Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 12:47
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe
Resource
win10v20201028
General
-
Target
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe
-
Size
1.3MB
-
MD5
8a16967ee620b6d50578ec90143e9b88
-
SHA1
8b3ab5b20d8fbcb5c5428768c7e3fe8f3a954a8f
-
SHA256
f64dfe37f4518739d7d31f0a81cc8a126d6766ca16039b3f80a50495efd6d765
-
SHA512
f0fe9ee56e17ef17fc0a1fb70f6f37946f93fc4ad0d2eb9bb9ade5429ace6a027e5a4fa5ee6a993de7474f7106e45a6543d9e3adf98a63d002e75c447b1869d1
Malware Config
Extracted
remcos
wedsazxcvfghyuiokjhbnvfcdsaweyplmhbvrtud.ydns.eu:1996
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
win.exewin.exepid process 2012 win.exe 2508 win.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exewin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\ win.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\win = "\"C:\\Users\\Admin\\AppData\\Roaming\\win.exe\"" win.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exewin.exepid process 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe 2012 win.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exewin.exedescription pid process target process PID 508 set thread context of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 2012 set thread context of 2508 2012 win.exe win.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 648 508 WerFault.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 3452 2012 WerFault.exe win.exe -
Delays execution with timeout.exe 6 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4012 timeout.exe 3808 timeout.exe 2896 timeout.exe 1232 timeout.exe 724 timeout.exe 2824 timeout.exe -
Modifies registry class 1 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exeWerFault.exewin.exeWerFault.exepid process 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 648 WerFault.exe 2012 win.exe 2012 win.exe 2012 win.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe 3452 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
win.exepid process 2508 win.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exeWerFault.exewin.exeWerFault.exedescription pid process Token: SeDebugPrivilege 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe Token: SeRestorePrivilege 648 WerFault.exe Token: SeBackupPrivilege 648 WerFault.exe Token: SeDebugPrivilege 648 WerFault.exe Token: SeDebugPrivilege 2012 win.exe Token: SeDebugPrivilege 3452 WerFault.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
win.exepid process 2508 win.exe -
Suspicious use of WriteProcessMemory 71 IoCs
Processes:
SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.execmd.execmd.execmd.exeSecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exeWScript.execmd.exewin.execmd.execmd.execmd.exedescription pid process target process PID 508 wrote to memory of 3556 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 3556 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 3556 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 3556 wrote to memory of 2824 3556 cmd.exe timeout.exe PID 3556 wrote to memory of 2824 3556 cmd.exe timeout.exe PID 3556 wrote to memory of 2824 3556 cmd.exe timeout.exe PID 508 wrote to memory of 2608 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 2608 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 2608 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 2608 wrote to memory of 4012 2608 cmd.exe timeout.exe PID 2608 wrote to memory of 4012 2608 cmd.exe timeout.exe PID 2608 wrote to memory of 4012 2608 cmd.exe timeout.exe PID 508 wrote to memory of 1836 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 1836 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 508 wrote to memory of 1836 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe cmd.exe PID 1836 wrote to memory of 3808 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 3808 1836 cmd.exe timeout.exe PID 1836 wrote to memory of 3808 1836 cmd.exe timeout.exe PID 508 wrote to memory of 1172 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1172 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1172 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1312 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1312 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1312 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 508 wrote to memory of 1168 508 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe PID 1168 wrote to memory of 2336 1168 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe WScript.exe PID 1168 wrote to memory of 2336 1168 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe WScript.exe PID 1168 wrote to memory of 2336 1168 SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe WScript.exe PID 2336 wrote to memory of 3120 2336 WScript.exe cmd.exe PID 2336 wrote to memory of 3120 2336 WScript.exe cmd.exe PID 2336 wrote to memory of 3120 2336 WScript.exe cmd.exe PID 3120 wrote