Analysis
-
max time kernel
172s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 09:31
Static task
static1
Behavioral task
behavioral1
Sample
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe
Resource
win10v2004-20221111-en
General
-
Target
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe
-
Size
1.2MB
-
MD5
c052e847fbbcc286ba6cfe299d272876
-
SHA1
5a67a3e94d41f5d76a714814dd780493ff98283a
-
SHA256
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf
-
SHA512
5b5e305fef7e69504270f09a7c6bbee5c422da6eba0c136c5e6652a5526f89386a0ff3fced07887a2be3db5ecb083110216d18c57473518d68835a99bf473ea5
-
SSDEEP
12288:pfP1+T06EoFkEaJ5tth5zsdns7sLW/dxcUVBy:pHs6py
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
kdmapper.exepid process 1068 kdmapper.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Windows directory 2 IoCs
Processes:
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exedescription ioc process File created C:\Windows\IME\kdmapper.exe a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe File created C:\Windows\IME\Spoofy.sys a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe -
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exeipconfig.exeipconfig.exeipconfig.exepid process 1468 ipconfig.exe 2272 ipconfig.exe 3812 ipconfig.exe 3552 ipconfig.exe 4272 ipconfig.exe -
Kills process with taskkill 6 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2464 taskkill.exe 3504 taskkill.exe 4400 taskkill.exe 2328 taskkill.exe 404 taskkill.exe 1580 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 1520 powershell.exe 1520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 2464 taskkill.exe Token: SeDebugPrivilege 3504 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 1580 taskkill.exe Token: SeIncreaseQuotaPrivilege 3880 WMIC.exe Token: SeSecurityPrivilege 3880 WMIC.exe Token: SeTakeOwnershipPrivilege 3880 WMIC.exe Token: SeLoadDriverPrivilege 3880 WMIC.exe Token: SeSystemProfilePrivilege 3880 WMIC.exe Token: SeSystemtimePrivilege 3880 WMIC.exe Token: SeProfSingleProcessPrivilege 3880 WMIC.exe Token: SeIncBasePriorityPrivilege 3880 WMIC.exe Token: SeCreatePagefilePrivilege 3880 WMIC.exe Token: SeBackupPrivilege 3880 WMIC.exe Token: SeRestorePrivilege 3880 WMIC.exe Token: SeShutdownPrivilege 3880 WMIC.exe Token: SeDebugPrivilege 3880 WMIC.exe Token: SeSystemEnvironmentPrivilege 3880 WMIC.exe Token: SeRemoteShutdownPrivilege 3880 WMIC.exe Token: SeUndockPrivilege 3880 WMIC.exe Token: SeManageVolumePrivilege 3880 WMIC.exe Token: 33 3880 WMIC.exe Token: 34 3880 WMIC.exe Token: 35 3880 WMIC.exe Token: 36 3880 WMIC.exe Token: SeIncreaseQuotaPrivilege 3880 WMIC.exe Token: SeSecurityPrivilege 3880 WMIC.exe Token: SeTakeOwnershipPrivilege 3880 WMIC.exe Token: SeLoadDriverPrivilege 3880 WMIC.exe Token: SeSystemProfilePrivilege 3880 WMIC.exe Token: SeSystemtimePrivilege 3880 WMIC.exe Token: SeProfSingleProcessPrivilege 3880 WMIC.exe Token: SeIncBasePriorityPrivilege 3880 WMIC.exe Token: SeCreatePagefilePrivilege 3880 WMIC.exe Token: SeBackupPrivilege 3880 WMIC.exe Token: SeRestorePrivilege 3880 WMIC.exe Token: SeShutdownPrivilege 3880 WMIC.exe Token: SeDebugPrivilege 3880 WMIC.exe Token: SeSystemEnvironmentPrivilege 3880 WMIC.exe Token: SeRemoteShutdownPrivilege 3880 WMIC.exe Token: SeUndockPrivilege 3880 WMIC.exe Token: SeManageVolumePrivilege 3880 WMIC.exe Token: 33 3880 WMIC.exe Token: 34 3880 WMIC.exe Token: 35 3880 WMIC.exe Token: 36 3880 WMIC.exe Token: SeIncreaseQuotaPrivilege 2760 WMIC.exe Token: SeSecurityPrivilege 2760 WMIC.exe Token: SeTakeOwnershipPrivilege 2760 WMIC.exe Token: SeLoadDriverPrivilege 2760 WMIC.exe Token: SeSystemProfilePrivilege 2760 WMIC.exe Token: SeSystemtimePrivilege 2760 WMIC.exe Token: SeProfSingleProcessPrivilege 2760 WMIC.exe Token: SeIncBasePriorityPrivilege 2760 WMIC.exe Token: SeCreatePagefilePrivilege 2760 WMIC.exe Token: SeBackupPrivilege 2760 WMIC.exe Token: SeRestorePrivilege 2760 WMIC.exe Token: SeShutdownPrivilege 2760 WMIC.exe Token: SeDebugPrivilege 2760 WMIC.exe Token: SeSystemEnvironmentPrivilege 2760 WMIC.exe Token: SeRemoteShutdownPrivilege 2760 WMIC.exe Token: SeUndockPrivilege 2760 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1932 wrote to memory of 256 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 256 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 256 wrote to memory of 2464 256 cmd.exe taskkill.exe PID 256 wrote to memory of 2464 256 cmd.exe taskkill.exe PID 1932 wrote to memory of 3696 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3696 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 3696 wrote to memory of 3504 3696 cmd.exe taskkill.exe PID 3696 wrote to memory of 3504 3696 cmd.exe taskkill.exe PID 1932 wrote to memory of 4560 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 4560 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 4560 wrote to memory