Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 15:08
Static task
static1
Behavioral task
behavioral1
Sample
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe
Resource
win7-20230220-en
General
-
Target
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe
-
Size
657KB
-
MD5
0d0823d9a5d000b80e27090754f59ee5
-
SHA1
b1f495b707ffaf53188c13f19a487dd94e7a0735
-
SHA256
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891
-
SHA512
52a4ae72e2685a6b6d274388b636fe63d96e5545475e521e9e250d56d4593657061502f00c6b90f5e54d05a63a9301509852804b9d705307c03f8fff739d3964
-
SSDEEP
12288:JOSdwPgM57sv8ZqMM+ARd9rFk1S4e/NZS3peecnysPoBicrOl:JOSa2EZqeIPMelY3Cypicr
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1960 cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\diablo6.bmp" 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe -
Modifies Control Panel 2 IoCs
Processes:
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Control Panel\Desktop\TileWallpaper = "0" 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Control Panel\Desktop\WallpaperStyle = "0" 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3980C551-C1B1-11ED-85BE-D2C9D0B8F522} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000d7ac6d0ddcf130794238a3c916a10042bc6b6d2c29cac65767e27f7ddadfc733000000000e8000000002000020000000f60afd2ce987df5553db80a905cbb5aabf38f485965f46c5a60a9555c68b2ec890000000b1ebb82a793d8bd16edb2f53f101d2a009c7fa7860d8a35a07fc032800ffc2ad55c242646d98cc7d556838401cbc94fa32eb13a24b1a4b9cbee7ce58bffacc7bbf6637b8bc088eb5750c1bbf2f08cb46dcbe93a741ebba92d05fa56b4e53230d62101576a2cdcd19babb01cb3d96911be798bb77f599973fe599cd9179b84d5359b909ae90f3de902da6771a2fd493e740000000baf2182f74068ecfbbab890c4db7b20604ba38ae4a6279a3f6c001c50fdddb24a0be3218f52682ac5de1df7a473abaed1529bc89a56b02a88c3b41848db93fbe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006e8f12fa8cd8fd499ff2c01df6bc8a3c00000000020000000000106600000001000020000000df225222e7b4ad1c13fb9e2be2787f53c661f0976a994c2a709bc501669d56ac000000000e80000000020000200000009c01cb25f5fbc48db84bd25989865be390d54195961c5088feeecd3e83608a7c20000000af46ff5ded1a3ad3018485d84836808ed52c040f220462b45df9b7aac1b13f8d400000003cebd6e59ae68d3bd7d225041e104b3d1a70e7d0b6f1020db66abf3c769f7791f10c234133e1557c7d1b588d2a79b5e0a48f2e15d41da77becea0c62a17c93ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10180b10be55d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 900 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 900 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe 900 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1172 iexplore.exe 1172 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exeiexplore.exedescription pid process target process PID 1440 wrote to memory of 1172 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe iexplore.exe PID 1440 wrote to memory of 1172 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe iexplore.exe PID 1440 wrote to memory of 1172 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe iexplore.exe PID 1440 wrote to memory of 1172 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe iexplore.exe PID 1172 wrote to memory of 1528 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 1528 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 1528 1172 iexplore.exe IEXPLORE.EXE PID 1172 wrote to memory of 1528 1172 iexplore.exe IEXPLORE.EXE PID 1440 wrote to memory of 1960 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe cmd.exe PID 1440 wrote to memory of 1960 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe cmd.exe PID 1440 wrote to memory of 1960 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe cmd.exe PID 1440 wrote to memory of 1960 1440 390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe"C:\Users\Admin\AppData\Local\Temp\390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe"1⤵
- Sets desktop wallpaper using registry
- Enumerates system info in registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\diablo6.htm2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\390ed1dde4ff03adfcf67c59ee02567ac5665bb5e029eaebf0332bc81e4d1891.exe"2⤵
- Deletes itself
PID:1960
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:900
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵PID:1480
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\CabEFB0.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\KnoDA0B.tmpFilesize
3B
MD58a80554c91d9fca8acb82f023de02f11
SHA15f36b2ea290645ee34d943220a14b54ee5ea5be5
SHA256ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
SHA512ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a
-
C:\Users\Admin\Desktop\diablo6.bmpFilesize
3.4MB
MD5f55452727442833efb709d8290596864
SHA11b1892fee017a6ce08c9043efeb2df595c529ddd
SHA2563e1a599e34f1b946f8954b21c92a354a424d0074be283b089dbb832a2df419b6
SHA512278144eeba2147bbbcc90ee2b380dedae32a8a4a26cab8e16a6fac6357c17cf0c6b4b53b16ba3536cd24e746013573149830dd0d67666131d480bd068e26ff24
-
C:\Users\Admin\Desktop\diablo6.htmFilesize
8KB
MD5f058d461f49b7407dd7d8aa57ee9890a
SHA141bfb566b084fe42d10cb577af2e7498cdb10126
SHA2567a8195f235df50cb2d86e8958edb8e304069c807e58644cb5a9cab0dd2b6f4c8
SHA512b7ece8dbfa99e542d46ecf1623411ff3c34d0af8352afb03a389cac4b406f8370b9ff9ac2a560ffedf6f3a432a99257a87d4eb7dbc0ff705f31e170e2dbc159e
-
C:\Users\Default\diablo6-303c.htmFilesize
8KB
MD5f058d461f49b7407dd7d8aa57ee9890a
SHA141bfb566b084fe42d10cb577af2e7498cdb10126
SHA2567a8195f235df50cb2d86e8958edb8e304069c807e58644cb5a9cab0dd2b6f4c8
SHA512b7ece8dbfa99e542d46ecf1623411ff3c34d0af8352afb03a389cac4b406f8370b9ff9ac2a560ffedf6f3a432a99257a87d4eb7dbc0ff705f31e170e2dbc159e
-
memory/900-54-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1440-58-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/1440-178-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1440-352-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1440-353-0x0000000003400000-0x0000000003402000-memory.dmpFilesize
8KB
-
memory/1440-355-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1440-59-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1440-57-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1440-55-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1440-56-0x0000000000400000-0x00000000004A7000-memory.dmpFilesize
668KB
-
memory/1480-354-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1480-357-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB
-
memory/1480-383-0x00000000004E0000-0x00000000004E1000-memory.dmpFilesize
4KB