Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:33
Static task
static1
Behavioral task
behavioral1
Sample
74fa49f60a92b46d4a75f63167e62a12.exe
Resource
win7-20231129-en
General
-
Target
74fa49f60a92b46d4a75f63167e62a12.exe
-
Size
431KB
-
MD5
74fa49f60a92b46d4a75f63167e62a12
-
SHA1
f2bb1d660002e095e8026981ea31f872f1535bc9
-
SHA256
f687f07fb4757f2a43560c7e02e5aaa12f8e50c7ecb4d38a27307d87b8167f8d
-
SHA512
3fd3b151671cd51cb522f2afbbdb5137525905a85169576abfbf0c8b5880326afa57f51ee272a281474911b593b8e360c62652c30c48942099485fe6b15bb31b
-
SSDEEP
12288:hN1ASkD/alY8pAEoknoa8KOIT/QBD7Hv6dtb3Uj1:lASEC9pAEoA58BD+dtm1
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
Processes:
tcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exepid process 2584 tcpip.exe 1704 tcpip.exe 2012 tcpip.exe 1396 tcpip.exe 2068 tcpip.exe 2632 tcpip.exe 2212 tcpip.exe 1540 tcpip.exe 1980 tcpip.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
tcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exe74fa49f60a92b46d4a75f63167e62a12.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine tcpip.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine 74fa49f60a92b46d4a75f63167e62a12.exe -
Loads dropped DLL 18 IoCs
Processes:
74fa49f60a92b46d4a75f63167e62a12.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exepid process 2932 74fa49f60a92b46d4a75f63167e62a12.exe 2932 74fa49f60a92b46d4a75f63167e62a12.exe 2584 tcpip.exe 2584 tcpip.exe 1704 tcpip.exe 1704 tcpip.exe 2012 tcpip.exe 2012 tcpip.exe 1396 tcpip.exe 1396 tcpip.exe 2068 tcpip.exe 2068 tcpip.exe 2632 tcpip.exe 2632 tcpip.exe 2212 tcpip.exe 2212 tcpip.exe 1540 tcpip.exe 1540 tcpip.exe -
Drops file in System32 directory 18 IoCs
Processes:
tcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exe74fa49f60a92b46d4a75f63167e62a12.exedescription ioc process File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe tcpip.exe File created C:\Windows\SysWOW64\tcpip.exe 74fa49f60a92b46d4a75f63167e62a12.exe File opened for modification C:\Windows\SysWOW64\tcpip.exe 74fa49f60a92b46d4a75f63167e62a12.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
74fa49f60a92b46d4a75f63167e62a12.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exetcpip.exedescription pid process target process PID 2932 wrote to memory of 2584 2932 74fa49f60a92b46d4a75f63167e62a12.exe tcpip.exe PID 2932 wrote to memory of 2584 2932 74fa49f60a92b46d4a75f63167e62a12.exe tcpip.exe PID 2932 wrote to memory of 2584 2932 74fa49f60a92b46d4a75f63167e62a12.exe tcpip.exe PID 2932 wrote to memory of 2584 2932 74fa49f60a92b46d4a75f63167e62a12.exe tcpip.exe PID 2584 wrote to memory of 1704 2584 tcpip.exe tcpip.exe PID 2584 wrote to memory of 1704 2584 tcpip.exe tcpip.exe PID 2584 wrote to memory of 1704 2584 tcpip.exe tcpip.exe PID 2584 wrote to memory of 1704 2584 tcpip.exe tcpip.exe PID 1704 wrote to memory of 2012 1704 tcpip.exe tcpip.exe PID 1704 wrote to memory of 2012 1704 tcpip.exe tcpip.exe PID 1704 wrote to memory of 2012 1704 tcpip.exe tcpip.exe PID 1704 wrote to memory of 2012 1704 tcpip.exe tcpip.exe PID 2012 wrote to memory of 1396 2012 tcpip.exe tcpip.exe PID 2012 wrote to memory of 1396 2012 tcpip.exe tcpip.exe PID 2012 wrote to memory of 1396 2012 tcpip.exe tcpip.exe PID 2012 wrote to memory of 1396 2012 tcpip.exe tcpip.exe PID 1396 wrote to memory of 2068 1396 tcpip.exe tcpip.exe PID 1396 wrote to memory of 2068 1396 tcpip.exe tcpip.exe PID 1396 wrote to memory of 2068 1396 tcpip.exe tcpip.exe PID 1396 wrote to memory of 2068 1396 tcpip.exe tcpip.exe PID 2068 wrote to memory of 2632 2068 tcpip.exe tcpip.exe PID 2068 wrote to memory of 2632 2068 tcpip.exe tcpip.exe PID 2068 wrote to memory