Analysis
-
max time kernel
68s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 01:03
Static task
static1
Behavioral task
behavioral1
Sample
5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
Resource
win10v2004-20221111-en
General
-
Target
5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe
-
Size
3.6MB
-
MD5
36fd273ea7607d3a203f257f4e2649ed
-
SHA1
5e243f79ecb539d0d1f75fce7ddfedeccee70a48
-
SHA256
471d501162e2a5cb6aab3f4f5362ff843d05ef9f20d9fd7ea29733d3a9875747
-
SHA512
cf81163bc6d1f1141130fbe70944387b97d322afe837ad21a88a0be8f9fd87615bd7022cc572b1783871cc99f224258bae75855e805c733793b723ba0483597d
-
SSDEEP
98304:VQF9SqUKUehGS26Ish7MUTjA+1VFnqWXvqaY4:VSSzMGS26x1MUTM+/Fh
Malware Config
Extracted
aurora
45.9.74.11:8081
Signatures
-
Detect PureCrypter injector 1 IoCs
Processes:
resource yara_rule behavioral1/memory/276-66-0x0000000006410000-0x00000000067B0000-memory.dmp family_purecrypter -
PureCrypter
PureCrypter is a .NET malware loader first seen in early 2021.
-
Executes dropped EXE 4 IoCs
Processes:
voiceadequovl.exevoiceadequovl.exevoiceadequovl.exevoiceadequovl.exepid process 840 voiceadequovl.exe 276 voiceadequovl.exe 1968 voiceadequovl.exe 1980 voiceadequovl.exe -
Loads dropped DLL 4 IoCs
Processes:
voiceadequovl.exepid process 840 voiceadequovl.exe 840 voiceadequovl.exe 840 voiceadequovl.exe 840 voiceadequovl.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
voiceadequovl.exedescription pid process target process PID 276 set thread context of 1980 276 voiceadequovl.exe voiceadequovl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exevoiceadequovl.exepid process 1524 powershell.exe 988 powershell.exe 276 voiceadequovl.exe 276 voiceadequovl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
voiceadequovl.exepowershell.exepowershell.exewmic.exeWMIC.exedescription pid process Token: SeDebugPrivilege 276 voiceadequovl.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeDebugPrivilege 988 powershell.exe Token: SeIncreaseQuotaPrivilege 876 wmic.exe Token: SeSecurityPrivilege 876 wmic.exe Token: SeTakeOwnershipPrivilege 876 wmic.exe Token: SeLoadDriverPrivilege 876 wmic.exe Token: SeSystemProfilePrivilege 876 wmic.exe Token: SeSystemtimePrivilege 876 wmic.exe Token: SeProfSingleProcessPrivilege 876 wmic.exe Token: SeIncBasePriorityPrivilege 876 wmic.exe Token: SeCreatePagefilePrivilege 876 wmic.exe Token: SeBackupPrivilege 876 wmic.exe Token: SeRestorePrivilege 876 wmic.exe Token: SeShutdownPrivilege 876 wmic.exe Token: SeDebugPrivilege 876 wmic.exe Token: SeSystemEnvironmentPrivilege 876 wmic.exe Token: SeRemoteShutdownPrivilege 876 wmic.exe Token: SeUndockPrivilege 876 wmic.exe Token: SeManageVolumePrivilege 876 wmic.exe Token: 33 876 wmic.exe Token: 34 876 wmic.exe Token: 35 876 wmic.exe Token: SeIncreaseQuotaPrivilege 876 wmic.exe Token: SeSecurityPrivilege 876 wmic.exe Token: SeTakeOwnershipPrivilege 876 wmic.exe Token: SeLoadDriverPrivilege 876 wmic.exe Token: SeSystemProfilePrivilege 876 wmic.exe Token: SeSystemtimePrivilege 876 wmic.exe Token: SeProfSingleProcessPrivilege 876 wmic.exe Token: SeIncBasePriorityPrivilege 876 wmic.exe Token: SeCreatePagefilePrivilege 876 wmic.exe Token: SeBackupPrivilege 876 wmic.exe Token: SeRestorePrivilege 876 wmic.exe Token: SeShutdownPrivilege 876 wmic.exe Token: SeDebugPrivilege 876 wmic.exe Token: SeSystemEnvironmentPrivilege 876 wmic.exe Token: SeRemoteShutdownPrivilege 876 wmic.exe Token: SeUndockPrivilege 876 wmic.exe Token: SeManageVolumePrivilege 876 wmic.exe Token: 33 876 wmic.exe Token: 34 876 wmic.exe Token: 35 876 wmic.