Analysis
-
max time kernel
109s -
max time network
6s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
30-06-2020 12:34
Static task
static1
Behavioral task
behavioral1
Sample
978905601.msi
Resource
win7v200430
Behavioral task
behavioral2
Sample
978905601.msi
Resource
win10
General
-
Target
978905601.msi
-
Size
464KB
-
MD5
f2eaec2d18d76621ed844a1877dc360f
-
SHA1
dde6b3b51bb85fcc964201b6cdb183ca9704b81c
-
SHA256
15c7aaf96e773849126a63a0c6b567cd27825fe56ebe262098dc56c69432b531
-
SHA512
9f37b6f8a924bb68a72c5b94cd497e9fb729878fa8239f60a7dbff11068b40fb98db487fb4111201542478e0244e1d8e17cc3a3ab03230bc486b65bf2863f712
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
baso.elcx@yandex.com - Password:
HYF76io83%$6
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1608-67-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1608-68-0x0000000000446DEE-mapping.dmp family_agenttesla behavioral1/memory/1608-70-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1608-71-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
Processes:
MSIAA63.tmpMSIAA63.tmppid process 560 MSIAA63.tmp 1608 MSIAA63.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MSIAA63.tmpdescription pid process target process PID 560 set thread context of 1608 560 MSIAA63.tmp MSIAA63.tmp -
Drops file in Windows directory 10 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\1a5ef.msi msiexec.exe File opened for modification C:\Windows\Installer\1a5ef.msi msiexec.exe File created C:\Windows\Installer\1a5f1.ipi msiexec.exe File opened for modification C:\Windows\Installer\1a5f1.ipi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIA84F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIAA63.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 44 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\24\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
msiexec.exeMSIAA63.tmpMSIAA63.tmppid process 1312 msiexec.exe 1312 msiexec.exe 560 MSIAA63.tmp 1608 MSIAA63.tmp 1608 MSIAA63.tmp -
Suspicious use of AdjustPrivilegeToken 63 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exeMSIAA63.tmpMSIAA63.tmpdescription pid process Token: SeShutdownPrivilege 1100 msiexec.exe Token: SeIncreaseQuotaPrivilege 1100 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeSecurityPrivilege 1312 msiexec.exe Token: SeCreateTokenPrivilege 1100 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1100 msiexec.exe Token: SeLockMemoryPrivilege 1100 msiexec.exe Token: SeIncreaseQuotaPrivilege 1100 msiexec.exe Token: SeMachineAccountPrivilege 1100 msiexec.exe Token: SeTcbPrivilege 1100 msiexec.exe Token: SeSecurityPrivilege 1100 msiexec.exe Token: SeTakeOwnershipPrivilege 1100 msiexec.exe Token: SeLoadDriverPrivilege 1100 msiexec.exe Token: SeSystemProfilePrivilege 1100 msiexec.exe Token: SeSystemtimePrivilege 1100 msiexec.exe Token: SeProfSingleProcessPrivilege 1100 msiexec.exe Token: SeIncBasePriorityPrivilege 1100 msiexec.exe Token: SeCreatePagefilePrivilege 1100 msiexec.exe Token: SeCreatePermanentPrivilege 1100 msiexec.exe Token: SeBackupPrivilege 1100 msiexec.exe Token: SeRestorePrivilege 1100 msiexec.exe Token: SeShutdownPrivilege 1100 msiexec.exe Token: SeDebugPrivilege 1100 msiexec.exe Token: SeAuditPrivilege 1100 msiexec.exe Token: SeSystemEnvironmentPrivilege 1100 msiexec.exe Token: SeChangeNotifyPrivilege 1100 msiexec.exe Token: SeRemoteShutdownPrivilege 1100 msiexec.exe Token: SeUndockPrivilege 1100 msiexec.exe Token: SeSyncAgentPrivilege 1100 msiexec.exe Token: SeEnableDelegationPrivilege 1100 msiexec.exe Token: SeManageVolumePrivilege 1100 msiexec.exe Token: SeImpersonatePrivilege 1100 msiexec.exe Token: SeCreateGlobalPrivilege 1100 msiexec.exe Token: SeBackupPrivilege 1520 vssvc.exe Token: SeRestorePrivilege 1520 vssvc.exe Token: SeAuditPrivilege 1520 vssvc.exe Token: SeBackupPrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1784 DrvInst.exe Token: SeLoadDriverPrivilege 1784 DrvInst.exe Token: SeLoadDriverPrivilege 1784 DrvInst.exe Token: SeLoadDriverPrivilege 1784 DrvInst.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeDebugPrivilege 560 MSIAA63.tmp Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeRestorePrivilege 1312 msiexec.exe Token: SeTakeOwnershipPrivilege 1312 msiexec.exe Token: SeDebugPrivilege 1608 MSIAA63.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1100 msiexec.exe 1100 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSIAA63.tmppid process 1608 MSIAA63.tmp -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
msiexec.exeMSIAA63.tmpdescription pid process target process PID 1312 wrote to memory of 560 1312 msiexec.exe MSIAA63.tmp PID 1312 wrote to memory of 560 1312 msiexec.exe MSIAA63.tmp PID 1312 wrote to memory of 560 1312 msiexec.exe MSIAA63.tmp PID 1312 wrote to memory of 560 1312 msiexec.exe MSIAA63.tmp PID 560 wrote to memory of 1624 560 MSIAA63.tmp schtasks.exe PID 560 wrote to memory of 1624 560 MSIAA63.tmp schtasks.exe PID 560 wrote to memory of 1624 560 MSIAA63.tmp schtasks.exe PID 560 wrote to memory of 1624 560 MSIAA63.tmp schtasks.exe PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp PID 560 wrote to memory of 1608 560 MSIAA63.tmp MSIAA63.tmp
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\978905601.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Installer\MSIAA63.tmp"C:\Windows\Installer\MSIAA63.tmp"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qzoutxtRkpOte" /XML "C:\Users\Admin\AppData\Local\Temp\tmp48D2.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Installer\MSIAA63.tmp"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000005A8" "00000000000005A0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp48D2.tmpMD5
7e8548bd762b1f9d1568a44e264b501f
SHA10add977fde3ee668be7f7b178f5f42818f7a00e7
SHA25690ef6e5f0ba092f888ae12bb20b4a31646cb7f1f9829c105db1a05ea8132b1f6
SHA512ea3855c76785d504577b39812d10054d52fd33fb489b71f5ddc251f1dfe0b59f97637f5b42e0b3c20e2f25bd6c28a138a246233f8843b7340aca19e50707c3cc
-
C:\Windows\Installer\MSIAA63.tmpMD5
f2aa5fdc289dc5b0114ec277eeac0435
SHA11e4cab1ad8e614b37ea1cd4c67a8c862ed6e2603
SHA25663b1cf89f89039c8f21f26f08e8724d6576e66edd8533e02fb4c149a8dff15c1
SHA512bfdb2509b7d44aac5531bf1afd8d84a886a6a4c30df50bf555eea5178fe7c1b1a1d48d6c8e716147959f2201a1604776e22230923f053a1cc10a8f7c49f5a495
-
C:\Windows\Installer\MSIAA63.tmpMD5
f2aa5fdc289dc5b0114ec277eeac0435
SHA11e4cab1ad8e614b37ea1cd4c67a8c862ed6e2603
SHA25663b1cf89f89039c8f21f26f08e8724d6576e66edd8533e02fb4c149a8dff15c1
SHA512bfdb2509b7d44aac5531bf1afd8d84a886a6a4c30df50bf555eea5178fe7c1b1a1d48d6c8e716147959f2201a1604776e22230923f053a1cc10a8f7c49f5a495
-
C:\Windows\Installer\MSIAA63.tmpMD5
f2aa5fdc289dc5b0114ec277eeac0435
SHA11e4cab1ad8e614b37ea1cd4c67a8c862ed6e2603
SHA25663b1cf89f89039c8f21f26f08e8724d6576e66edd8533e02fb4c149a8dff15c1
SHA512bfdb2509b7d44aac5531bf1afd8d84a886a6a4c30df50bf555eea5178fe7c1b1a1d48d6c8e716147959f2201a1604776e22230923f053a1cc10a8f7c49f5a495
-
memory/560-64-0x0000000000000000-0x0000000000000000-disk.dmp
-
memory/560-60-0x0000000000000000-mapping.dmp
-
memory/1100-1-0x00000000040A0000-0x00000000040A4000-memory.dmpFilesize
16KB
-
memory/1100-78-0x00000000022B0000-0x00000000022B4000-memory.dmpFilesize
16KB
-
memory/1100-0-0x00000000032B0000-0x00000000032B4000-memory.dmpFilesize
16KB
-
memory/1312-7-0x0000000000700000-0x0000000000704000-memory.dmpFilesize
16KB
-
memory/1312-5-0x0000000001140000-0x0000000001144000-memory.dmpFilesize
16KB
-
memory/1312-9-0x0000000000700000-0x0000000000704000-memory.dmpFilesize
16KB
-
memory/1312-3-0x00000000004D0000-0x00000000004D2000-memory.dmpFilesize
8KB
-
memory/1312-6-0x0000000000700000-0x0000000000704000-memory.dmpFilesize
16KB
-
memory/1312-77-0x0000000004630000-0x0000000004634000-memory.dmpFilesize
16KB
-
memory/1312-76-0x0000000001140000-0x0000000001144000-memory.dmpFilesize
16KB
-
memory/1312-58-0x0000000002D60000-0x0000000002D80000-memory.dmpFilesize
128KB
-
memory/1312-75-0x0000000004630000-0x0000000004634000-memory.dmpFilesize
16KB
-
memory/1608-71-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1608-70-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1608-68-0x0000000000446DEE-mapping.dmp
-
memory/1608-67-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1624-65-0x0000000000000000-mapping.dmp