of 2632 2068 tcpip.exe tcpip.exe PID 2068 wrote to memory of 2632 2068 tcpip.exe tcpip.exe PID 2632 wrote to memory of 2212 2632 tcpip.exe tcpip.exe PID 2632 wrote to memory of 2212 2632 tcpip.exe tcpip.exe PID 2632 wrote to memory of 2212 2632 tcpip.exe tcpip.exe PID 2632 wrote to memory of 2212 2632 tcpip.exe tcpip.exe PID 2212 wrote to memory of 1540 2212 tcpip.exe tcpip.exe PID 2212 wrote to memory of 1540 2212 tcpip.exe tcpip.exe PID 2212 wrote to memory of 1540 2212 tcpip.exe tcpip.exe PID 2212 wrote to memory of 1540 2212 tcpip.exe tcpip.exe PID 1540 wrote to memory of 1980 1540 tcpip.exe tcpip.exe PID 1540 wrote to memory of 1980 1540 tcpip.exe tcpip.exe PID 1540 wrote to memory of 1980 1540 tcpip.exe tcpip.exe PID 1540 wrote to memory of 1980 1540 tcpip.exe tcpip.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74fa49f60a92b46d4a75f63167e62a12.exe"C:\Users\Admin\AppData\Local\Temp\74fa49f60a92b46d4a75f63167e62a12.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 652 "C:\Users\Admin\AppData\Local\Temp\74fa49f60a92b46d4a75f63167e62a12.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 704 "C:\Windows\SysWOW64\tcpip.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 696 "C:\Windows\SysWOW64\tcpip.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 700 "C:\Windows\SysWOW64\tcpip.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 692 "C:\Windows\SysWOW64\tcpip.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 720 "C:\Windows\SysWOW64\tcpip.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 712 "C:\Windows\SysWOW64\tcpip.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 716 "C:\Windows\SysWOW64\tcpip.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 708 "C:\Windows\SysWOW64\tcpip.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1980 -
C:\Windows\SysWOW64\tcpip.exeC:\Windows\system32\tcpip.exe 724 "C:\Windows\SysWOW64\tcpip.exe"11⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\tcpip.exeFilesize
67KB
MD584514f42d6bf0535a9866d8d986df5be
SHA197db297835bc65b96014a2d6e060572543c6588b
SHA2565e61722bcb97241a213ad360e24d765b547c555763029d90d8a57d6a486e7ee9
SHA512c87e2dc72e521fa9704e90cebae1776eb450fee58ea67e5ac3442800d2b2724ba015de10ed00f6358dca0e4c4bf018151d89379d4db2dfe489f028ade97f0323
-
C:\Windows\SysWOW64\tcpip.exeFilesize
168KB
MD57146727055d2904e0973775be0871b35
SHA1f46fa308244aa15369a25e2d02ce7e32cd711ae7
SHA256a574319af94966b237a0d5cb76d199524bc404474f47d48fb91f0c66897cf426
SHA5128a49749ca67cf413e24f9c99329c1707395f4263b6ee0cf2e1654f3a748bcde91d14557eb138d1c0a57afd57af562327aea368d06f27231b4c351d7ed4737de2
-
C:\Windows\SysWOW64\tcpip.exeFilesize
347KB
MD51e3103b5f8a584b1ea0c0595d7d5d877
SHA12845de8cab566a00d3929c0dfeda1aed71bfb182
SHA2569cd20abbb462bc1092c9e5fe8b14d6dadc1dd01f4ef189ae0b65caa0a52af440
SHA512ab6c8924191aa50f2a727d4a05ec73a48595a966064b175f25ff4eae27ebb0226980558e21452f49e1e8b1ed9d2b87678d650fe498146939c4d06099778d1235
-
C:\Windows\SysWOW64\tcpip.exeFilesize
431KB
MD574fa49f60a92b46d4a75f63167e62a12
SHA1f2bb1d660002e095e8026981ea31f872f1535bc9
SHA256f687f07fb4757f2a43560c7e02e5aaa12f8e50c7ecb4d38a27307d87b8167f8d
SHA5123fd3b151671cd51cb522f2afbbdb5137525905a85169576abfbf0c8b5880326afa57f51ee272a281474911b593b8e360c62652c30c48942099485fe6b15bb31b
-
\Windows\SysWOW64\tcpip.exeFilesize
99KB
MD560ad12795161ffdbd4be8192f92cb1b5
SHA1c15d3a6dd57ea599210605e10923b2445bab90ec
SHA256ac600706bff61c99955ffec5a2d4e9f55bd429e7a89dc2a6fdb2c690abb1f5f9
SHA512c6181477b9bb46e26100f726980cdcd489d2f9b4b8d78b30a3d3f066d9a7985a5f134cb1de3b17583eb435dbbb59deee273415a47bf6a752760427e6e9263ddc
-
\Windows\SysWOW64\tcpip.exeFilesize
100KB
MD52db34b5063dcae5ba28ac0cd20e63c96
