Analysis
-
max time kernel
163s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-05-2022 23:08
Static task
static1
Behavioral task
behavioral1
Sample
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe
Resource
win7-20220414-en
General
-
Target
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe
-
Size
888KB
-
MD5
02e1fc62335f482e4c2bd663e206736a
-
SHA1
83c2a8c79f0745f977dab0ae1c158292217f94d0
-
SHA256
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407
-
SHA512
18ba896dc20d86c7e78dc44365391a17457b39b3ec424f99df4f72a5ec536ab7f1fa222f036c0ddb8cda89e5d36bcac73c4325f75c9b0e0a7f079e20e5d8fc8b
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
regasm.exepid process 1332 regasm.exe 1332 regasm.exe 1332 regasm.exe 1332 regasm.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
takeown.exetakeown.exetakeown.exepid process 1868 takeown.exe 776 takeown.exe 1152 takeown.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 11 IoCs
Processes:
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exedescription ioc process File created C:\Windows\SysWOW64\GroupPolicy\User\Registry.pol 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\system32\GroupPolicy 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\system32\GroupPolicy\gpt.ini 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\system32\GroupPolicy\User\Registry.pol 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File created C:\Windows\system32\GroupPolicy\User\Registry.pol 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File created C:\Windows\SysWOW64\GroupPolicy\gpt.ini 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Registry.pol 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File created C:\Windows\system32\GroupPolicy\gpt.ini 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe -
Drops file in Windows directory 2 IoCs
Processes:
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exedescription ioc process File opened for modification C:\Windows\SysWOW64 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe File opened for modification C:\Windows\system32 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe -
Modifies registry class 22 IoCs
Processes:
regasm.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\1.0.0.0\Class = "ie2.BHO" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\1.0.0.0\Assembly = "ie2, Version=1.0.0.0, Culture=neutral, PublicKeyToken=8e4675c62620fdea" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Users/Admin/AppData/Roaming/Founder Systems/ie2.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\ProgId regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\ProgId\ = "Internet Helper" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Internet Helper regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\ThreadingModel = "Both" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\Implemented Categories regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\Class = "ie2.BHO" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\CodeBase = "file:///C:/Users/Admin/AppData/Roaming/Founder Systems/ie2.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\1.0.0.0 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Internet Helper\CLSID\ = "{40AEF60B-A6F8-4389-9003-A683DD75B850}" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\ = "ie2.BHO" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{40AEF60B-A6F8-4389-9003-A683DD75B850}\InprocServer32\Assembly = "ie2, Version=1.0.0.0, Culture=neutral, PublicKeyToken=8e4675c62620fdea" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Internet Helper\ = "ie2.BHO" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Internet Helper\CLSID regasm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exepid process 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exedescription pid process target process PID 976 wrote to memory of 1184 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1184 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1184 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1184 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1808 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1808 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1808 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1808 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 776 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 776 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 776 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 776 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1368 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1368 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1368 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1368 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1400 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1400 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1400 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1400 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1152 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1152 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1152 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1152 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1744 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1744 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1744 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1744 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 784 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 784 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 784 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 784 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe cacls.exe PID 976 wrote to memory of 1868 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1868 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1868 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1868 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe takeown.