Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 01:48
Static task
static1
Behavioral task
behavioral1
Sample
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
Resource
win10v2004-20220901-en
General
-
Target
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe
-
Size
653KB
-
MD5
522853fc7173f637ae423e558c983ecd
-
SHA1
fc622564e9b8d2d39197969fd857f85188246b50
-
SHA256
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
-
SHA512
676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
SSDEEP
12288:ULmMOBCmXo7OCj+5MlaGBKwFJo6SYrfZfHoA+ybn:ULmxonVj+5MLBK6PrpHZrn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Windows Update.exeWindows Update.exepid process 568 Windows Update.exe 1116 Windows Update.exe -
Deletes itself 1 IoCs
Processes:
Windows Update.exepid process 1116 Windows Update.exe -
Loads dropped DLL 2 IoCs
Processes:
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exeWindows Update.exepid process 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 568 Windows Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 whatismyipaddress.com 5 whatismyipaddress.com 6 whatismyipaddress.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exeWindows Update.exeWindows Update.exedescription pid process target process PID 1088 set thread context of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 568 set thread context of 1116 568 Windows Update.exe Windows Update.exe PID 1116 set thread context of 1560 1116 Windows Update.exe vbc.exe PID 1116 set thread context of 2036 1116 Windows Update.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exeWindows Update.exepid process 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 1116 Windows Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exevbc.exeWindows Update.exedescription pid process Token: SeDebugPrivilege 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Token: SeDebugPrivilege 2036 vbc.exe Token: SeDebugPrivilege 1116 Windows Update.exe -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exeWindows Update.exeWindows Update.exedescription pid process target process PID 1088 wrote to memory of 1192 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1192 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1192 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1192 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1288 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1288 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1288 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1288 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1208 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1208 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1208 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 1208 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 1088 wrote to memory of 812 1088 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 812 wrote to memory of 568 812 019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 568 wrote to memory of 1116 568 Windows Update.exe Windows Update.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 1560 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe PID 1116 wrote to memory of 2036 1116 Windows Update.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"2⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"2⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"2⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"C:\Users\Admin\AppData\Local\Temp\019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"5⤵
- Accesses Microsoft Outlook accounts
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD551c13b31a41149833e00bf869af5d9c7
SHA1498834850c5badd9839a567c527beb37fe50313d
SHA25605b831d4e65c1759c69354be763e17df10a45a55e78f2bd053ce54f96cce77ad
SHA5122e441977e6b81e27a7afceb3af0f3d156c7cc601e756d217618edc273bcadbaf8eebf2329dfc60337b04ab4e024c89cb8de2f513e267b53f735a19a325a41579
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
329B
MD5f8ddf0fe04f214d64c3e5094ed622858
SHA1245a91a1c968c45820fbbb319c1bcfc98b01b04e
SHA256f73d76c930aa76b78390a50ee72b9169c7064b9e1256de76ab9ffb43bca8f5d3
SHA512e6385a3d47f8969f2079ae28a4e2753c2da60e37601ebd15049e21f1490e7a1ec760a3cc6c8b75a8049aa8a08735a9f24187d7ad13c6ac8d4a5510dc88718900
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
653KB
MD5522853fc7173f637ae423e558c983ecd
SHA1fc622564e9b8d2d39197969fd857f85188246b50
SHA256019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
SHA512676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
653KB
MD5522853fc7173f637ae423e558c983ecd
SHA1fc622564e9b8d2d39197969fd857f85188246b50
SHA256019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
SHA512676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
C:\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
653KB
MD5522853fc7173f637ae423e558c983ecd
SHA1fc622564e9b8d2d39197969fd857f85188246b50
SHA256019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
SHA512676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
653KB
MD5522853fc7173f637ae423e558c983ecd
SHA1fc622564e9b8d2d39197969fd857f85188246b50
SHA256019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
SHA512676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
\Users\Admin\AppData\Roaming\Windows Update.exeFilesize
653KB
MD5522853fc7173f637ae423e558c983ecd
SHA1fc622564e9b8d2d39197969fd857f85188246b50
SHA256019e9e4afa3e3a822eebdf12426db96abe96514bb18710026d5f77effea7c3dd
SHA512676a780af9b5e1b1c1fee6abe990d112f17a541a3dc2a1ea71680e4be56ee6a3155628741bba148841f2760629de0f386f4c6038c52a6772ea0b303d240489dc
-
memory/568-93-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/568-77-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/568-72-0x0000000000000000-mapping.dmp
-
memory/812-61-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-70-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/812-67-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-65-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-63-0x000000000051BB4E-mapping.dmp
-
memory/812-76-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/812-62-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-59-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-57-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/812-56-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/1088-68-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/1088-55-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/1088-54-0x0000000074C91000-0x0000000074C93000-memory.dmpFilesize
8KB
-
memory/1116-94-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/1116-104-0x00000000005E5000-0x00000000005F6000-memory.dmpFilesize
68KB
-
memory/1116-126-0x00000000005E5000-0x00000000005F6000-memory.dmpFilesize
68KB
-
memory/1116-86-0x000000000051BB4E-mapping.dmp
-
memory/1116-96-0x00000000740E0000-0x000000007468B000-memory.dmpFilesize
5.7MB
-
memory/1560-109-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-100-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-106-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-107-0x0000000000462B6D-mapping.dmp
-
memory/1560-97-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-108-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-105-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-98-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1560-102-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2036-113-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-115-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-117-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-118-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-119-0x0000000000460E2D-mapping.dmp
-
memory/2036-122-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-123-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-111-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-125-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB
-
memory/2036-110-0x0000000000400000-0x000000000048B000-memory.dmpFilesize
556KB