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe Token: SeSecurityPrivilege 1128 WMIC.exe Token: SeTakeOwnershipPrivilege 1128 WMIC.exe Token: SeLoadDriverPrivilege 1128 WMIC.exe Token: SeSystemProfilePrivilege 1128 WMIC.exe Token: SeSystemtimePrivilege 1128 WMIC.exe Token: SeProfSingleProcessPrivilege 1128 WMIC.exe Token: SeIncBasePriorityPrivilege 1128 WMIC.exe Token: SeCreatePagefilePrivilege 1128 WMIC.exe Token: SeBackupPrivilege 1128 WMIC.exe Token: SeRestorePrivilege 1128 WMIC.exe Token: SeShutdownPrivilege 1128 WMIC.exe Token: SeDebugPrivilege 1128 WMIC.exe Token: SeSystemEnvironmentPrivilege 1128 WMIC.exe Token: SeRemoteShutdownPrivilege 1128 WMIC.exe Token: SeUndockPrivilege 1128 WMIC.exe Token: SeManageVolumePrivilege 1128 WMIC.exe Token: 33 1128 WMIC.exe Token: 34 1128 WMIC.exe Token: 35 1128 WMIC.exe Token: SeIncreaseQuotaPrivilege 1128 WMIC.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exevoiceadequovl.exevoiceadequovl.execmd.exevoiceadequovl.execmd.execmd.exedescription pid process target process PID 860 wrote to memory of 840 860 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe voiceadequovl.exe PID 860 wrote to memory of 840 860 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe voiceadequovl.exe PID 860 wrote to memory of 840 860 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe voiceadequovl.exe PID 860 wrote to memory of 840 860 5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe voiceadequovl.exe PID 840 wrote to memory of 276 840 voiceadequovl.exe voiceadequovl.exe PID 840 wrote to memory of 276 840 voiceadequovl.exe voiceadequovl.exe PID 840 wrote to memory of 276 840 voiceadequovl.exe voiceadequovl.exe PID 840 wrote to memory of 276 840 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1524 276 voiceadequovl.exe powershell.exe PID 276 wrote to memory of 1524 276 voiceadequovl.exe powershell.exe PID 276 wrote to memory of 1524 276 voiceadequovl.exe powershell.exe PID 276 wrote to memory of 1524 276 voiceadequovl.exe powershell.exe PID 276 wrote to memory of 1512 276 voiceadequovl.exe cmd.exe PID 276 wrote to memory of 1512 276 voiceadequovl.exe cmd.exe PID 276 wrote to memory of 1512 276 voiceadequovl.exe cmd.exe PID 276 wrote to memory of 1512 276 voiceadequovl.exe cmd.exe PID 1512 wrote to memory of 988 1512 cmd.exe powershell.exe PID 1512 wrote to memory of 988 1512 cmd.exe powershell.exe PID 1512 wrote to memory of 988 1512 cmd.exe powershell.exe PID 1512 wrote to memory of 988 1512 cmd.exe powershell.exe PID 276 wrote to memory of 1968 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1968 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1968 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1968 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 276 wrote to memory of 1980 276 voiceadequovl.exe voiceadequovl.exe PID 1980 wrote to memory of 876 1980 voiceadequovl.exe wmic.exe PID 1980 wrote to memory of 876 1980 voiceadequovl.exe wmic.exe PID 1980 wrote to memory of 876 1980 voiceadequovl.exe wmic.exe PID 1980 wrote to memory of 876 1980 voiceadequovl.exe wmic.exe PID 1980 wrote to memory of 1892 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1892 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1892 