Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 00:37
Static task
static1
Behavioral task
behavioral1
Sample
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe
Resource
win10v2004-20221111-en
General
-
Target
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe
-
Size
218KB
-
MD5
9e90b8196b1979b337be4c7c24111f7f
-
SHA1
0834f7c90373e59abdba656e8a73502c664e7534
-
SHA256
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef
-
SHA512
b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db
-
SSDEEP
3072:XOvK93lmpPX2yKCL4Z/0BCpmSmSDByjivPPyY1GQ62VGNAj:XjMPX2yK1/qsmSmSDUuHKH/
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1644-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1644-65-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1644-66-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1644-69-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1644-76-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1064-101-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1064-109-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
AppMgnt.exehknswc.exeAppMgnt.exepid process 1120 AppMgnt.exe 1272 hknswc.exe 1944 AppMgnt.exe -
Loads dropped DLL 2 IoCs
Processes:
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exeAppMgnt.exepid process 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exehknswc.exedescription pid process target process PID 1368 set thread context of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1272 set thread context of 1064 1272 hknswc.exe AppLaunch.exe -
Drops file in Windows directory 3 IoCs
Processes:
AppLaunch.exeAppLaunch.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier AppLaunch.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier AppLaunch.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exeAppMgnt.exeAppMgnt.exehknswc.exepid process 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1120 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1944 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1272 hknswc.exe 1272 hknswc.exe 1272 hknswc.exe 1944 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe 1272 hknswc.exe 1944 AppMgnt.exe 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exeAppMgnt.exehknswc.exeAppMgnt.exedescription pid process Token: SeDebugPrivilege 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe Token: SeDebugPrivilege 1120 AppMgnt.exe Token: SeDebugPrivilege 1272 hknswc.exe Token: SeDebugPrivilege 1944 AppMgnt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AppMgnt.exepid process 1120 AppMgnt.exe 1120 AppMgnt.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exeAppMgnt.exehknswc.exedescription pid process target process PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1644 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppLaunch.exe PID 1368 wrote to memory of 1120 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1120 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1120 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1120 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1120 wrote to memory of 1272 1120 AppMgnt.exe hknswc.exe PID 1120 wrote to memory of 1272 1120 AppMgnt.exe hknswc.exe PID 1120 wrote to memory of 1272 1120 AppMgnt.exe hknswc.exe PID 1120 wrote to memory of 1272 1120 AppMgnt.exe hknswc.exe PID 1368 wrote to memory of 1944 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1944 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1944 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1368 wrote to memory of 1944 1368 0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe AppMgnt.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe PID 1272 wrote to memory of 1064 1272 hknswc.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe"C:\Users\Admin\AppData\Local\Temp\0760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"2⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"4⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
14KB
MD59de341ca4dd62774ec3879337522e491
SHA1682db3ba6f088d73351a8d6fd728632f1bbd4653
SHA25643482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337
SHA5128d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
14KB
MD59de341ca4dd62774ec3879337522e491
SHA1682db3ba6f088d73351a8d6fd728632f1bbd4653
SHA25643482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337
SHA5128d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
14KB
MD59de341ca4dd62774ec3879337522e491
SHA1682db3ba6f088d73351a8d6fd728632f1bbd4653
SHA25643482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337
SHA5128d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exeFilesize
218KB
MD59e90b8196b1979b337be4c7c24111f7f
SHA10834f7c90373e59abdba656e8a73502c664e7534
SHA2560760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef
SHA512b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exeFilesize
218KB
MD59e90b8196b1979b337be4c7c24111f7f
SHA10834f7c90373e59abdba656e8a73502c664e7534
SHA2560760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef
SHA512b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\.IdentifierFilesize
68B
MD5714852b1746e49b7bfee3f968522bfae
SHA17eb88076c9ab442b2c33b8f1049d7c9a4ce64f35
SHA25618d5efa351d7b96544f11865f18d3d2e54820ad7580497a4f4b8c7b622125219
SHA512855779ff9761754af4829caf145638bc7623fca6cd0c49370fb0c41ea6d4f333f3b6060e77b9d2f6876d732914cd18b4c6d5663bcbb95698f726f3bef2b6bd4c
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
14KB
MD59de341ca4dd62774ec3879337522e491
SHA1682db3ba6f088d73351a8d6fd728632f1bbd4653
SHA25643482bf71fea728857949755a8837ca49b4109803773cadbdc084f610e8a2337
SHA5128d0049d385164f5ef7ad74751ecd2c8b842f506be4ab72c9169ac6480cda177b0441845f166961d4f900571d7f3b8a41b0c75cb875ce0dd90e9bf337baf388e2
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exeFilesize
218KB
MD59e90b8196b1979b337be4c7c24111f7f
SHA10834f7c90373e59abdba656e8a73502c664e7534
SHA2560760810fdc8c99d629c3bbdb9baa375c3cb9a2c6e8d52d9c42941e6483cc55ef
SHA512b6882e25484a12790b465161dfa7a63f8de8dc6702b36a1b2b9a1c274e3fa3cc208d62bf7c410fa7fad9cff48980fe22b82cec2e7cf6cd8cc6be7b7f3d1719db
-
memory/1064-109-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1064-101-0x00000000004021DA-mapping.dmp
-
memory/1120-89-0x0000000000175000-0x0000000000186000-memory.dmpFilesize
68KB
-
memory/1120-72-0x0000000000000000-mapping.dmp
-
memory/1120-86-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1120-77-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1120-83-0x0000000000175000-0x0000000000186000-memory.dmpFilesize
68KB
-
memory/1120-88-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1272-87-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1272-85-0x0000000000C26000-0x0000000000C37000-memory.dmpFilesize
68KB
-
memory/1272-84-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1272-80-0x0000000000000000-mapping.dmp
-
memory/1368-56-0x0000000001E66000-0x0000000001E77000-memory.dmpFilesize
68KB
-
memory/1368-54-0x0000000074E41000-0x0000000074E43000-memory.dmpFilesize
8KB
-
memory/1368-57-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1368-55-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1644-63-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-61-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-69-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-58-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-76-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-65-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1644-66-0x00000000004021DA-mapping.dmp
-
memory/1944-90-0x0000000000000000-mapping.dmp
-
memory/1944-107-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB
-
memory/1944-108-0x0000000000A65000-0x0000000000A76000-memory.dmpFilesize
68KB
-
memory/1944-110-0x0000000074160000-0x000000007470B000-memory.dmpFilesize
5.7MB