Analysis
-
max time kernel
130s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 22:29
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_PCPSPIRSZ2020022.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ_PCPSPIRSZ2020022.exe
Resource
win10v2004-20220414-en
General
-
Target
RFQ_PCPSPIRSZ2020022.exe
-
Size
895KB
-
MD5
78b61b1e9b375628d02bf7d289b1aeab
-
SHA1
f861925e28320134d0458100c9898d6fdd8c0154
-
SHA256
a551bc2327862c1430dac51dce368001622525fae235ca689f7b055e0d3125c7
-
SHA512
05cd3aeefb9fee84c813af2951eccf2b5c2e1679a3fe892cdd9d6a37cc215064bde4e9a39f41c1afbba9e672020a1f7e5a7c25452f01ffe91ec54de48c2ef3cd
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file -
Looks for VirtualBox Guest Additions in registry 2 TTPs
-
Looks for VMWare Tools registry key 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RFQ_PCPSPIRSZ2020022.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ_PCPSPIRSZ2020022.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Control Panel\International\Geo\Nation RFQ_PCPSPIRSZ2020022.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook RFQ_PCPSPIRSZ2020022.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RFQ_PCPSPIRSZ2020022.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RFQ_PCPSPIRSZ2020022.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exedescription pid process target process PID 1828 set thread context of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exepid process 1616 RFQ_PCPSPIRSZ2020022.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exeRFQ_PCPSPIRSZ2020022.exepowershell.exepid process 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1828 RFQ_PCPSPIRSZ2020022.exe 1616 RFQ_PCPSPIRSZ2020022.exe 1616 RFQ_PCPSPIRSZ2020022.exe 1616 RFQ_PCPSPIRSZ2020022.exe 1616 RFQ_PCPSPIRSZ2020022.exe 1616 RFQ_PCPSPIRSZ2020022.exe 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exeRFQ_PCPSPIRSZ2020022.exepowershell.exedescription pid process Token: SeDebugPrivilege 1828 RFQ_PCPSPIRSZ2020022.exe Token: SeDebugPrivilege 1616 RFQ_PCPSPIRSZ2020022.exe Token: SeDebugPrivilege 2000 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exepid process 1616 RFQ_PCPSPIRSZ2020022.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exeRFQ_PCPSPIRSZ2020022.execmd.exedescription pid process target process PID 1828 wrote to memory of 1760 1828 RFQ_PCPSPIRSZ2020022.exe schtasks.exe PID 1828 wrote to memory of 1760 1828 RFQ_PCPSPIRSZ2020022.exe schtasks.exe PID 1828 wrote to memory of 1760 1828 RFQ_PCPSPIRSZ2020022.exe schtasks.exe PID 1828 wrote to memory of 1760 1828 RFQ_PCPSPIRSZ2020022.exe schtasks.exe PID 1828 wrote to memory of 2032 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 2032 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 2032 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 2032 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1260 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1260 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1260 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1260 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1008 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1008 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1008 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1008 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1376 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1376 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1376 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1376 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1828 wrote to memory of 1616 1828 RFQ_PCPSPIRSZ2020022.exe RFQ_PCPSPIRSZ2020022.exe PID 1616 wrote to memory of 1860 1616 RFQ_PCPSPIRSZ2020022.exe cmd.exe PID 1616 wrote to memory of 1860 1616 RFQ_PCPSPIRSZ2020022.exe cmd.exe PID 1616 wrote to memory of 1860 1616 RFQ_PCPSPIRSZ2020022.exe cmd.exe PID 1616 wrote to memory of 1860 1616 RFQ_PCPSPIRSZ2020022.exe cmd.exe PID 1860 wrote to memory of 2000 1860 cmd.exe powershell.exe PID 1860 wrote to memory of 2000 1860 cmd.exe powershell.exe PID 1860 wrote to memory of 2000 1860 cmd.exe powershell.exe PID 1860 wrote to memory of 2000 1860 cmd.exe powershell.exe -
outlook_office_path 1 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe -
outlook_win_path 1 IoCs
Processes:
RFQ_PCPSPIRSZ2020022.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RFQ_PCPSPIRSZ2020022.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dTPwlukysvENt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3FEE.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe"{path}"2⤵
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RFQ_PCPSPIRSZ2020022.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3FEE.tmpFilesize
1KB
MD561939d6f55a89ab30af39d0c78d6cfa0
SHA17263b518587090980e8666cf2aaf5fd5bb9834fb
SHA256c1a6b3620f0e2fbb781306acd39b1676155e2a3a9013ecb5151a8e41ff6d9283
SHA51206d6044a8e0f12c3b874d721f14b7d535c82fe24dca2109e2b45453181827f5662fcf1c8e4a289ecf47ef68396522fecf841fc2e6b483b3f4f38d94fe1c7ccc6
-
memory/1616-72-0x00000000022F0000-0x0000000002368000-memory.dmpFilesize
480KB
-
memory/1616-66-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-62-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-65-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-77-0x00000000022B5000-0x00000000022C6000-memory.dmpFilesize
68KB
-
memory/1616-61-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-64-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-69-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-71-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/1616-67-0x00000000004B30EE-mapping.dmp
-
memory/1760-59-0x0000000000000000-mapping.dmp
-
memory/1828-55-0x0000000075541000-0x0000000075543000-memory.dmpFilesize
8KB
-
memory/1828-57-0x0000000007730000-0x00000000077F0000-memory.dmpFilesize
768KB
-
memory/1828-54-0x00000000000F0000-0x00000000001D6000-memory.dmpFilesize
920KB
-
memory/1828-56-0x0000000000590000-0x000000000059A000-memory.dmpFilesize
40KB
-
memory/1828-58-0x0000000007F40000-0x0000000007FF8000-memory.dmpFilesize
736KB
-
memory/1860-74-0x0000000000000000-mapping.dmp
-
memory/2000-78-0x000000006E910000-0x000000006EEBB000-memory.dmpFilesize
5.7MB
-
memory/2000-75-0x0000000000000000-mapping.dmp