Analysis
-
max time kernel
79s -
max time network
79s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 11:30
Behavioral task
behavioral1
Sample
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe
Resource
win7-20221111-en
General
-
Target
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe
-
Size
3.1MB
-
MD5
f2733cc44798b9014af14f7bc7d280de
-
SHA1
0f6a947f59710ef5dd197ed9ee02d00e72aef420
-
SHA256
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215
-
SHA512
a03fc99fa026eaeac18fa1d3b0830eaeca4ee431601b9a752c31926a1a34589795faffb05a9c053e6ddd86dde335913a5ccf7b5a14055436c8bc341ac541aa31
-
SSDEEP
98304:al94XfeyP6RDfyu8LSMyj0mdQ1820sJPLaYy/:al2X2yiNKtSTdQ18dsJP+
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/836-92-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon behavioral1/memory/836-100-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon behavioral1/memory/836-103-0x0000000000400000-0x00000000009C8000-memory.dmp family_blackmoon -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Temp\UpDate.dll acprotect -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule behavioral1/memory/468-86-0x0000000000401000-0x000000000041B000-memory.dmp modiloader_stage2 \Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dll modiloader_stage2 behavioral1/memory/836-91-0x0000000077340000-0x00000000774C0000-memory.dmp modiloader_stage2 \Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dll modiloader_stage2 C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll modiloader_stage2 -
Executes dropped EXE 3 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeľÂí.exeľÂí.exepid process 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 1396 ľÂí.exe 468 ľÂí.exe -
Processes:
resource yara_rule behavioral1/memory/1376-59-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/1376-66-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/836-95-0x0000000010000000-0x000000001003E000-memory.dmp upx \Users\Admin\AppData\Local\Temp\Temp\UpDate.dll upx behavioral1/memory/836-99-0x0000000006890000-0x0000000006975000-memory.dmp upx behavioral1/memory/836-101-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/836-102-0x0000000006890000-0x0000000006975000-memory.dmp upx -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Wine ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Loads dropped DLL 8 IoCs
Processes:
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exeľÂí.exeľÂí.exeÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe 1396 ľÂí.exe 468 ľÂí.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ľÂí.exedescription pid process target process PID 1396 set thread context of 468 1396 ľÂí.exe ľÂí.exe -
Drops file in Program Files directory 1 IoCs
Processes:
ľÂí.exedescription ioc process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dll ľÂí.exe -
Drops file in Windows directory 2 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process File created C:\Windows\win8.she ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe File created C:\Windows\jedata.dll ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?k23848535" ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exedescription pid process Token: SeDebugPrivilege 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
ľÂí.exeÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exepid process 468 ľÂí.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe 836 ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exeľÂí.exedescription pid process target process PID 1376 wrote to memory of 836 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 1376 wrote to memory of 836 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 1376 wrote to memory of 836 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 1376 wrote to memory of 836 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe PID 1376 wrote to memory of 1396 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 1376 wrote to memory of 1396 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 1376 wrote to memory of 1396 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 1376 wrote to memory of 1396 1376 731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe PID 1396 wrote to memory of 468 1396 ľÂí.exe ľÂí.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe"C:\Users\Admin\AppData\Local\Temp\731d9c2e4935e83a70b356cc2bff117777082e49bb43ccd9857863e0f8cbd215.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeC:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\Microsoft Shared\MSINFO\SysInfo.dllFilesize
57KB
MD5bf238ea7175ba09cc2d1b3d43fddcdf9
SHA14c927a47e6dd40c65d4ec00e87518495779079e9
SHA256f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894
SHA512889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
C:\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
\Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dllFilesize
57KB
MD5bf238ea7175ba09cc2d1b3d43fddcdf9
SHA14c927a47e6dd40c65d4ec00e87518495779079e9
SHA256f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894
SHA512889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2
-
\Program Files\Common Files\Microsoft Shared\MSInfo\SysInfo.dllFilesize
57KB
MD5bf238ea7175ba09cc2d1b3d43fddcdf9
SHA14c927a47e6dd40c65d4ec00e87518495779079e9
SHA256f236c51a0053c7704b55f8e64d4468fbf451711bff0049c08b98343a3b0cb894
SHA512889d1c62d4ecb5632b19a0c3a99df8796b3cb679dfbd66ca60f3f0d359a9ad50833221b563f3b6502cd67ffa0d5947b7f3c7b65eef1e3802e8ccfa8f2dd60ba2
-
\Users\Admin\AppData\Local\Temp\Temp\UpDate.dllFilesize
289KB
MD5f1aac1bb696a30d45e4a89d1de587979
SHA1d1d353489084783766f4a328a71a953127317485
SHA2563f28ed50462274e5ae2a94909b680ae0a188ad1a744ac18e74bf183c13fe6f1b
SHA5128a7d712b759fa447c7b5ca7d9f66746a326eff395ccaad0df9da1f2377f157746471a7eb62047c8b1d03bd9f59d41292c05865568a95bfb0d2bc8373984b5a4e
-
\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
\Users\Admin\AppData\Local\Temp\Temp\ľÂí.exeFilesize
5.8MB
MD5eaaa7d585fe518826886961768b03d25
SHA1ffbb1af5deab0b416d2d8db1f2f18ac0c1093b7a
SHA256e3f3c0bf1db79593daf1d579ba95fb2f655e59c889d233e742c2c23e7b7a71db
SHA5128e3c1bf285d98eb3718402df3467332055713e0d2de5c3748bcae78815e72657d2c143148a22ac722ee26831740981acc2515f6d2da2e0f4d982ff29fa1bcf2a
-
\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
\Users\Admin\AppData\Local\Temp\Temp\ÅÜÅÜÓÎÏÀÈ«¹¦ÄÜ1127Ãâ·Ñ°æ.exeFilesize
3.0MB
MD551f2e214a0cd49d78b93092e25270a9b
SHA153091dc8ebd8f86ff5091bcd10fb9ca03adc7686
SHA2569edae2b07d53d0e39993e079e115dc146f42c078d4b4fd2df506921460d5fca2
SHA51273d5d7d801a4b78c23d5ccd12702e68c8475e7db204e627eb76881c2f76d1c5798558b7914e494d8fc9b26797e8180418ecd30e4753d563dfb8fe829f6a588eb
-
memory/468-86-0x0000000000401000-0x000000000041B000-memory.dmpFilesize
104KB
-
memory/468-83-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/468-70-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/468-71-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/468-85-0x000000000041B000-0x0000000000423000-memory.dmpFilesize
32KB
-
memory/468-87-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/468-75-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/468-79-0x000000000042208E-mapping.dmp
-
memory/836-93-0x0000000077340000-0x00000000774C0000-memory.dmpFilesize
1.5MB
-
memory/836-88-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/836-78-0x0000000002390000-0x00000000024F3000-memory.dmpFilesize
1.4MB
-
memory/836-104-0x0000000077340000-0x00000000774C0000-memory.dmpFilesize
1.5MB
-
memory/836-103-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/836-102-0x0000000006890000-0x0000000006975000-memory.dmpFilesize
916KB
-
memory/836-101-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/836-57-0x0000000000000000-mapping.dmp
-
memory/836-62-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/836-91-0x0000000077340000-0x00000000774C0000-memory.dmpFilesize
1.5MB
-
memory/836-92-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/836-100-0x0000000000400000-0x00000000009C8000-memory.dmpFilesize
5.8MB
-
memory/836-99-0x0000000006890000-0x0000000006975000-memory.dmpFilesize
916KB
-
memory/836-95-0x0000000010000000-0x000000001003E000-memory.dmpFilesize
248KB
-
memory/1376-66-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1376-59-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/1376-60-0x0000000002640000-0x0000000002C08000-memory.dmpFilesize
5.8MB
-
memory/1376-61-0x0000000002640000-0x0000000002C08000-memory.dmpFilesize
5.8MB
-
memory/1376-54-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/1396-81-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/1396-65-0x0000000000000000-mapping.dmp
-
memory/1396-74-0x0000000000EE0000-0x0000000000EF8000-memory.dmpFilesize
96KB
-
memory/1396-76-0x0000000000340000-0x0000000000358000-memory.dmpFilesize
96KB