SHA100754e66265284e8e943752955940a4018b214e7
SHA256e87656a5395c20f612c3aca0ad1977ba7aa005ae382117a748dcf0ebd8643d6b
SHA51201f5345515b9940afea7213506c84bf5d4deb27fddc35cfa5a0f047baea5e1836fc1d7daea543b9082bc50a275e83b58797aa890458d5938679804e34fcf30af
-
\Windows\SysWOW64\tcpip.exeFilesize
179KB
MD5e5dc35d860870eee45ce10ea8fdb6c55
SHA1e0a504b6112367f62edd4d897d015d172c2610cb
SHA2567612b7bfb5e4bde08aabb7ee78cfeb03e5810309148f49e9db9016a5a9a7ca81
SHA512a65a7632ef273d4f0263e52a8d5ea89b84b62a51f9a93e8fcc8ea697d71a20cf26a3156c7ced14401ff6e1e6edf25a6a2a8dc92cdbc6bd6015030d2b6cf582a6
-
\Windows\SysWOW64\tcpip.exeFilesize
172KB
MD56045faa855eaa0d7790dd6b6f95fafef
SHA1d8da0ba0d096eafd50005fd9e4f36b77753095dc
SHA256d51b0aeb0923b644985692ddea1e7ce10d7b708deaff3a2234aaa8e0d6da59f6
SHA512c41d49bf600ca7fb28749df13bddd958d468b366fbc27531fe8b251867daded12db4576eceb2bf85a72b74d0918df03d1b4aa20fde0ca807df7788655b25d744
-
\Windows\SysWOW64\tcpip.exeFilesize
45KB
MD5b83c5da3613a566ec7cd04e5899893c4
SHA1110852b058995ba9ea48b3704d2cd2f712426132
SHA2567d0982d3afe4bcdf5e0a8c0d0dd5aaac5913bc72f5f262437785997d066a9f87
SHA512618fcc561b65a315c1b09f3028efaa3d99bd052f41fe8e061f53c0e185c4d1feb1650a4dd638f712512f2dbbd74161f76d0eb7cb063d790e5a08eac2a6e89aa1
-
\Windows\SysWOW64\tcpip.exeFilesize
409KB
MD57d7da71f7c40acc9363edc3cebdeb0c0
SHA1fa0a48c2e0425be4c6a57d9fe6e48f3e2597cc55
SHA256703b212a8ebb06300cee98c6a014f20dec0b0cadcc1e32e86118c2acbb46a9dc
SHA512fc313ae287b88a18802fb2da2dc2b4d8c9d08747018f17e198d6845005b76bedf6393104a8209cb341d7638637dfd7117d7f35a7f5a139505cac4ae76e529474
-
\Windows\SysWOW64\tcpip.exeFilesize
309KB
MD500ed0131f17079b953ea5405946ab683
SHA188aa01065d2a4dce55ffbb3c507bdad1bb68e8d2
SHA2569e64cb1aaab650a39000f0f7a8d9055d6f97951a3d2d5bfa3836764558a6ecbc
SHA51213fc1a224e06d8f563d7cfb1027a5a71a1b448192fcf1eee92b2a4876b97a130a2c087dc6d4dc699968f5b2267402969807f2552e7da30b5c0ae69828209a96c
-
memory/976-249-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1396-114-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1540-205-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1704-73-0x0000000004660000-0x00000000047AD000-memory.dmpFilesize
1.3MB
-
memory/1704-66-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/1704-50-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1704-72-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1704-68-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1704-52-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/1704-53-0x0000000003D00000-0x0000000003D02000-memory.dmpFilesize
8KB
-
memory/1704-54-0x0000000003C60000-0x0000000003C61000-memory.dmpFilesize
4KB
-
memory/1704-67-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB
-
memory/1704-64-0x0000000003CA0000-0x0000000003CA2000-memory.dmpFilesize
8KB
-
memory/1704-55-0x0000000003CF0000-0x0000000003CF1000-memory.dmpFilesize
4KB
-
memory/1704-56-0x0000000003D20000-0x0000000003D21000-memory.dmpFilesize
4KB
-
memory/1704-57-0x0000000003D30000-0x0000000003D31000-memory.dmpFilesize
4KB
-
memory/1704-58-0x0000000003BF0000-0x0000000003BF1000-memory.dmpFilesize
4KB
-
memory/1704-59-0x0000000003C10000-0x0000000003C11000-memory.dmpFilesize
4KB
-
memory/1704-60-0x0000000003C00000-0x0000000003C01000-memory.dmpFilesize
4KB
-
memory/1704-61-0x0000000001F90000-0x0000000001F91000-memory.dmpFilesize
4KB
-
memory/1704-62-0x0000000003C40000-0x0000000003C41000-memory.dmpFilesize
4KB
-
memory/1704-63-0x0000000003C20000-0x0000000003C21000-memory.dmpFilesize
4KB
-
memory/1980-228-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2012-80-0x0000000003D40000-0x0000000003D41000-memory.dmpFilesize
4KB
-
