Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 01:14
Behavioral task
behavioral1
Sample
95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe
Resource
win7-20240221-en
General
-
Target
95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe
-
Size
1.2MB
-
MD5
da206391e82fa4d03949b07af4b39be9
-
SHA1
3b030d7197725534e8c13b1f18961969bc596d2f
-
SHA256
95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e
-
SHA512
2fe2c68efe3258aa1453aebfb9085392d865db84de83d763231601d12e2ae6536c4a6ee48451198820baa1c8a787ebc77fc2bb0427758ec3aa9639a59f03a837
-
SSDEEP
24576:zQ5aILMCfmAUjzX6xQGCZLFdGm1Sd8zG7u75+FmVf69AlK7v:E5aIwC+Agr6S/FEAGsji6lW
Malware Config
Signatures
-
KPOT Core Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe family_kpot -
Trickbot x86 loader 9 IoCs
Detected Trickbot's x86 loader that unpacks the x86 payload.
Processes:
resource yara_rule behavioral2/memory/4456-15-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 behavioral2/memory/4456-19-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 behavioral2/memory/4456-24-0x0000000002200000-0x0000000002229000-memory.dmp trickbot_loader32 behavioral2/memory/2624-46-0x0000000003010000-0x0000000003039000-memory.dmp trickbot_loader32 behavioral2/memory/2624-59-0x0000000003010000-0x0000000003039000-memory.dmp trickbot_loader32 behavioral2/memory/4440-80-0x0000000001720000-0x0000000001749000-memory.dmp trickbot_loader32 behavioral2/memory/4440-94-0x0000000001720000-0x0000000001749000-memory.dmp trickbot_loader32 behavioral2/memory/3028-117-0x0000000000D60000-0x0000000000D89000-memory.dmp trickbot_loader32 behavioral2/memory/3028-130-0x0000000000D60000-0x0000000000D89000-memory.dmp trickbot_loader32 -
Executes dropped EXE 3 IoCs
Processes:
96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exepid process 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exedescription pid process Token: SeTcbPrivilege 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe Token: SeTcbPrivilege 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exepid process 4456 95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exedescription pid process target process PID 4456 wrote to memory of 2624 4456 95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe PID 4456 wrote to memory of 2624 4456 95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe PID 4456 wrote to memory of 2624 4456 95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 2624 wrote to memory of 1788 2624 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 4440 wrote to memory of 1156 4440 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe PID 3028 wrote to memory of 3388 3028 96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe"C:\Users\Admin\AppData\Local\Temp\95e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exeC:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵
-
C:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exeC:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
-
C:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exeC:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WinSocket\96e0c1f663ab338bd1d2c129946617a9090cae9c83c4a9630d8d43869fbe298e.exeFilesize
1.2MB
MD5da206391e82fa4d03949b07af4b39be9
SHA13b030d7197725534e8c13b1f18961969bc596d2f
SHA25695e0c1f553ab337bd1d2c128945516a8090cae9c73c4a9530d7d43759fbe297e
SHA5122fe2c68efe3258aa1453aebfb9085392d865db84de83d763231601d12e2ae6536c4a6ee48451198820baa1c8a787ebc77fc2bb0427758ec3aa9639a59f03a837
-
C:\Users\Admin\AppData\Roaming\WinSocket\settings.iniFilesize
54KB
MD5ed01d4e1cb0f6b45eed09527b980c4bc
SHA1160425973be508a5adf17b83b5d14b861c7f8ca4
SHA256ca3ff2362dff82a52907109f8548d475eccac1cf4b3c0d8c8f3181ebfefa3047
SHA512316d231bda77949dde5ffda2442ff1e9c8051e3d4de6325517d223fdc7433231693cd8961609a638b80c4b78401800048925b5610dada4c8b50e081fc94c3cf0
-
memory/1788-51-0x0000000010000000-0x000000001001E000-memory.dmpFilesize
120KB
-
memory/1788-53-0x00000240D92B0000-0x00000240D92B1000-memory.dmpFilesize
4KB
-
memory/2624-45-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-29-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-59-0x0000000003010000-0x0000000003039000-memory.dmpFilesize
164KB
-
memory/2624-58-0x0000000003160000-0x0000000003429000-memory.dmpFilesize
2.8MB
-
memory/2624-57-0x0000000003060000-0x000000000311E000-memory.dmpFilesize
760KB
-
memory/2624-38-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-36-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-52-0x0000000003040000-0x0000000003041000-memory.dmpFilesize
4KB
-
memory/2624-44-0x0000000010000000-0x0000000010007000-memory.dmpFilesize
28KB
-
memory/2624-46-0x0000000003010000-0x0000000003039000-memory.dmpFilesize
164KB
-
memory/2624-35-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-42-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/2624-37-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-33-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-39-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-28-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-34-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-30-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-32-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/2624-31-0x00000000006B0000-0x00000000006B1000-memory.dmpFilesize
4KB
-
memory/3028-115-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/3028-130-0x0000000000D60000-0x0000000000D89000-memory.dmpFilesize
164KB
-
memory/3028-117-0x0000000000D60000-0x0000000000D89000-memory.dmpFilesize
164KB
-
memory/3028-116-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/4440-72-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-78-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4440-94-0x0000000001720000-0x0000000001749000-memory.dmpFilesize
164KB
-
memory/4440-92-0x0000000001C00000-0x0000000001CBE000-memory.dmpFilesize
760KB
-
memory/4440-91-0x0000000001BE0000-0x0000000001BE1000-memory.dmpFilesize
4KB
-
memory/4440-80-0x0000000001720000-0x0000000001749000-memory.dmpFilesize
164KB
-
memory/4440-79-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-65-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-68-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-69-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-71-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-74-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-75-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-64-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-66-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-67-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-70-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4440-73-0x0000000001710000-0x0000000001711000-memory.dmpFilesize
4KB
-
memory/4456-14-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-3-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-15-0x0000000002200000-0x0000000002229000-memory.dmpFilesize
164KB
-
memory/4456-17-0x0000000000400000-0x0000000000472000-memory.dmpFilesize
456KB
-
memory/4456-10-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-12-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-13-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-24-0x0000000002200000-0x0000000002229000-memory.dmpFilesize
164KB
-
memory/4456-2-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-9-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-11-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-18-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-19-0x0000000002200000-0x0000000002229000-memory.dmpFilesize
164KB
-
memory/4456-6-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-7-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-4-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-5-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/4456-8-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB