Analysis
-
max time kernel
148s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 01:09
Static task
static1
Behavioral task
behavioral1
Sample
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
Resource
win10v2004-20220812-en
General
-
Target
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe
-
Size
227KB
-
MD5
1926d5d9eb5e4354f18083916de108f0
-
SHA1
f54ca406b5d189b19bdd2124c71660b921945cdb
-
SHA256
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
-
SHA512
32a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
SSDEEP
3072:mq6zDsoY9iUeCRvRpR5RhD/HzkfVtLrNFSDg6w3x5VdO3huCFOnYit8aQ:mqKC9X/L/cVtLxthdGhvOf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 2 TTPs 8 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\sysdiag64.exe = "C:\\Windows\\sysdiag64.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe -
Executes dropped EXE 2 IoCs
Processes:
sysdiag64.exesysdiag64.exepid process 692 sysdiag64.exe 804 sysdiag64.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN\ fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysdiag64.exe = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\Windows\\sysdiag64.exe" fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exedescription pid process target process PID 1976 set thread context of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 692 set thread context of 804 692 sysdiag64.exe sysdiag64.exe -
Drops file in Windows directory 4 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exedescription ioc process File created C:\Windows\sysdiag64.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe File opened for modification C:\Windows\sysdiag64.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe File opened for modification C:\Windows\sysdiag64.exe sysdiag64.exe File created C:\Windows\sysdiag64.exe sysdiag64.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 268 reg.exe 1740 reg.exe 1964 reg.exe 1464 reg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exepid process 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe 692 sysdiag64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.execmd.execmd.exefdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exesysdiag64.exedescription pid process target process PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1316 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1856 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe cmd.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1976 wrote to memory of 1116 1976 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1856 wrote to memory of 1740 1856 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1316 wrote to memory of 1964 1316 cmd.exe reg.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 1116 wrote to memory of 692 1116 fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe sysdiag64.exe PID 692 wrote to memory of 1700 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1700 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1700 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1700 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1504 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1504 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1504 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 1504 692 sysdiag64.exe cmd.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe PID 692 wrote to memory of 804 692 sysdiag64.exe sysdiag64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"C:\Users\Admin\AppData\Local\Temp\fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\sysdiag64.exe"C:\Windows\sysdiag64.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\sysdiag64.exe" /t REG_SZ /d "C:\Windows\sysdiag64.exe:*:Enabled:Windows Messanger" /f4⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\sysdiag64.exe" /t REG_SZ /d "C:\Windows\sysdiag64.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\sysdiag64.exe"C:\Windows\sysdiag64.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
C:\Windows\sysdiag64.exeFilesize
227KB
MD51926d5d9eb5e4354f18083916de108f0
SHA1f54ca406b5d189b19bdd2124c71660b921945cdb
SHA256fdcf081b885009ff6ae21587989410a0c861f9f2e7acd2e11a544ccc2d899020
SHA51232a58a5d68ac70f719f4fb86ed198171ae70c0f34e3d5b623722de7e407ed66caf2d19d37deb3d1590063f5bb1ae2911e4226739f0a33f9e5714479c8e7e3ae5
-
memory/268-110-0x0000000000000000-mapping.dmp
-
memory/692-107-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/692-85-0x0000000000000000-mapping.dmp
-
memory/804-116-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/804-115-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/804-114-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/804-113-0x0000000000230000-0x000000000026D000-memory.dmpFilesize
244KB
-
memory/804-102-0x000000000040AD48-mapping.dmp
-
memory/1116-65-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-63-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-72-0x000000000040AD48-mapping.dmp
-
memory/1116-75-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-112-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-111-0x00000000001C0000-0x00000000001FD000-memory.dmpFilesize
244KB
-
memory/1116-62-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-69-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-68-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-71-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1116-66-0x0000000000400000-0x0000000000473000-memory.dmpFilesize
460KB
-
memory/1316-60-0x0000000000000000-mapping.dmp
-
memory/1464-108-0x0000000000000000-mapping.dmp
-
memory/1504-90-0x0000000000000000-mapping.dmp
-
memory/1700-89-0x0000000000000000-mapping.dmp
-
memory/1740-81-0x0000000000000000-mapping.dmp
-
memory/1856-61-0x0000000000000000-mapping.dmp
-
memory/1964-82-0x0000000000000000-mapping.dmp
-
memory/1976-54-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1976-77-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/1976-80-0x00000000001C0000-0x00000000001CD000-memory.dmpFilesize
52KB
-
memory/1976-59-0x00000000001C0000-0x00000000001FD000-memory.dmpFilesize
244KB
-
memory/1976-58-0x00000000001C0000-0x00000000001FD000-memory.dmpFilesize
244KB
-
memory/1976-55-0x00000000762B1000-0x00000000762B3000-memory.dmpFilesize
8KB