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1892 1980 voiceadequovl.exe cmd.exe PID 1892 wrote to memory of 2004 1892 cmd.exe WMIC.exe PID 1892 wrote to memory of 2004 1892 cmd.exe WMIC.exe PID 1892 wrote to memory of 2004 1892 cmd.exe WMIC.exe PID 1892 wrote to memory of 2004 1892 cmd.exe WMIC.exe PID 1980 wrote to memory of 1744 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1744 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1744 1980 voiceadequovl.exe cmd.exe PID 1980 wrote to memory of 1744 1980 voiceadequovl.exe cmd.exe PID 1744 wrote to memory of 1128 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1128 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1128 1744 cmd.exe WMIC.exe PID 1744 wrote to memory of 1128 1744 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"C:\Users\Admin\AppData\Local\Temp\5e243f79ecb539d0d1f75fce7ddfedeccee70a48.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeC:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeC:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name6⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exeFilesize
147.7MB
MD551105c756b27962310a292f5d9b3e9b2
SHA189c236f3e8105b4a4b78f19618b9017f7ba82d8c
SHA2564e776d518df2553c051229bf982929a5f4df68a9dbe19ee6f1336b899fb540df
SHA512c49046342bf29b9dffab0c757fc42921f1f3bc939ca3351a0606f27d7caa3927a0a1ab67c45c20d45db5be2532b198264a1a5b69e6fc23e0ce5b8f4a0afe5107
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\voiceadequovl.exeFilesize
147.6MB
MD5e341a6ce51fcdf4fffe3ae37d4ed65f0
SHA12121b6c2be173c8a4a5bea8c2dfd210f7f562468
SHA2566bb8c5f13381d37ba84ac6aed5d33ea39794610b0d31641cc73fe9486b456acb
SHA512ee4c6d2c0b9e9a4cd9585e953b744fad86fd7b34566cb7eb492e660ee1c1b38bbefd9dd30520c1585be2cdd988b52575d5bb8e3067e6204a9521d2682369d863
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD534047cb0c7d778eeb417628c9530fd6c
SHA1d7c84657b6648d226c259c46a72606e59f596a5c
SHA25611d1eda337724ffef73afb86e40580b965e5c5e258c0bdceb999dfbf500658e4
SHA5124701739074715842f3236baa542d5bc4b64a3836be205b983460058ff0943c855c8fe4bc959eac8047471126cfb834540104d88131d02f1ff4608939017db265
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
142.1MB
MD5fba176145f59b1d0ba0a6f3119a70dee
SHA1679baa19d26de5cea55291311c6c223cbb0dd084
SHA256243b94ef037b7d9e12c30765f7e6063a883db29d1715acc95fd71cda652595ee
SHA51217337efcd91bb325532f72cf424a48de9e562ec7e3df012128bff017ca19e01b75dc54cce807de1007d0476ea0a236a67176c6d157ea9cd2e78a38dd81eeef55
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
138.3MB
MD506926bed73a888d263ae6fa8fe45b6f2
SHA166a6d722ce640e22740e4e66bf065bcab5d3c52f
SHA2561a58a0e8bf14d9d364ff62202c4429b7ea227621f8697c5fc3e322e42179087f
SHA512af7a84d08f4bc2faf4ec2bd09920c0f992c56b078e365805a2cb7185a241fe88f2a9f27acd81eeb90dc6cbc1fde276d8fb0e2ef711077f2b10afdedf7d866255
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
96.6MB
MD5aa4137f9a1532fa3f733337f6960c8bd
SHA1ce624fd6f8e1bdc0ac89d60b8cc945bf0201c342
SHA256467375ec2d7f6bf36f99e82164931e9a40592f69c829ec73c9bed8d0ebb1d83e
SHA5122adcfa88da4639f75e53b43d68714fa3f1dc37c77ebe0d81c74937941863957711dc4adc30c23ce76109c62a7ed63beb71613cab1f7d63c5f6fee866f6255101
-
C:\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
91.8MB
MD5a617210bbe00d6ad341afa8c462766d6
SHA117697fce863a8d681e24e43ef42a7b4d8e763054
SHA2565a44f8f76292dbc45b21649754721dedfe41feed31e94c8e9a9fbde151184620
