Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
NaxorCrypter.exe
Resource
win7-20231129-en
General
-
Target
NaxorCrypter.exe
-
Size
2.2MB
-
MD5
b29c154b97950a07caf5aa3e3795a4a1
-
SHA1
8940008c6630ad14a42f76c72b63341adb406736
-
SHA256
51a39194cd5c21c1de6e9724f9b5890a2b50f9d7e3b7fa003a5e50beb9559fb4
-
SHA512
c21b40a6e412f0022da398212ddcf6cfdf51522715297d0275fb2983d936a1ace29f4f8a54f751617fc92121b825424389bdd096b9c59c4cff6a58a57bde7bc3
-
SSDEEP
24576:NkGGdafLtcWAjB9XvdBqLP2XDBxkdgGAQjdhnF61A5w/8yYBBifgqH3P64F7:G4ovIbqxCTx5w/Xf5f
Malware Config
Extracted
nanocore
1.2.2.0
1337day.ddns.net:1900
93979016-0516-4417-b883-a0edc923fe85
-
activate_away_mode
true
-
backup_connection_host
1337day.ddns.net
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-07-29T17:12:59.761069736Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
1900
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
93979016-0516-4417-b883-a0edc923fe85
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
njrat
0.6.4
HacKed
fal92.duckdns.org:10142
3d25feee885880d8ab876c66d8b91d84
-
reg_key
3d25feee885880d8ab876c66d8b91d84
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 2688 netsh.exe -
Drops startup file 2 IoCs
Processes:
Cooporation Nvidia.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3d25feee885880d8ab876c66d8b91d84.exe Cooporation Nvidia.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\3d25feee885880d8ab876c66d8b91d84.exe Cooporation Nvidia.exe -
Executes dropped EXE 6 IoCs
Processes:
Naxor.exeCooporation Nvidia.exeNaxor Crypter.exeCooporation Nvidia.exeCooporation Nvidia.exeCooporation Nvidia.exepid process 2628 Naxor.exe 2728 Cooporation Nvidia.exe 2540 Naxor Crypter.exe 2936 Cooporation Nvidia.exe 1088 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe -
Loads dropped DLL 11 IoCs
Processes:
NaxorCrypter.exeNaxor.exeCooporation Nvidia.exeCooporation Nvidia.exepid process 2880 NaxorCrypter.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2628 Naxor.exe 2728 Cooporation Nvidia.exe 2936 Cooporation Nvidia.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Cooporation Nvidia.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\3d25feee885880d8ab876c66d8b91d84 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Cooporation Nvidia.exe\" .." Cooporation Nvidia.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3d25feee885880d8ab876c66d8b91d84 = "\"C:\\Users\\Admin\\AppData\\Roaming\\Cooporation Nvidia.exe\" .." Cooporation Nvidia.exe -
Processes:
NaxorCrypter.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NaxorCrypter.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
NaxorCrypter.exeCooporation Nvidia.exeCooporation Nvidia.exedescription pid process target process PID 2880 set thread context of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2728 set thread context of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 set thread context of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NaxorCrypter.exeNaxorCrypter.exeCooporation Nvidia.exeCooporation Nvidia.exeCooporation Nvidia.exepid process 2880 NaxorCrypter.exe 2880 NaxorCrypter.exe 2880 NaxorCrypter.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 2728 Cooporation Nvidia.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 1088 Cooporation Nvidia.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 2140 NaxorCrypter.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe 1736 Cooporation Nvidia.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
NaxorCrypter.exepid process 2140 NaxorCrypter.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