memory/2012-77-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB
-
memory/2012-84-0x0000000003BE0000-0x0000000003BE1000-memory.dmpFilesize
4KB
-
memory/2012-83-0x0000000003C10000-0x0000000003C11000-memory.dmpFilesize
4KB
-
memory/2012-91-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2012-75-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2012-76-0x0000000003D20000-0x0000000003D22000-memory.dmpFilesize
8KB
-
memory/2012-74-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2012-78-0x0000000003D10000-0x0000000003D11000-memory.dmpFilesize
4KB
-
memory/2012-79-0x0000000003D50000-0x0000000003D51000-memory.dmpFilesize
4KB
-
memory/2012-81-0x0000000003C00000-0x0000000003C01000-memory.dmpFilesize
4KB
-
memory/2012-82-0x0000000003C20000-0x0000000003C21000-memory.dmpFilesize
4KB
-
memory/2068-137-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2212-183-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2584-30-0x0000000003C70000-0x0000000003C71000-memory.dmpFilesize
4KB
-
memory/2584-39-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/2584-33-0x0000000003D40000-0x0000000003D41000-memory.dmpFilesize
4KB
-
memory/2584-34-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2584-35-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/2584-36-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/2584-51-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2584-37-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2584-38-0x00000000005F0000-0x00000000005F1000-memory.dmpFilesize
4KB
-
memory/2584-46-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2584-31-0x0000000003CC0000-0x0000000003CC1000-memory.dmpFilesize
4KB
-
memory/2584-28-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2584-29-0x0000000003CD0000-0x0000000003CD2000-memory.dmpFilesize
8KB
-
memory/2584-27-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2584-41-0x0000000003CB0000-0x0000000003CB2000-memory.dmpFilesize
8KB
-
memory/2584-40-0x0000000003C30000-0x0000000003C31000-memory.dmpFilesize
4KB
-
memory/2584-45-0x0000000003C80000-0x0000000003C81000-memory.dmpFilesize
4KB
-
memory/2584-44-0x0000000003C60000-0x0000000003C61000-memory.dmpFilesize
4KB
-
memory/2584-32-0x0000000003D30000-0x0000000003D31000-memory.dmpFilesize
4KB
-
memory/2632-160-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2932-6-0x0000000003D20000-0x0000000003D21000-memory.dmpFilesize
4KB
-
memory/2932-4-0x0000000003CA0000-0x0000000003CA1000-memory.dmpFilesize
4KB
-
memory/2932-43-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2932-5-0x0000000003D10000-0x0000000003D11000-memory.dmpFilesize
4KB
-
memory/2932-7-0x0000000003BF0000-0x0000000003BF1000-memory.dmpFilesize
4KB
-
memory/2932-8-0x0000000003C10000-0x0000000003C11000-memory.dmpFilesize
4KB
-
memory/2932-9-0x0000000003C00000-0x0000000003C01000-memory.dmpFilesize
4KB
-
memory/2932-0-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB
-
memory/2932-2-0x0000000003CF0000-0x0000000003CF2000-memory.dmpFilesize
8KB
-
memory/2932-10-0x0000000003BE0000-0x0000000003BE1000-memory.dmpFilesize
4KB
-
memory/2932-3-0x0000000003C50000-0x0000000003C51000-memory.dmpFilesize
4KB
-
memory/2932-26-0x0000000004600000-0x000000000474D000-memory.dmpFilesize
1.3MB
-
memory/2932-11-0x0000000003C20000-0x0000000003C21000-memory.dmpFilesize
4KB
-
memory/2932-16-0x0000000003C90000-0x0000000003C92000-memory.dmpFilesize
8KB
-
memory/2932-17-0x0000000003C40000-0x0000000003C41000-memory.dmpFilesize
4KB
-
memory/2932-18-0x0000000003C60000-0x0000000003C61000-memory.dmpFilesize
4KB
-
memory/2932-12-0x0000000003C30000-0x0000000003C32000-memory.dmpFilesize
8KB
-
memory/2932-1-0x0000000000400000-0x000000000054D000-memory.dmpFilesize
1.3MB