of 4400 4560 cmd.exe taskkill.exe PID 4560 wrote to memory of 4400 4560 cmd.exe taskkill.exe PID 1932 wrote to memory of 3148 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3148 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 3148 wrote to memory of 2328 3148 cmd.exe taskkill.exe PID 3148 wrote to memory of 2328 3148 cmd.exe taskkill.exe PID 1932 wrote to memory of 2836 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 2836 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 2836 wrote to memory of 404 2836 cmd.exe taskkill.exe PID 2836 wrote to memory of 404 2836 cmd.exe taskkill.exe PID 1932 wrote to memory of 744 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 744 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 744 wrote to memory of 1580 744 cmd.exe taskkill.exe PID 744 wrote to memory of 1580 744 cmd.exe taskkill.exe PID 1932 wrote to memory of 1664 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 1664 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 3100 wrote to memory of 3880 3100 cmd.exe WMIC.exe PID 3100 wrote to memory of 3880 3100 cmd.exe WMIC.exe PID 1932 wrote to memory of 4024 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 4024 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 4024 wrote to memory of 1068 4024 cmd.exe kdmapper.exe PID 4024 wrote to memory of 1068 4024 cmd.exe kdmapper.exe PID 1932 wrote to memory of 3308 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3308 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 3308 wrote to memory of 2760 3308 cmd.exe WMIC.exe PID 3308 wrote to memory of 2760 3308 cmd.exe WMIC.exe PID 1932 wrote to memory of 3708 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3708 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 4100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 4100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 4100 wrote to memory of 1520 4100 cmd.exe powershell.exe PID 4100 wrote to memory of 1520 4100 cmd.exe powershell.exe PID 1932 wrote to memory of 3588 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3588 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 3100 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 3100 wrote to memory of 4064 3100 cmd.exe netsh.exe PID 3100 wrote to memory of 4064 3100 cmd.exe netsh.exe PID 1932 wrote to memory of 4316 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 4316 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 4316 wrote to memory of 2196 4316 cmd.exe netsh.exe PID 4316 wrote to memory of 2196 4316 cmd.exe netsh.exe PID 1932 wrote to memory of 892 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 892 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 892 wrote to memory of 1192 892 cmd.exe netsh.exe PID 892 wrote to memory of 1192 892 cmd.exe netsh.exe PID 1932 wrote to memory of 2476 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 2476 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 2476 wrote to memory of 3416 2476 cmd.exe netsh.exe PID 2476 wrote to memory of 3416 2476 cmd.exe netsh.exe PID 1932 wrote to memory of 2260 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe PID 1932 wrote to memory of 2260 1932 a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe"C:\Users\Admin\AppData\Local\Temp\a9f52534528e7a50296b9effafdc23f6478ecad829b43c3d048be8641c0d79bf.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im EpicGamesLauncher.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im EpicGamesLauncher.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im FortniteClient-Win64-Shipping.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im FortniteClient-Win64-Shipping.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im OneDrive.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im OneDrive.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im RustClient.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im RustClient.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im Origin.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im Origin.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im r5apex.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /f /im r5apex.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0D2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:/Windows/IME/kdmapper.exe C:/Windows/IME/Spoofy.sys2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\IME\kdmapper.exeC:/Windows/IME/kdmapper.exe C:/Windows/IME/Spoofy.sys3⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:/Windows/IME/kernel.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell.exe Reset-PhysicalDisk * >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Reset-PhysicalDisk *3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:/Windows/IME/mac.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH WINSOCK RESET2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exeNETSH WINSOCK RESET3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INT IP RESET2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exeNETSH INT IP RESET3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE IPV4 RESET2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exeNETSH INTERFACE IPV4 RESET3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE IPV6 RESET2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exeNETSH INTERFACE IPV6 RESET3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c NETSH INTERFACE TCP RESET2⤵