NaxorCrypter.exeNaxorCrypter.exeCooporation Nvidia.exeCooporation Nvidia.exeCooporation Nvidia.exedescription pid process Token: SeDebugPrivilege 2880 NaxorCrypter.exe Token: SeDebugPrivilege 2140 NaxorCrypter.exe Token: SeDebugPrivilege 2728 Cooporation Nvidia.exe Token: SeDebugPrivilege 1088 Cooporation Nvidia.exe Token: SeDebugPrivilege 1736 Cooporation Nvidia.exe -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
NaxorCrypter.exeNaxor.exeCooporation Nvidia.exeCooporation Nvidia.exeCooporation Nvidia.exeCooporation Nvidia.exedescription pid process target process PID 2880 wrote to memory of 2948 2880 NaxorCrypter.exe schtasks.exe PID 2880 wrote to memory of 2948 2880 NaxorCrypter.exe schtasks.exe PID 2880 wrote to memory of 2948 2880 NaxorCrypter.exe schtasks.exe PID 2880 wrote to memory of 2948 2880 NaxorCrypter.exe schtasks.exe PID 2880 wrote to memory of 3032 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 3032 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 3032 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 3032 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 1720 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 1720 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 1720 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 1720 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2140 2880 NaxorCrypter.exe NaxorCrypter.exe PID 2880 wrote to memory of 2628 2880 NaxorCrypter.exe Naxor.exe PID 2880 wrote to memory of 2628 2880 NaxorCrypter.exe Naxor.exe PID 2880 wrote to memory of 2628 2880 NaxorCrypter.exe Naxor.exe PID 2880 wrote to memory of 2628 2880 NaxorCrypter.exe Naxor.exe PID 2628 wrote to memory of 2728 2628 Naxor.exe Cooporation Nvidia.exe PID 2628 wrote to memory of 2728 2628 Naxor.exe Cooporation Nvidia.exe PID 2628 wrote to memory of 2728 2628 Naxor.exe Cooporation Nvidia.exe PID 2628 wrote to memory of 2728 2628 Naxor.exe Cooporation Nvidia.exe PID 2628 wrote to memory of 2540 2628 Naxor.exe Naxor Crypter.exe PID 2628 wrote to memory of 2540 2628 Naxor.exe Naxor Crypter.exe PID 2628 wrote to memory of 2540 2628 Naxor.exe Naxor Crypter.exe PID 2628 wrote to memory of 2540 2628 Naxor.exe Naxor Crypter.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2728 wrote to memory of 2936 2728 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2936 wrote to memory of 1088 2936 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2936 wrote to memory of 1088 2936 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2936 wrote to memory of 1088 2936 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 2936 wrote to memory of 1088 2936 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1088 wrote to memory of 1736 1088 Cooporation Nvidia.exe Cooporation Nvidia.exe PID 1736 wrote to memory of 2688 1736 Cooporation Nvidia.exe netsh.exe PID 1736 wrote to memory of 2688 1736 Cooporation Nvidia.exe netsh.exe PID 1736 wrote to memory of 2688 1736 Cooporation Nvidia.exe netsh.exe PID 1736 wrote to memory of 2688 1736 Cooporation Nvidia.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Crypter\Crypter" /XML "C:\Users\Admin\AppData\Roaming\Crypter\aooooo.xml"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"C:\Users\Admin\AppData\Local\Temp\NaxorCrypter.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Naxor.exe"C:\Users\Admin\AppData\Local\Temp\Naxor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Cooporation Nvidia.exe"C:\Users\Admin\AppData\Local\Temp\Cooporation Nvidia.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Cooporation Nvidia.exe"C:\Users\Admin\AppData\Local\Temp\Cooporation Nvidia.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Cooporation Nvidia.exe"C:\Users\Admin\AppData\Roaming\Cooporation Nvidia.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Cooporation Nvidia.exe"C:\Users\Admin\AppData\Roaming\Cooporation Nvidia.exe"6⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\Cooporation Nvidia.exe" "Cooporation Nvidia.exe" ENABLE7⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\Naxor Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Naxor Crypter.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cooporation Nvidia.exeFilesize
