Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe
Resource
win7-20240221-en
General
-
Target
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe
-
Size
10.9MB
-
MD5
8f008ebc1ce9bfdd918b4455c717f5e4
-
SHA1
252f16cba0c69717ba78d2628dcb8ac9fa234261
-
SHA256
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac
-
SHA512
15c16da7df80433b55c06de895f37423f966701f7e8e0d6aba119f00d82ba077ce8aa4c9b09d134bfe1b59295563e81bbe9db866b1e93ed688583031fd4be72e
-
SSDEEP
196608:elRs+agtY9r6ZQDI61GkNriIV4Sxx+B5Koqcmo8ob13VOXxVOX:aRs+FXv6knIV4S6A+
Malware Config
Signatures
-
Detect Blackmoon payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2964-42-0x0000000010000000-0x0000000010024000-memory.dmp family_blackmoon -
Executes dropped EXE 4 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exeÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exeÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exepid process 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 2228 ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 2120 ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe -
Processes:
resource yara_rule behavioral1/memory/2964-42-0x0000000010000000-0x0000000010024000-memory.dmp upx behavioral1/memory/2964-41-0x0000000000380000-0x0000000000388000-memory.dmp upx behavioral1/memory/2964-40-0x0000000000370000-0x000000000037B000-memory.dmp upx behavioral1/memory/2964-39-0x0000000000350000-0x000000000035B000-memory.dmp upx F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe upx -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exedescription ioc process File opened (read-only) \??\F: 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe File opened (read-only) \??\F: 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exedescription ioc process File opened for modification \??\PhysicalDrive0 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe File opened for modification \??\PhysicalDrive0 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exeÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
Processes:
ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exeÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exepid process 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exedescription pid process Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe Token: SeDebugPrivilege 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exepid process 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exepid process 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exepid process 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exedescription pid process target process PID 2964 wrote to memory of 1876 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 2964 wrote to memory of 1876 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 2964 wrote to memory of 1876 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 2964 wrote to memory of 1876 2964 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 1876 wrote to memory of 2228 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 1876 wrote to memory of 2228 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 1876 wrote to memory of 2228 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 1876 wrote to memory of 2228 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 1876 wrote to memory of 556 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 1876 wrote to memory of 556 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 1876 wrote to memory of 556 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 1876 wrote to memory of 556 1876 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe PID 556 wrote to memory of 2120 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 556 wrote to memory of 2120 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 556 wrote to memory of 2120 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe PID 556 wrote to memory of 2120 556 4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe"C:\Users\Admin\AppData\Local\Temp\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe"F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1876 -
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe"F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe"3⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
PID:2228 -
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exeF:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe"F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\4cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac.exeFilesize
10.9MB
MD58f008ebc1ce9bfdd918b4455c717f5e4
SHA1252f16cba0c69717ba78d2628dcb8ac9fa234261
SHA2564cc104acecede94686c15cfd1abf325133da18c638871e5531130eb6d3f066ac
SHA51215c16da7df80433b55c06de895f37423f966701f7e8e0d6aba119f00d82ba077ce8aa4c9b09d134bfe1b59295563e81bbe9db866b1e93ed688583031fd4be72e
-
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\Hero.iniFilesize
71B
MD5b637c310abd39f09756bd78242425d5b
SHA1f199aa8eac0c9dd37f0eaf72e12aa01d48542b27
SHA256401ceb0b75ef9d8cf5b30b2e868ae6abfd5f037eb8d385ab57707f84efdf724c
SHA5125f03d42da8a71f3fbe271d290507c987cdddf1d645c4daca74283c3ff5446f9d509a1a2c4a486033b6b891c9bd72de3d38ef8b108e71401b26f588d676407307
-
F:\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â(΢¶Ë)\ÐÀÞȺϻ÷-¿ª¹Ò±Ø·â.exeFilesize
5.2MB
MD5eee6e5c7eea19561205b0f5616da069b
SHA161a8e3b2cab89dbc3d0e1db29c1b14217606393b
SHA2566efa3171fda18e31df5f3f96e7132d869508556860cddc6cd52cb42e74b8cac5
SHA512f3de22760f2ceee28e6e495e34df7a589b894a0e9e57aa170aae18029d42985c8522cbd36439f604c51e99f91b1c608d5ebc4b799b5bf966fc02ec23473554d0
-
memory/1876-164-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/1876-103-0x0000000006BC0000-0x0000000006BD0000-memory.dmpFilesize
64KB
-
memory/1876-78-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/1876-54-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-31-0x000000000138E000-0x00000000016A8000-memory.dmpFilesize
3.1MB
-
memory/2964-3-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2964-0-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-30-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2964-28-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2964-25-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2964-23-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2964-20-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2964-18-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2964-15-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2964-13-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2964-10-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2964-8-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2964-6-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2964-5-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2964-32-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2964-1-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2964-43-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-44-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-50-0x0000000004580000-0x0000000006313000-memory.dmpFilesize
29.6MB
-
memory/2964-34-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2964-36-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2964-53-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-55-0x000000000138E000-0x00000000016A8000-memory.dmpFilesize
3.1MB
-
memory/2964-37-0x0000000000400000-0x0000000002193000-memory.dmpFilesize
29.6MB
-
memory/2964-39-0x0000000000350000-0x000000000035B000-memory.dmpFilesize
44KB
-
memory/2964-40-0x0000000000370000-0x000000000037B000-memory.dmpFilesize
44KB
-
memory/2964-41-0x0000000000380000-0x0000000000388000-memory.dmpFilesize
32KB
-
memory/2964-42-0x0000000010000000-0x0000000010024000-memory.dmpFilesize
144KB