-
C:\Windows\system32\netsh.exeNETSH INTERFACE TCP RESET3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RELEASE2⤵
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RELEASE3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RELEASE2⤵
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RELEASE3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RENEW2⤵
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RENEW3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /FLUSHDNS2⤵
-
C:\Windows\system32\ipconfig.exeIPCONFIG /FLUSHDNS3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c IPCONFIG /RENEW2⤵
-
C:\Windows\system32\ipconfig.exeIPCONFIG /RENEW3⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net stop winmgmt /y >nul 2>&12⤵
-
C:\Windows\system32\net.exenet stop winmgmt /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\IME\kdmapper.exeFilesize
454KB
MD5b954b605163a06bcd5ba4cf8f9cc4e03
SHA13cce640a2a71cb3b004256e23ad27eae63554498
SHA2563b00d34ae7cd43fbd70d9bd8a15ffd7e432af77db6f76e8763573bbdda8f112b
SHA512bfb4173de17e4fd6f843be18e7c799643883d6ea81e015e109da05f7c09709a8c0f8cb05ca4b0ffca8c448da947cc14a94f7acbd9b1d15e3a3c995cc806aaf39
-
C:\Windows\IME\kdmapper.exeFilesize
454KB
MD5b954b605163a06bcd5ba4cf8f9cc4e03
SHA13cce640a2a71cb3b004256e23ad27eae63554498
SHA2563b00d34ae7cd43fbd70d9bd8a15ffd7e432af77db6f76e8763573bbdda8f112b
SHA512bfb4173de17e4fd6f843be18e7c799643883d6ea81e015e109da05f7c09709a8c0f8cb05ca4b0ffca8c448da947cc14a94f7acbd9b1d15e3a3c995cc806aaf39
-
memory/256-132-0x0000000000000000-mapping.dmp
-
memory/380-184-0x0000000000000000-mapping.dmp
-
memory/404-141-0x0000000000000000-mapping.dmp
-
memory/744-142-0x0000000000000000-mapping.dmp
-
memory/892-168-0x0000000000000000-mapping.dmp
-
memory/1068-148-0x0000000000000000-mapping.dmp
-
memory/1068-151-0x00007FF785CF0000-0x00007FF785D88000-memory.dmpFilesize
608KB
-
memory/1192-169-0x0000000000000000-mapping.dmp
-
memory/1468-177-0x0000000000000000-mapping.dmp
-
memory/1520-162-0x00007FF80E8D0000-0x00007FF80F391000-memory.dmpFilesize
10.8MB
-
memory/1520-159-0x00000192E6C50000-0x00000192E6C7A000-memory.dmpFilesize
168KB
-
memory/1520-161-0x00007FF80E8D0000-0x00007FF80F391000-memory.dmpFilesize
10.8MB
-
memory/1520-160-0x00000192E6C50000-0x00000192E6C74000-memory.dmpFilesize
144KB
-
memory/1520-156-0x0000000000000000-mapping.dmp
-
memory/1520-157-0x00000192E6770000-0x00000192E6792000-memory.dmpFilesize
136KB
-
memory/1520-158-0x00007FF80E8D0000-0x00007FF80F391000-memory.dmpFilesize
10.8MB
-
memory/1580-143-0x0000000000000000-mapping.dmp
-
memory/1664-144-0x0000000000000000-mapping.dmp
-
memory/2196-167-0x0000000000000000-mapping.dmp
-
memory/2260-172-0x0000000000000000-mapping.dmp
-
memory/2272-179-0x0000000000000000-mapping.dmp
-
memory/2280-180-0x0000000000000000-mapping.dmp
-
memory/2328-139-0x0000000000000000-mapping.dmp
-
memory/2376-176-0x0000000000000000-mapping.dmp
-
memory/2464-133-0x0000000000000000-mapping.dmp
-
memory/2476-170-0x0000000000000000-mapping.dmp
-
memory/2760-153-0x0000000000000000-mapping.dmp
-
memory/2836-140-0x0000000000000000-mapping.dmp
-
memory/2856-178-0x0000000000000000-mapping.dmp
-
memory/3100-164-0x0000000000000000-mapping.dmp
-
memory/3100-145-0x0000000000000000-mapping.dmp
-
memory/3148-138-0x0000000000000000-mapping.dmp
-
memory/3308-152-0x0000000000000000-mapping.dmp
-
memory/3416-171-0x0000000000000000-mapping.dmp
-
memory/3504-135-0x0000000000000000-mapping.dmp
-
memory/3552-183-0x0000000000000000-mapping.dmp
-
memory/3588-163-0x0000000000000000-mapping.dmp
-
memory/3696-134-0x0000000000000000-mapping.dmp
-
memory/3708-154-0x0000000000000000-mapping.dmp
-
memory/3808-185-0x0000000000000000-mapping.dmp
-
memory/3812-181-0x0000000000000000-mapping.dmp
-
memory/3880-146-0x0000000000000000-mapping.dmp
-
memory/4024-147-0x0000000000000000-mapping.dmp
-
memory/4028-174-0x0000000000000000-mapping.dmp
-
memory/4064-165-0x0000000000000000-mapping.dmp
-
memory/4100-155-0x0000000000000000-mapping.dmp
-
memory/4272-175-0x0000000000000000-mapping.dmp
-
memory/4316-166-0x0000000000000000-mapping.dmp
-
memory/4400-137-0x0000000000000000-mapping.dmp
-
memory/4560-136-0x0000000000000000-mapping.dmp
-
memory/4664-182-0x0000000000000000-mapping.dmp
-
memory/4840-173-0x0000000000000000-mapping.dmp