Analysis
-
max time kernel
48s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 11:36
Static task
static1
Behavioral task
behavioral1
Sample
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe
Resource
win7-20220812-en
General
-
Target
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe
-
Size
331KB
-
MD5
eb2cc33b05f167b62155d3afdd33bca2
-
SHA1
884068cd29cc9ff4d8a1a1d898f5a868d547c334
-
SHA256
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
-
SHA512
9cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
SSDEEP
6144:SM41YTICjnbHv1eNJa0rr7DxodlqFYZwfjJVYv0yGKb52Wf:SKjLv03aYDxodluYZw7JV+2Wf
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
explorer.exesysglobl.exeiedvtool.exepid process 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe -
Processes:
resource yara_rule behavioral1/memory/1984-67-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-69-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-71-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-73-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-75-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-77-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-78-0x0000000000400000-0x00000000004C9000-memory.dmp upx behavioral1/memory/1984-79-0x0000000000400000-0x00000000004C9000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 1184 explorer.exe -
Loads dropped DLL 6 IoCs
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exesysglobl.exepid process 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe 1184 explorer.exe 1184 explorer.exe 1484 sysglobl.exe 1484 sysglobl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
sysglobl.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\© Windows Live Messenger Music Status Plugin Module = "C:\\Users\\Admin\\AppData\\Local\\Temp\\sysglobl.exe" sysglobl.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
explorer.exeiedvtool.exedescription pid process target process PID 1184 set thread context of 1984 1184 explorer.exe AppLaunch.exe PID 1372 set thread context of 1284 1372 iedvtool.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exesysglobl.exeiedvtool.exepid process 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1484 sysglobl.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1484 sysglobl.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1484 sysglobl.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1484 sysglobl.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1372 iedvtool.exe 1184 explorer.exe 1484 sysglobl.exe 1372 iedvtool.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exesysglobl.exeAppLaunch.exeiedvtool.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe Token: SeDebugPrivilege 1184 explorer.exe Token: SeDebugPrivilege 1484 sysglobl.exe Token: SeIncreaseQuotaPrivilege 1984 AppLaunch.exe Token: SeSecurityPrivilege 1984 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1984 AppLaunch.exe Token: SeLoadDriverPrivilege 1984 AppLaunch.exe Token: SeSystemProfilePrivilege 1984 AppLaunch.exe Token: SeSystemtimePrivilege 1984 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1984 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1984 AppLaunch.exe Token: SeCreatePagefilePrivilege 1984 AppLaunch.exe Token: SeBackupPrivilege 1984 AppLaunch.exe Token: SeRestorePrivilege 1984 AppLaunch.exe Token: SeShutdownPrivilege 1984 AppLaunch.exe Token: SeDebugPrivilege 1984 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1984 AppLaunch.exe Token: SeChangeNotifyPrivilege 1984 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1984 AppLaunch.exe Token: SeUndockPrivilege 1984 AppLaunch.exe Token: SeManageVolumePrivilege 1984 AppLaunch.exe Token: SeImpersonatePrivilege 1984 AppLaunch.exe Token: SeCreateGlobalPrivilege 1984 AppLaunch.exe Token: 33 1984 AppLaunch.exe Token: 34 1984 AppLaunch.exe Token: 35 1984 AppLaunch.exe Token: SeDebugPrivilege 1372 iedvtool.exe Token: SeIncreaseQuotaPrivilege 1284 AppLaunch.exe Token: SeSecurityPrivilege 1284 AppLaunch.exe Token: SeTakeOwnershipPrivilege 1284 AppLaunch.exe Token: SeLoadDriverPrivilege 1284 AppLaunch.exe Token: SeSystemProfilePrivilege 1284 AppLaunch.exe Token: SeSystemtimePrivilege 1284 AppLaunch.exe Token: SeProfSingleProcessPrivilege 1284 AppLaunch.exe Token: SeIncBasePriorityPrivilege 1284 AppLaunch.exe Token: SeCreatePagefilePrivilege 1284 AppLaunch.exe Token: SeBackupPrivilege 1284 AppLaunch.exe Token: SeRestorePrivilege 1284 AppLaunch.exe Token: SeShutdownPrivilege 1284 AppLaunch.exe Token: SeDebugPrivilege 1284 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 1284 AppLaunch.exe Token: SeChangeNotifyPrivilege 1284 AppLaunch.exe Token: SeRemoteShutdownPrivilege 1284 AppLaunch.exe Token: SeUndockPrivilege 1284 AppLaunch.exe Token: SeManageVolumePrivilege 1284 AppLaunch.exe Token: SeImpersonatePrivilege 1284 AppLaunch.exe Token: SeCreateGlobalPrivilege 1284 AppLaunch.exe Token: 33 1284 AppLaunch.exe Token: 34 1284 AppLaunch.exe Token: 35 1284 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AppLaunch.exepid process 1984 AppLaunch.