Analysis
-
max time kernel
97s -
max time network
29s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:59
Static task
static1
Behavioral task
behavioral1
Sample
znol5gxxtd2gytr.msi
Resource
win7v20201028
General
-
Target
znol5gxxtd2gytr.msi
-
Size
492KB
-
MD5
3108d539e45f8a66f4ab8b2c5e20497f
-
SHA1
a514c5f3d637dd86af5d32ccf55bd7df2a3abec1
-
SHA256
abbcbdace318afff0408188e4e1025ebc49c3157838066d775b5e70a5c8c2620
-
SHA512
3da9c92951e893d2e8c3ac05b042580ffb693159d9b5536525e9bbdac39c6a14b577d23b5ff0ab5fd4b70a3f3dd7c0a98a383a191067a03910597b5c55dd9908
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.eljsn.website - Port:
587 - Username:
infotect@eljsn.website - Password:
5C%+1~13zgdJ**
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1596-19-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1596-20-0x00000000004470BE-mapping.dmp family_agenttesla behavioral1/memory/1596-22-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1596-23-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Processes:
resource yara_rule behavioral1/memory/1332-16-0x0000000000260000-0x00000000002AD000-memory.dmp rezer0 -
Executes dropped EXE 2 IoCs
Processes:
MSI3075.tmpMSI3075.tmppid process 1332 MSI3075.tmp 1596 MSI3075.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MSI3075.tmpdescription pid process target process PID 1332 set thread context of 1596 1332 MSI3075.tmp MSI3075.tmp -
Drops file in Windows directory 10 IoCs
Processes:
DrvInst.exemsiexec.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f742cfa.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI2FE6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3075.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\f742cfa.msi msiexec.exe File created C:\Windows\Installer\f742cfc.ipi msiexec.exe File opened for modification C:\Windows\Installer\f742cfc.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 44 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exeMSI3075.tmppid process 1264 msiexec.exe 1264 msiexec.exe 1596 MSI3075.tmp 1596 MSI3075.tmp -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exeMSI3075.tmpdescription pid process Token: SeShutdownPrivilege 1080 msiexec.exe Token: SeIncreaseQuotaPrivilege 1080 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeSecurityPrivilege 1264 msiexec.exe Token: SeCreateTokenPrivilege 1080 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1080 msiexec.exe Token: SeLockMemoryPrivilege 1080 msiexec.exe Token: SeIncreaseQuotaPrivilege 1080 msiexec.exe Token: SeMachineAccountPrivilege 1080 msiexec.exe Token: SeTcbPrivilege 1080 msiexec.exe Token: SeSecurityPrivilege 1080 msiexec.exe Token: SeTakeOwnershipPrivilege 1080 msiexec.exe Token: SeLoadDriverPrivilege 1080 msiexec.exe Token: SeSystemProfilePrivilege 1080 msiexec.exe Token: SeSystemtimePrivilege 1080 msiexec.exe Token: SeProfSingleProcessPrivilege 1080 msiexec.exe Token: SeIncBasePriorityPrivilege 1080 msiexec.exe Token: SeCreatePagefilePrivilege 1080 msiexec.exe Token: SeCreatePermanentPrivilege 1080 msiexec.exe Token: SeBackupPrivilege 1080 msiexec.exe Token: SeRestorePrivilege 1080 msiexec.exe Token: SeShutdownPrivilege 1080 msiexec.exe Token: SeDebugPrivilege 1080 msiexec.exe Token: SeAuditPrivilege 1080 msiexec.exe Token: SeSystemEnvironmentPrivilege 1080 msiexec.exe Token: SeChangeNotifyPrivilege 1080 msiexec.exe Token: SeRemoteShutdownPrivilege 1080 msiexec.exe Token: SeUndockPrivilege 1080 msiexec.exe Token: SeSyncAgentPrivilege 1080 msiexec.exe Token: SeEnableDelegationPrivilege 1080 msiexec.exe Token: SeManageVolumePrivilege 1080 msiexec.exe Token: SeImpersonatePrivilege 1080 msiexec.exe Token: SeCreateGlobalPrivilege 1080 msiexec.exe Token: SeBackupPrivilege 1352 vssvc.exe Token: SeRestorePrivilege 1352 vssvc.exe Token: SeAuditPrivilege 1352 vssvc.exe Token: SeBackupPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeRestorePrivilege 932 DrvInst.exe Token: SeLoadDriverPrivilege 932 DrvInst.exe Token: SeLoadDriverPrivilege 932 DrvInst.exe Token: SeLoadDriverPrivilege 932 DrvInst.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeRestorePrivilege 1264 msiexec.exe Token: SeTakeOwnershipPrivilege 1264 msiexec.exe Token: SeDebugPrivilege 1596 MSI3075.tmp -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1080 msiexec.exe 1080 msiexec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MSI3075.tmppid process 1596 MSI3075.tmp -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
