote to memory of 1496 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1496 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1496 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1496 1236 taskeng.exe rovwer.exe PID 1184 wrote to memory of 1968 1184 gntuud.exe Amadey.exe PID 1184 wrote to memory of 1968 1184 gntuud.exe Amadey.exe PID 1184 wrote to memory of 1968 1184 gntuud.exe Amadey.exe PID 1184 wrote to memory of 1968 1184 gntuud.exe Amadey.exe PID 2040 wrote to memory of 1180 2040 rovwer.exe 3000.exe PID 2040 wrote to memory of 1180 2040 rovwer.exe 3000.exe PID 2040 wrote to memory of 1180 2040 rovwer.exe 3000.exe PID 2040 wrote to memory of 1180 2040 rovwer.exe 3000.exe PID 1236 wrote to memory of 1776 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1776 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1776 1236 taskeng.exe rovwer.exe PID 1236 wrote to memory of 1776 1236 taskeng.exe rovwer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe"C:\Users\Admin\AppData\Local\Temp\a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1984
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:N"4⤵PID:1180
-
C:\Windows\SysWOW64\cacls.exeCACLS "rovwer.exe" /P "Admin:R" /E4⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1776
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:N"4⤵PID:584
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\99e342142d" /P "Admin:R" /E4⤵PID:1880
-
C:\Users\Admin\AppData\Roaming\1000209000\mine.exe"C:\Users\Admin\AppData\Roaming\1000209000\mine.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe" /F5⤵
- Creates scheduled task(s)
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe"C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exe"5⤵
- Executes dropped EXE
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exe"C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exe"3⤵
- Executes dropped EXE
PID:1180
-
C:\Windows\system32\taskeng.exetaskeng.exe {FE66842E-5992-4C22-88F0-340A712462C2} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe2⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe2⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exeC:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exe2⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeC:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe2⤵
- Executes dropped EXE
PID:836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
C:\Users\Admin\AppData\Local\Temp\1000212001\3000.exeFilesize
2.4MB
MD577181eb9385b899f4bce3387a2efe18c
SHA168488c2d2aae96c6f552bcddb81e198b0390312a
SHA256e18597f8343d2752ecfea69c4615ea58f37d948ee5d0741791410fb2a4827b1b
SHA5123d034f0b238ad5da850d38f3f247693415ca1773aab84f25c32d500864d7a11b8385d2c5da45a19950c5cdad9664963af85ae13d48da7fceee895d847f94eeb9
-
C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
C:\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
C:\Users\Admin\AppData\Roaming\1000209000\mine.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
C:\Users\Admin\AppData\Roaming\1000209000\mine.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
\Users\Admin\AppData\Local\Temp\1000001001\Amadey.exeFilesize
241KB
MD5b466f58861bb4069db99312de146a2e8
SHA1295f06794b26ba5ac7c73fbf636c581624f897cd
SHA2566cfe5fe62ed600c72c474e6dfee6be689c74a820f789fbc9310fab1f68a87420
SHA5128693e5a87844600c5e3ac04a74f01c801cefba09216c87e707c07fa34565693a98d74547470eef64ce9b277db4a466ee1176ca0015dddb665c9a84b7e6886c5d
-
\Users\Admin\AppData\Local\Temp\1000212001\3000.exeFilesize
2.4MB
MD577181eb9385b899f4bce3387a2efe18c
SHA168488c2d2aae96c6f552bcddb81e198b0390312a
SHA256e18597f8343d2752ecfea69c4615ea58f37d948ee5d0741791410fb2a4827b1b
SHA5123d034f0b238ad5da850d38f3f247693415ca1773aab84f25c32d500864d7a11b8385d2c5da45a19950c5cdad9664963af85ae13d48da7fceee895d847f94eeb9
-
\Users\Admin\AppData\Local\Temp\613bae0a89\gntuud.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exeFilesize
244KB
MD5c8f046db4ece8e5bc2654c7037267b96
SHA1f21cca0c799bfcb3d9ee3e0b511188a10b0b1327
SHA256a3ab76b17b04ccbaff41b72ed665bf28e6c5586a4f715e43b1100820acdfd819
SHA512bcec736ef727605fbe5a3b26fdaf4d13902e3f59d6c7d54262cf11bc3e1bb6d16b280e96600cca83f1564310bc8ea25aee982f770db6a7c3aaea787648037231
-
\Users\Admin\AppData\Roaming\1000209000\mine.exeFilesize
241KB
MD53c0eaa80d5332030e07f85fbd5960044
SHA14f3495495a1eb31709949979dc78c23406eb9648
SHA256d72ba95c67364911636a82f711732eb67e235bb31b17928e832228e847d25890
SHA5124380fc3af96039f15b5094fa05c70b7bfdb0c93443816d48017e2e31532ef224acf8b23f113ff570189e53faa126529cc9574b04869d68a20ede2df7a5d0a9aa
-
memory/432-79-0x0000000000000000-mapping.dmp
-
memory/584-74-0x0000000000000000-mapping.dmp
-
memory/836-113-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/836-112-0x000000000028B000-0x00000000002AA000-memory.dmpFilesize
124KB
-
memory/836-107-0x0000000000000000-mapping.dmp
-
memory/868-58-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/868-56-0x0000000000230000-0x0000000000330000-memory.dmpFilesize
1024KB
-
memory/868-57-0x0000000000660000-0x000000000069E000-memory.dmpFilesize
248KB
-
memory/868-55-0x0000000075131000-0x0000000075133000-memory.dmpFilesize
8KB
-
memory/868-63-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/952-65-0x0000000000000000-mapping.dmp
-
memory/1096-72-0x0000000000000000-mapping.dmp
-
memory/1180-99-0x0000000000000000-mapping.dmp
-
memory/1180-69-0x0000000000000000-mapping.dmp
-
memory/1184-84-0x0000000000000000-mapping.dmp
-
memory/1436-106-0x0000000000000000-mapping.dmp
-
memory/1456-87-0x0000000000000000-mapping.dmp
-
memory/1496-89-0x0000000000000000-mapping.dmp
-
memory/1496-92-0x000000000070B000-0x000000000072A000-memory.dmpFilesize
124KB
-
memory/1496-93-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/1776-73-0x0000000000000000-mapping.dmp
-
memory/1776-101-0x0000000000000000-mapping.dmp
-
memory/1776-105-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/1880-75-0x0000000000000000-mapping.dmp
-
memory/1968-95-0x0000000000000000-mapping.dmp
-
memory/1984-67-0x0000000000000000-mapping.dmp
-
memory/1988-66-0x0000000000000000-mapping.dmp
-
memory/2040-68-0x000000000083B000-0x000000000085A000-memory.dmpFilesize
124KB
-
memory/2040-61-0x0000000000000000-mapping.dmp
-
memory/2040-70-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/2040-77-0x0000000000400000-0x000000000065B000-memory.dmpFilesize
2.4MB
-
memory/2040-76-0x000000000083B000-0x000000000085A000-memory.dmpFilesize
124KB