SHA512ba9e0320995954b12b1e7bdaf3451089808ac8a1efc580e2358ce32fe119040f1718d6da28ea8026cc7d78a3231a93b187322cb93d4abe6b4f687de4e1b8c9af
-
\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
143.1MB
MD575e4c54c8d3c786616a310647b4b2a49
SHA1f853bcece3f5bf50cdf63121798ed95694affd6d
SHA256ab03dfa47cb22d372c467f31bb959f117f2d3995f6ae45e1b773d58541653b8e
SHA51225f063f9b2de4eb2a244218837356dd619e9b540d92a7cc285d560cffe5d818e9cbcbf03f3dbd9f767cef28d73740f428c5e2c82cb84c4105bee0898ee6b11e3
-
\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
143.1MB
MD5c722f4e31e922b0f130f5651f6222d91
SHA10fa7b29badcefdc7c22d0d6412fad8794d134f21
SHA25654ac7f6ecc8ca0f60a67393b495b426492d9e5ca12bbb54a7cf21f428c8b5b76
SHA512c97cbd009748593bb618767685a0450d05fe7c2e8a0988c2ff3e936c0441c6c4252b0687c8221ffaf7ab03dc6f73f96b9e37d2e57ed234cb42a835fc009397fa
-
\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
139.9MB
MD56e7ab49cbacb4b44edfc7e9e425987fd
SHA148afb1233d9d88207ec2f3e713a8eeab33c7ccf1
SHA256149f7efd15f0ad87aee80addde21f60cc6f9a01ffa07da08b964f0c1d27d6d2e
SHA51213955b0da966f3093118c9ee04eedaf6ff598f5e9fccde5207d8556cc5ea52ec6ea91e49db1ee7a252536a947b344db2258f62b11da1029dba73fe0a1feda3bb
-
\Users\Admin\AppData\Roaming\Voice\voiceadequovl.exeFilesize
141.6MB
MD59f7a8c9dbb4aa0c6160db8beae073c91
SHA10840049f0f6e21d0cab897a8a9ee299b90d188e2
SHA256c278b7f1979686050b16d53070e1adb821b8cf8bc99628b89b57cb3f9fd522b3
SHA512519978498df0ef2934a1a469ecabb377fe6acdb5db376d14e21378ace505742fc0751ddda204f5ede1bd358ee3958a29ede37390a106668db236c13f9b2c97d0
-
memory/276-76-0x0000000005380000-0x00000000054F2000-memory.dmpFilesize
1.4MB
-
memory/276-65-0x00000000011B0000-0x0000000001924000-memory.dmpFilesize
7.5MB
-
memory/276-66-0x0000000006410000-0x00000000067B0000-memory.dmpFilesize
3.6MB
-
memory/276-62-0x0000000000000000-mapping.dmp
-
memory/840-54-0x0000000000000000-mapping.dmp
-
memory/840-56-0x0000000074DE1000-0x0000000074DE3000-memory.dmpFilesize
8KB
-
memory/876-97-0x0000000000000000-mapping.dmp
-
memory/988-77-0x000000006F2C0000-0x000000006F86B000-memory.dmpFilesize
5.7MB
-
memory/988-73-0x0000000000000000-mapping.dmp
-
memory/988-80-0x000000006F2C0000-0x000000006F86B000-memory.dmpFilesize
5.7MB
-
memory/1128-101-0x0000000000000000-mapping.dmp
-
memory/1512-72-0x0000000000000000-mapping.dmp
-
memory/1524-67-0x0000000000000000-mapping.dmp
-
memory/1524-69-0x000000006F530000-0x000000006FADB000-memory.dmpFilesize
5.7MB
-
memory/1524-70-0x000000006F530000-0x000000006FADB000-memory.dmpFilesize
5.7MB
-
memory/1524-71-0x000000006F530000-0x000000006FADB000-memory.dmpFilesize
5.7MB
-
memory/1744-100-0x0000000000000000-mapping.dmp
-
memory/1892-98-0x0000000000000000-mapping.dmp
-
memory/1980-87-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-90-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-91-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-92-0x0000000000464C20-mapping.dmp
-
memory/1980-88-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-95-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-96-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-85-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-83-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-81-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-79-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/1980-102-0x0000000000400000-0x0000000000731000-memory.dmpFilesize
3.2MB
-
memory/2004-99-0x0000000000000000-mapping.dmp