to memory of 2012 3120 cmd.exe win.exe PID 3120 wrote to memory of 2012 3120 cmd.exe win.exe PID 3120 wrote to memory of 2012 3120 cmd.exe win.exe PID 2012 wrote to memory of 60 2012 win.exe cmd.exe PID 2012 wrote to memory of 60 2012 win.exe cmd.exe PID 2012 wrote to memory of 60 2012 win.exe cmd.exe PID 60 wrote to memory of 2896 60 cmd.exe timeout.exe PID 60 wrote to memory of 2896 60 cmd.exe timeout.exe PID 60 wrote to memory of 2896 60 cmd.exe timeout.exe PID 2012 wrote to memory of 3904 2012 win.exe cmd.exe PID 2012 wrote to memory of 3904 2012 win.exe cmd.exe PID 2012 wrote to memory of 3904 2012 win.exe cmd.exe PID 3904 wrote to memory of 1232 3904 cmd.exe timeout.exe PID 3904 wrote to memory of 1232 3904 cmd.exe timeout.exe PID 3904 wrote to memory of 1232 3904 cmd.exe timeout.exe PID 2012 wrote to memory of 3772 2012 win.exe cmd.exe PID 2012 wrote to memory of 3772 2012 win.exe cmd.exe PID 2012 wrote to memory of 3772 2012 win.exe cmd.exe PID 3772 wrote to memory of 724 3772 cmd.exe timeout.exe PID 3772 wrote to memory of 724 3772 cmd.exe timeout.exe PID 3772 wrote to memory of 724 3772 cmd.exe timeout.exe PID 2012 wrote to memory of 2508 2012 win.exe win.exe PID 2012 wrote to memory of 2508 2012 win.exe win.exe PID 2012 wrote to memory of 2508 2012 win.exe win.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.8a16967ee620b6d5.22788.exe"2⤵
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\win.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\win.exeC:\Users\Admin\AppData\Roaming\win.exe5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 16⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 17⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\win.exe"C:\Users\Admin\AppData\Roaming\win.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 15526⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 15282⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
4a74e626596d6e66b4bbc59ee6848f2d
SHA1047849ac8735ecc0943428c7cd5e00b52eee06ed
SHA25698bd6dc219a7a3e04d3d67bbec9f0b4d4640831a3a6be0a0078b050041088b0e
SHA5121cd943482d0f1ce2ffaf6ee4a82895e4d57c52051bb14bbda0548cf072b4c5cbe719d2cdb549b5ae7c0241dd9c68dd9d1674acd26aed684b8145500079cc5403
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
8a16967ee620b6d50578ec90143e9b88
SHA18b3ab5b20d8fbcb5c5428768c7e3fe8f3a954a8f
SHA256f64dfe37f4518739d7d31f0a81cc8a126d6766ca16039b3f80a50495efd6d765
SHA512f0fe9ee56e17ef17fc0a1fb70f6f37946f93fc4ad0d2eb9bb9ade5429ace6a027e5a4fa5ee6a993de7474f7106e45a6543d9e3adf98a63d002e75c447b1869d1
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
8a16967ee620b6d50578ec90143e9b88
SHA18b3ab5b20d8fbcb5c5428768c7e3fe8f3a954a8f
SHA256f64dfe37f4518739d7d31f0a81cc8a126d6766ca16039b3f80a50495efd6d765
SHA512f0fe9ee56e17ef17fc0a1fb70f6f37946f93fc4ad0d2eb9bb9ade5429ace6a027e5a4fa5ee6a993de7474f7106e45a6543d9e3adf98a63d002e75c447b1869d1
-
C:\Users\Admin\AppData\Roaming\win.exeMD5
8a16967ee620b6d50578ec90143e9b88
SHA18b3ab5b20d8fbcb5c5428768c7e3fe8f3a954a8f
SHA256f64dfe37f4518739d7d31f0a81cc8a126d6766ca16039b3f80a50495efd6d765
SHA512f0fe9ee56e17ef17fc0a1fb70f6f37946f93fc4ad0d2eb9bb9ade5429ace6a027e5a4fa5ee6a993de7474f7106e45a6543d9e3adf98a63d002e75c447b1869d1
-
memory/60-36-0x0000000000000000-mapping.dmp
-
memory/508-8-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/508-6-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/508-3-0x00000000006D0000-0x00000000006D1000-memory.dmpFilesize
4KB
-
memory/508-9-0x00000000053E0000-0x000000000540F000-memory.dmpFilesize
188KB
-
memory/508-7-0x0000000005260000-0x0000000005261000-memory.dmpFilesize
4KB
-
memory/508-5-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/508-2-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/648-21-0x0000000004690000-0x0000000004691000-memory.dmpFilesize
4KB
-
memory/724-41-0x0000000000000000-mapping.dmp
-
memory/1168-16-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1168-17-0x0000000000413FA4-mapping.dmp
-
memory/1168-18-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/1232-39-0x0000000000000000-mapping.dmp
-
memory/1836-14-0x0000000000000000-mapping.dmp
-
memory/2012-28-0x0000000073520000-0x0000000073C0E000-memory.dmpFilesize
6.9MB
-
memory/2012-25-0x0000000000000000-mapping.dmp
-
memory/2336-19-0x0000000000000000-mapping.dmp
-
memory/2508-43-0x0000000000413FA4-mapping.dmp
-
memory/2508-45-0x0000000000400000-0x0000000000421000-memory.dmpFilesize
132KB
-
memory/2608-12-0x0000000000000000-mapping.dmp
-
memory/2824-11-0x0000000000000000-mapping.dmp
-
memory/2896-37-0x0000000000000000-mapping.dmp
-
memory/3120-24-0x0000000000000000-mapping.dmp
-
memory/3452-46-0x0000000004770000-0x0000000004771000-memory.dmpFilesize
4KB
-
memory/3556-10-0x0000000000000000-mapping.dmp
-
memory/3772-40-0x0000000000000000-mapping.dmp
-
memory/3808-15-0x0000000000000000-mapping.dmp
-
memory/3904-38-0x0000000000000000-mapping.dmp
-
memory/4012-13-0x0000000000000000-mapping.dmp