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1500 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe gpupdate.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe PID 976 wrote to memory of 1332 976 25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe regasm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe"C:\Users\Admin\AppData\Local\Temp\25f2f5129c115a80eb14d4688ee50809402c74c840466b6c42a1c651d299c407.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\System32\GroupPolicy /t /e /g Everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\System32\GroupPolicy /t /e /g все:f2⤵
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /F C:\Windows\System32\GroupPolicy2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\SysWOW64\GroupPolicy /t /e /g Everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\SysWOW64\GroupPolicy /t /e /g все:f2⤵
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /F C:\Windows\SysWOW64\GroupPolicy2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\Sysnative\GroupPolicy /t /e /g Everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.exeC:\Windows\System32\cacls.exe C:\Windows\Sysnative\GroupPolicy /t /e /g все:f2⤵
-
C:\Windows\SysWOW64\takeown.exeC:\Windows\System32\takeown.exe /F C:\Windows\Sysnative\GroupPolicy2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\gpupdate.exeC:\Windows\System32\gpupdate.exe /force2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" /silent /codebase "C:\Users\Admin\AppData\Roaming\Founder Systems\ie2.dll"2⤵
- Loads dropped DLL
- Modifies registry class
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Founder Systems\ie2.dllFilesize
13KB
MD580f37b86aa4d710bd6c2d02ef144c018
SHA11b2b9c3bbc656c61b583301bb0f67b6aa5013cf2
SHA25605bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e
SHA5128ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b
-
C:\Windows\SysWOW64\GroupPolicy\User\Registry.polFilesize
472B
MD562ce4006ac00215377752dfaf25e20ae
SHA17e5b3b70613aa4dc1e71431e0855a47c7ee75cd2
SHA2561bb0208258be631a21cfed8166a49ee9467dfba8962a2f85361ce365e48f6962
SHA512d79b826cd909ec15128bfe898064854ca043171db3e55b961e0a55754567da62bc57eb9cc2a994b2e0c14b3be49707aff080df886d303de229643da47acbdaeb
-
C:\Windows\SysWOW64\GroupPolicy\gpt.iniFilesize
155B
MD5b18af26ec9d74dd4bfd14fd79a655c1d
SHA1df4c28816bc845a34d434347c10c6d14fcafdd01
SHA256ea62b60ea16af53841f2088458910586186bd3130d6dad443a27906f7baee7c9
SHA512bc64d120a55e93a17e81349a5a9856556612a44673ae9ae8589a66638e25685b9b70608ce23b19e0919797b04da40dbca5cdc87c7f6eb1bfb93307dc4bc74ff2
-
\Users\Admin\AppData\Roaming\Founder Systems\ie2.dllFilesize
13KB
MD580f37b86aa4d710bd6c2d02ef144c018
SHA11b2b9c3bbc656c61b583301bb0f67b6aa5013cf2
SHA25605bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e
SHA5128ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b
-
\Users\Admin\AppData\Roaming\Founder Systems\ie2.dllFilesize
13KB
MD580f37b86aa4d710bd6c2d02ef144c018
SHA11b2b9c3bbc656c61b583301bb0f67b6aa5013cf2
SHA25605bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e
SHA5128ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b
-
\Users\Admin\AppData\Roaming\Founder Systems\ie2.dllFilesize
13KB
MD580f37b86aa4d710bd6c2d02ef144c018
SHA11b2b9c3bbc656c61b583301bb0f67b6aa5013cf2
SHA25605bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e
SHA5128ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b
-
\Users\Admin\AppData\Roaming\Founder Systems\ie2.dllFilesize
13KB
MD580f37b86aa4d710bd6c2d02ef144c018
SHA11b2b9c3bbc656c61b583301bb0f67b6aa5013cf2
SHA25605bb2b7af14c316d5af9148ccd0af02bc0b77e4d19468032c88579a825318a9e
SHA5128ccfc98f77b46d55309299461979c575ed47eefdbf54402179469f308211c128bd72406046d68f02d5e7d3f1c4ac3adc9cc474cb888d7e01dc9000130238500b
-
memory/776-59-0x0000000000000000-mapping.dmp
-
memory/784-66-0x0000000000000000-mapping.dmp
-
memory/976-56-0x0000000000400000-0x00000000004D6000-memory.dmpFilesize
856KB
-
memory/976-55-0x00000000005C0000-0x0000000000603000-memory.dmpFilesize
268KB
-
memory/976-54-0x0000000075E51000-0x0000000075E53000-memory.dmpFilesize
8KB
-
memory/1152-64-0x0000000000000000-mapping.dmp
-
memory/1184-57-0x0000000000000000-mapping.dmp
-
memory/1332-78-0x00000000005A0000-0x00000000005AA000-memory.dmpFilesize
40KB
-
memory/1332-69-0x0000000000000000-mapping.dmp
-
memory/1332-71-0x0000000000F70000-0x0000000000F82000-memory.dmpFilesize
72KB
-
memory/1332-75-0x00000000005A0000-0x00000000005AA000-memory.dmpFilesize
40KB
-
memory/1368-60-0x0000000000000000-mapping.dmp
-
memory/1400-63-0x0000000000000000-mapping.dmp
-
memory/1500-68-0x0000000000000000-mapping.dmp
-
memory/1744-65-0x0000000000000000-mapping.dmp
-
memory/1808-58-0x0000000000000000-mapping.dmp
-
memory/1868-67-0x0000000000000000-mapping.dmp