Analysis
-
max time kernel
71s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-02-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe
Resource
win10v2004-20220812-en
General
-
Target
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe
-
Size
270KB
-
MD5
e0fa5bd634abf97f355127567eeac31b
-
SHA1
47c0a2c939ee34b004b085e16dac5e9407407078
-
SHA256
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d
-
SHA512
8acd50d5fc778479e2f52da6009f4d4ea1b2bbfa88f62dcf745a2d72f6f8ed0e14abbc1b55d4034e72494e05d68b6fe04a3dcf2d1e3360ebf063089fbe8262e4
-
SSDEEP
6144:Euk3SHEXJPSjiVJGZKZjwdFUcbZLSlHBNSem+tT9PTBHdo27Du:Ev3Sk5PSmVGKZ8CHBN1mcT9PT/
Malware Config
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\rAHsNK.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\rAHsNK.exe aspack_v212_v242 \Users\Admin\AppData\Local\Temp\rAHsNK.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\rAHsNK.exe aspack_v212_v242 -
Executes dropped EXE 1 IoCs
Processes:
rAHsNK.exepid process 1216 rAHsNK.exe -
Loads dropped DLL 2 IoCs
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exepid process 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exedescription ioc process File opened (read-only) \??\M: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\T: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\U: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\Y: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\F: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\J: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\P: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\R: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\X: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\Z: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\I: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\K: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\L: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\N: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\O: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\Q: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\S: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\W: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\B: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\G: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\H: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\V: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe File opened (read-only) \??\E: 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Drops file in Program Files directory 64 IoCs
Processes:
rAHsNK.exedescription ioc process File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe rAHsNK.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\Hearts.exe rAHsNK.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe rAHsNK.exe File opened for modification C:\Program Files\Windows Journal\PDIALOG.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateSetup.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe rAHsNK.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe rAHsNK.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmic.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jabswitch.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE rAHsNK.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe rAHsNK.exe File opened for modification C:\Program Files\7-Zip\7z.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jvisualvm.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe rAHsNK.exe File opened for modification C:\Program Files\Microsoft Office\Office14\MSOHTMED.EXE rAHsNK.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SETLANG.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE rAHsNK.exe File opened for modification C:\Program Files\7-Zip\7zG.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe rAHsNK.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstat.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jre7\bin\klist.exe rAHsNK.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe rAHsNK.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Wordconv.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe rAHsNK.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe rAHsNK.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe rAHsNK.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE rAHsNK.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe rAHsNK.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe rAHsNK.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE rAHsNK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exepid process 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exepid process 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exepid process 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exerAHsNK.exedescription pid process target process PID 1552 wrote to memory of 1216 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe rAHsNK.exe PID 1552 wrote to memory of 1216 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe rAHsNK.exe PID 1552 wrote to memory of 1216 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe rAHsNK.exe PID 1552 wrote to memory of 1216 1552 85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe rAHsNK.exe PID 1216 wrote to memory of 1708 1216 rAHsNK.exe cmd.exe PID 1216 wrote to memory of 1708 1216 rAHsNK.exe cmd.exe PID 1216 wrote to memory of 1708 1216 rAHsNK.exe cmd.exe PID 1216 wrote to memory of 1708 1216 rAHsNK.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe"C:\Users\Admin\AppData\Local\Temp\85719990f424af2c25758a1df61aeea2e0c3a3b514cb06f1a610369556a19d5d.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\rAHsNK.exeC:\Users\Admin\AppData\Local\Temp\rAHsNK.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\5ada7e15.bat" "3⤵PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5ada7e15.batFilesize
187B
MD500a09130c36c5af743c65450137eb5b3
SHA1814a04c2406bf4f4c458f4fb7c0494220d42e355
SHA256acf661505125bc71b1eeb9081f35fd0fbf75f09f9d910c8329bc7ad7503b6574
SHA5122208f1d1574451ee184a82c9a3ea9be0425dbb110af5ce147b8b698972854dcea76328c961552c2a62cc77b7bd6181d6959b3ba7306f1749a2ec7498b330847c
-
C:\Users\Admin\AppData\Local\Temp\rAHsNK.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
C:\Users\Admin\AppData\Local\Temp\rAHsNK.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\rAHsNK.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
\Users\Admin\AppData\Local\Temp\rAHsNK.exeFilesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
memory/1216-63-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB
-
memory/1216-57-0x0000000000000000-mapping.dmp
-
memory/1216-65-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB
-
memory/1552-61-0x0000000001100000-0x000000000114E000-memory.dmpFilesize
312KB
-
memory/1552-62-0x0000000000330000-0x0000000000339000-memory.dmpFilesize
36KB
-
memory/1552-54-0x0000000075681000-0x0000000075683000-memory.dmpFilesize
8KB
-
memory/1552-67-0x0000000001100000-0x000000000114E000-memory.dmpFilesize
312KB
-
memory/1708-64-0x0000000000000000-mapping.dmp