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exeexplorer.exesysglobl.exeiedvtool.exedescription pid process target process PID 908 wrote to memory of 1184 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 908 wrote to memory of 1184 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 908 wrote to memory of 1184 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 908 wrote to memory of 1184 908 bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe explorer.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1984 1184 explorer.exe AppLaunch.exe PID 1184 wrote to memory of 1484 1184 explorer.exe sysglobl.exe PID 1184 wrote to memory of 1484 1184 explorer.exe sysglobl.exe PID 1184 wrote to memory of 1484 1184 explorer.exe sysglobl.exe PID 1184 wrote to memory of 1484 1184 explorer.exe sysglobl.exe PID 1484 wrote to memory of 1372 1484 sysglobl.exe iedvtool.exe PID 1484 wrote to memory of 1372 1484 sysglobl.exe iedvtool.exe PID 1484 wrote to memory of 1372 1484 sysglobl.exe iedvtool.exe PID 1484 wrote to memory of 1372 1484 sysglobl.exe iedvtool.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe PID 1372 wrote to memory of 1284 1372 iedvtool.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe"C:\Users\Admin\AppData\Local\Temp\bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exe"C:\Users\Admin\AppData\Local\Temp\sysglobl.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exe"C:\Users\Admin\AppData\Local\Temp\iedvtool.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe5⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD59ce7cd302354cd9620e92b882dc708a7
SHA11760eebb77ffe46e49caba7d0e488cfe504053e5
SHA2562437275ae372d5259895be8b178b57cef465775d020f00e8440f2d9c01948d9c
SHA512693ff1642b5f4739cc9a8bedb8f4f8033a40407f6793e21b724257f9516cd383c1f911b823a25e0af5a803b2749b76f4881ad09d31926589f71bd8d91c023327
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
C:\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
\Users\Admin\AppData\Local\Temp\iedvtool.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
\Users\Admin\AppData\Local\Temp\sysglobl.exeFilesize
5KB
MD5f497644617b3acfeb96112688987bdca
SHA1f053af1485c7ed5da986c0ddf156a4e30fe21fe0
SHA2569da37d8226e60103d6e1a5457e24f195d3fbc664b71ab759aeeb231a8c93f2ed
SHA512934a1057a7c11e7eb015b9c666c632953197128775abccb779014c179f5653b728aa5383fd668147528b7148c9e444bd6a0df8a7a9ca8c30712c6c3a3c2e17e1
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
331KB
MD5eb2cc33b05f167b62155d3afdd33bca2
SHA1884068cd29cc9ff4d8a1a1d898f5a868d547c334
SHA256bb88ff1c8a9fedda601ee817f7baf597f39f725322320fe6c39805e1a51ac6af
SHA5129cc8623fcf7fc335e38b04f5aa84575f2467c0a5f0f731d1f17cca78fb6bca7d520affc3c0fe84e24610f80d13c1ed4a92201c5a305da89d60aebb088282d096
-
memory/908-54-0x0000000075021000-0x0000000075023000-memory.dmpFilesize
8KB
-
memory/908-55-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/908-56-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/908-63-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1184-64-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1184-59-0x0000000000000000-mapping.dmp
-
memory/1184-110-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1284-109-0x0000000000481000-0x00000000004C7000-memory.dmpFilesize
280KB
-
memory/1284-98-0x00000000004C6940-mapping.dmp
-
memory/1372-108-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1372-89-0x0000000000000000-mapping.dmp
-
memory/1372-113-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1484-107-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1484-82-0x0000000000000000-mapping.dmp
-
memory/1484-112-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1984-79-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-66-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-67-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-69-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-106-0x0000000000481000-0x00000000004C7000-memory.dmpFilesize
280KB
-
memory/1984-71-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-78-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-77-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-75-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-111-0x0000000000481000-0x00000000004C7000-memory.dmpFilesize
280KB
-
memory/1984-73-0x0000000000400000-0x00000000004C9000-memory.dmpFilesize
804KB
-
memory/1984-72-0x00000000004C6940-mapping.dmp