Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe
Resource
win7-20220812-en
General
-
Target
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe
-
Size
130KB
-
MD5
22d8fb0fde2ec77b0a3da0a7588bfa40
-
SHA1
e76802220d01891479b64bf709fd0c2d3ec266bb
-
SHA256
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
-
SHA512
1304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
SSDEEP
3072:NYaENCs1tDKROWgPJblycavQARvZeURunoswmKK:NYaMCSqOWgP/av6U1U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\giyuhypu\\ooqhrcyl.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
gtoctexr.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" svchost.exe -
Modifies security service 2 TTPs 8 IoCs
Processes:
svchost.exegtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "4" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svchost.exe -
Processes:
svchost.exegtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtoctexr.exe -
Processes:
svchost.exegtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
gtoctexr.exegtoctexr.exepid process 1816 gtoctexr.exe 1608 gtoctexr.exe -
Drops startup file 2 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ooqhrcyl.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ooqhrcyl.exe svchost.exe -
Loads dropped DLL 4 IoCs
Processes:
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.execmd.exepid process 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe 1868 cmd.exe 1868 cmd.exe -
Processes:
gtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" gtoctexr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" gtoctexr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\OoqHrcyl = "C:\\Users\\Admin\\AppData\\Local\\giyuhypu\\ooqhrcyl.exe" svchost.exe -
Processes:
gtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtoctexr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
svchost.exegtoctexr.exepid process 1328 svchost.exe 1328 svchost.exe 1608 gtoctexr.exe 1608 gtoctexr.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exesvchost.exesvchost.exegtoctexr.exegtoctexr.exedescription pid process Token: SeSecurityPrivilege 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe Token: SeDebugPrivilege 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe Token: SeSecurityPrivilege 1992 svchost.exe Token: SeSecurityPrivilege 1328 svchost.exe Token: SeDebugPrivilege 1328 svchost.exe Token: SeDebugPrivilege 1328 svchost.exe Token: SeRestorePrivilege 1328 svchost.exe Token: SeBackupPrivilege 1328 svchost.exe Token: SeDebugPrivilege 1328 svchost.exe Token: SeSecurityPrivilege 1816 gtoctexr.exe Token: SeSecurityPrivilege 1608 gtoctexr.exe Token: SeLoadDriverPrivilege 1608 gtoctexr.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exegtoctexr.execmd.exedescription pid process target process PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1992 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1328 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe svchost.exe PID 1644 wrote to memory of 1816 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe gtoctexr.exe PID 1644 wrote to memory of 1816 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe gtoctexr.exe PID 1644 wrote to memory of 1816 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe gtoctexr.exe PID 1644 wrote to memory of 1816 1644 87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe gtoctexr.exe PID 1816 wrote to memory of 1868 1816 gtoctexr.exe cmd.exe PID 1816 wrote to memory of 1868 1816 gtoctexr.exe cmd.exe PID 1816 wrote to memory of 1868 1816 gtoctexr.exe cmd.exe PID 1816 wrote to memory of 1868 1816 gtoctexr.exe cmd.exe PID 1868 wrote to memory of 1608 1868 cmd.exe gtoctexr.exe PID 1868 wrote to memory of 1608 1868 cmd.exe gtoctexr.exe PID 1868 wrote to memory of 1608 1868 cmd.exe gtoctexr.exe PID 1868 wrote to memory of 1608 1868 cmd.exe gtoctexr.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
gtoctexr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" gtoctexr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe"C:\Users\Admin\AppData\Local\Temp\87a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\gtoctexr.exe"C:\Users\Admin\AppData\Local\Temp\gtoctexr.exe" elevate2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\gtoctexr.exe"" admin3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\gtoctexr.exe"C:\Users\Admin\AppData\Local\Temp\gtoctexr.exe" admin4⤵
- Modifies firewall policy service
- Modifies security service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
C:\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
C:\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
\Users\Admin\AppData\Local\Temp\gtoctexr.exeFilesize
130KB
MD522d8fb0fde2ec77b0a3da0a7588bfa40
SHA1e76802220d01891479b64bf709fd0c2d3ec266bb
SHA25687a42043bc478cec68bf5f181efa3de0e597ceb0c2a68e4b626d1e53e3f29b1d
SHA5121304e549ebafd89163db4e4728dab986cd100de6cf1f26e98ef6e681d2fb995c1607a58ff27a097675e8979247d0ad2a2d98a24b795f6e3a930d8188a0e4f6b4
-
memory/1328-69-0x0000000020010000-0x000000002002E000-memory.dmpFilesize
120KB
-
memory/1328-67-0x0000000000000000-mapping.dmp
-
memory/1328-65-0x0000000020010000-0x000000002002E000-memory.dmpFilesize
120KB
-
memory/1608-87-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1608-84-0x0000000000000000-mapping.dmp
-
memory/1644-77-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1644-54-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/1816-79-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1816-75-0x0000000000000000-mapping.dmp
-
memory/1868-80-0x0000000000000000-mapping.dmp
-
memory/1992-58-0x0000000000000000-mapping.dmp
-
memory/1992-59-0x0000000020010000-0x000000002001D000-memory.dmpFilesize
52KB
-
memory/1992-56-0x0000000020010000-0x000000002001D000-memory.dmpFilesize
52KB