286KB
MD52bb4aaf47de772b665bdab87fa48ee60
SHA1ccddbd80107f4b854826c92d7e8088d6c3736684
SHA256a939480354a35391d3b4c970ef4cfa48acbdcabb3c7992b21f947ac9029b9500
SHA5124e75c2d36e753dd7bc192b2d4575a45a336179659573733dea6c484051c6efda25f4bb7412190c201e3f0f06a785409d130932df588dd69f199da8e9ae81daf2
-
C:\Users\Admin\AppData\Local\Temp\svhost.exeFilesize
85KB
MD52e5f1cf69f92392f8829fc9c9263ae9b
SHA197b9ca766bbbdaa8c9ec960dc41b598f7fad82a5
SHA25651985a57e085d8b17042f0cdc1f905380b792854733eb3275fd8fce4e3bb886b
SHA512f7e096dd9d0fa3a3c04c01bf229c4b344798a4c8b7b848588c1d78cb9fadfa9b1d0fd53c1fe74d191d5561e9eb551a4a3fc918363f119ea60024dd3d67c83883
-
C:\Users\Admin\AppData\Roaming\Crypter\aooooo.xmlFilesize
1KB
MD5e2306bb05524698f22f8bf81958388f6
SHA1607012e8986d5e0f7c9281498e424fae725e83d2
SHA25651a089fcf171b96a3966d0ff1b1caa6e18a344be90bc343e53499e0d932ea4ce
SHA512b4ddb014c175e7c5c9d4fb64df646f1cbc344e24dac793b10aa98ab077df22fc78bea23476aee66e2a56e552965b44a51c5933d0d9bc175026478af3eae662bf
-
\Users\Admin\AppData\Local\Temp\Naxor Crypter.exeFilesize
1.9MB
MD5eb62d522aa83250770fb5dfbe3136bda
SHA18e1b0a19575ef93cbe4f98b6ed252cf7a450ccdc
SHA256f2936d5c363aca1604c2daacbfd086572c5956a0796a92f0d8f92001b9d0b971
SHA5121b24cb54b5c3f907356e402afedee3603e81ceb5858bd3fcb52c349c42afbf6a426e9236d2c871b4191c21a4e799c5af0db0773822dfa6a3be128d776ec78be5
-
\Users\Admin\AppData\Local\Temp\Naxor.exeFilesize
1.1MB
MD533dbbf2d55dc60f7c88638c145d0f716
SHA136bc559e602d931a6255c4286b7eeb7baf01bf11
SHA2569333f355306caaf9d0b292c7268e3d3475b297533437a4fa7568b7743be30db6
SHA51209d88f26867fb8dd1d11e5eecd16d5f952c9c8786ccd6a637ac65da0e2ed127d5ed819110ce344b38cdeec4b2219ead868ea75d3b6a9a6cb8fa53862ec7a7157
-
memory/1736-97-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2140-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2140-21-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-25-0x0000000074C60000-0x000000007520B000-memory.dmpFilesize
5.7MB
-
memory/2140-16-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-13-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-11-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-6-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-23-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-8-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/2140-104-0x0000000074C60000-0x000000007520B000-memory.dmpFilesize
5.7MB
-
memory/2540-102-0x0000000000900000-0x0000000000AF6000-memory.dmpFilesize
2.0MB
-
memory/2880-31-0x0000000074C60000-0x000000007520B000-memory.dmpFilesize
5.7MB
-
memory/2880-0-0x0000000074C61000-0x0000000074C62000-memory.dmpFilesize
4KB
-
memory/2880-2-0x0000000074C60000-0x000000007520B000-memory.dmpFilesize
5.7MB
-
memory/2880-1-0x0000000074C60000-0x000000007520B000-memory.dmpFilesize
5.7MB
-
memory/2936-79-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-77-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-76-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2936-74-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-72-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-70-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-68-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB
-
memory/2936-80-0x0000000000400000-0x000000000040E000-memory.dmpFilesize
56KB