msiexec.exeMSI3075.tmpdescription pid process target process PID 1264 wrote to memory of 1332 1264 msiexec.exe MSI3075.tmp PID 1264 wrote to memory of 1332 1264 msiexec.exe MSI3075.tmp PID 1264 wrote to memory of 1332 1264 msiexec.exe MSI3075.tmp PID 1264 wrote to memory of 1332 1264 msiexec.exe MSI3075.tmp PID 1332 wrote to memory of 1496 1332 MSI3075.tmp schtasks.exe PID 1332 wrote to memory of 1496 1332 MSI3075.tmp schtasks.exe PID 1332 wrote to memory of 1496 1332 MSI3075.tmp schtasks.exe PID 1332 wrote to memory of 1496 1332 MSI3075.tmp schtasks.exe PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp PID 1332 wrote to memory of 1596 1332 MSI3075.tmp MSI3075.tmp
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\znol5gxxtd2gytr.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Installer\MSI3075.tmp"C:\Windows\Installer\MSI3075.tmp"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RfjXgrDPBFsZY" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBBA1.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Installer\MSI3075.tmp"{path}"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot12" "" "" "6d110b0a3" "0000000000000000" "00000000000002CC" "00000000000005C0"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpBBA1.tmpMD5
a082e7a532d3137920081b945d07365d
SHA158441d87f4fb758d0873354df88da90fbb7d0efc
SHA25613f98dc8ad6ec60eff3f542c15e7c58912193019bc4dbc56a4fff5e9aeb5f508
SHA512a169866c13a793e875db19eeef8faf030865fa400fb694e62e04bdef3d03e6aa85f0543262107117445a0ccf0c62eaf90204e7b434981e58854fdb78fab824f5
-
C:\Windows\Installer\MSI3075.tmpMD5
31310b7aaf4c734c755f9af5fdb21735
SHA1d684dff80d9c49019decb0c9c1c613aa525b0f37
SHA256a7e3766ef281daddb6fbdd9af745b0776abb319b7485ecec75160c3368827254
SHA5124f1998a78f4f23b242dbfb61376941930dbfb6304296740eefb898127df486a4cc09a6ad95ab5f87a157a018d35691d8733a9e9a6f17973edf3801aa613ad45d
-
C:\Windows\Installer\MSI3075.tmpMD5
31310b7aaf4c734c755f9af5fdb21735
SHA1d684dff80d9c49019decb0c9c1c613aa525b0f37
SHA256a7e3766ef281daddb6fbdd9af745b0776abb319b7485ecec75160c3368827254
SHA5124f1998a78f4f23b242dbfb61376941930dbfb6304296740eefb898127df486a4cc09a6ad95ab5f87a157a018d35691d8733a9e9a6f17973edf3801aa613ad45d
-
C:\Windows\Installer\MSI3075.tmpMD5
31310b7aaf4c734c755f9af5fdb21735
SHA1d684dff80d9c49019decb0c9c1c613aa525b0f37
SHA256a7e3766ef281daddb6fbdd9af745b0776abb319b7485ecec75160c3368827254
SHA5124f1998a78f4f23b242dbfb61376941930dbfb6304296740eefb898127df486a4cc09a6ad95ab5f87a157a018d35691d8733a9e9a6f17973edf3801aa613ad45d
-
memory/1080-1-0x00000000040F0000-0x00000000040F4000-memory.dmpFilesize
16KB
-
memory/1080-31-0x0000000002300000-0x0000000002304000-memory.dmpFilesize
16KB
-
memory/1080-0-0x0000000003300000-0x0000000003304000-memory.dmpFilesize
16KB
-
memory/1264-7-0x0000000000F20000-0x0000000000F24000-memory.dmpFilesize
16KB
-
memory/1264-27-0x0000000002F30000-0x0000000002F34000-memory.dmpFilesize
16KB
-
memory/1264-6-0x0000000000F20000-0x0000000000F24000-memory.dmpFilesize
16KB
-
memory/1264-30-0x0000000002F30000-0x0000000002F34000-memory.dmpFilesize
16KB
-
memory/1264-5-0x00000000017A0000-0x00000000017A4000-memory.dmpFilesize
16KB
-
memory/1264-29-0x0000000000F20000-0x0000000000F24000-memory.dmpFilesize
16KB
-
memory/1332-12-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/1332-13-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/1332-15-0x00000000001F0000-0x0000000000200000-memory.dmpFilesize
64KB
-
memory/1332-16-0x0000000000260000-0x00000000002AD000-memory.dmpFilesize
308KB
-
memory/1332-9-0x0000000000000000-mapping.dmp
-
memory/1496-17-0x0000000000000000-mapping.dmp
-
memory/1596-24-0x0000000074C70000-0x000000007535E000-memory.dmpFilesize
6.9MB
-
memory/1596-23-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1596-22-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1596-20-0x00000000004470BE-mapping.dmp
-
memory/1596-19-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB