Analysis
-
max time kernel
52s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-11-2022 15:23
Static task
static1
Behavioral task
behavioral1
Sample
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe
Resource
win7-20220812-en
General
-
Target
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe
-
Size
9.6MB
-
MD5
699bdbd2b656d80d8e8a467025536d52
-
SHA1
cb4a2a7f3b39fc41ce0d935e7851117422364c76
-
SHA256
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b
-
SHA512
0589ad9ee15411f5de41ef6570515b0b320a3cae040e70f94bb56ecb85292be561ac05f37891fe913c26045ac5058118daa7f3c66681458ecb693bdbfb65758f
-
SSDEEP
196608:mZNNPxSRvMx1GffQf0DQR3FkiUzD30xs7LpLJwN7aIH/avHwjwh2FrfX6:mZN17GffEJRSiUfZXptOWq/3s2FX
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpFWCapUpdate_v42.exeMEInfoWin64.exepid process 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp 1348 FWCapUpdate_v42.exe 1496 MEInfoWin64.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exeicacls.exeicacls.exepid process 940 takeown.exe 2012 icacls.exe 1304 icacls.exe 1728 icacls.exe -
Loads dropped DLL 4 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpFWCapUpdate_v42.exepid process 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp 1348 FWCapUpdate_v42.exe 1924 -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
icacls.exetakeown.exeicacls.exeicacls.exepid process 1728 icacls.exe 940 takeown.exe 2012 icacls.exe 1304 icacls.exe -
Drops file in Windows directory 2 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpdescription ioc process File created C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe File created C:\Windows\TempInst\is-U1351.tmp\_isetup\_setup64.tmp 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1776 schtasks.exe 1196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmppid process 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmppid process 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpFWCapUpdate_v42.exedescription pid process target process PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 1096 wrote to memory of 848 1096 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp PID 848 wrote to memory of 940 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp takeown.exe PID 848 wrote to memory of 940 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp takeown.exe PID 848 wrote to memory of 940 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp takeown.exe PID 848 wrote to memory of 940 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp takeown.exe PID 848 wrote to memory of 2012 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 2012 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 2012 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 2012 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1304 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1304 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1304 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1304 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1728 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1728 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1728 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1728 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp icacls.exe PID 848 wrote to memory of 1776 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1776 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1776 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1776 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1884 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1884 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1884 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1884 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1196 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1196 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1196 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1196 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 428 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 428 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 428 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 428 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp schtasks.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 848 wrote to memory of 1348 848 2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp FWCapUpdate_v42.exe PID 1348 wrote to memory of 1496 1348 FWCapUpdate_v42.exe MEInfoWin64.exe PID 1348 wrote to memory of 1496 1348 FWCapUpdate_v42.exe MEInfoWin64.exe PID 1348 wrote to memory of 1496 1348 FWCapUpdate_v42.exe MEInfoWin64.exe PID 1348 wrote to memory of 1496 1348 FWCapUpdate_v42.exe MEInfoWin64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe"C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp"C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp" /SL5="$60122,9284365,180224,C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\takeown.exe"C:\Windows\system32\takeown.exe" /f C:\DRIVERS /a /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" C:\DRIVERS /reset /T /C /L /Q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" C:\DRIVERS /inheritance:e /grant:r *S-1-5-32-544:(OI)(CI)F *S-1-5-18:(OI)(CI)F *S-1-5-32-545:(OI)(CI)RX /T /C /L /Q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exe"C:\Windows\system32\icacls.exe" C:\DRIVERS /inheritance:r /C /L /Q3⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /CREATE /XML C:\DRIVERS\WIN\ME\20220311.16243571\DeleteFolder.xml /TN "\LenovoCleanupFolder-20220311.162452"3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /CHANGE /TN "\LenovoCleanupFolder-20220311.162452" /TR "C:\Windows\system32\cmd.exe /C 'rd /s /q C:\DRIVERS\WIN\ME\20220311.16243571\"3⤵
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /CREATE /XML C:\DRIVERS\WIN\ME\20220311.16243571\DeleteTasks.xml /TN "\LenovoCleanupTasks-20220311.162452"3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /CHANGE /TN "\LenovoCleanupTasks-20220311.162452" /TR "C:\Windows\system32\cmd.exe /C 'C:\Windows\system32\schtasks.exe /Delete /TN LenovoCleanupFolder-20220311.162452 /F && C:\Windows\system32\schtasks.exe /Delete /TN LenovoCleanupTasks-20220311.162452 /F'"3⤵
-
C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe"C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exe"MEInfoWin64.exe" -fwsts4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\DRIVERS\WIN\ME\20220311.16243571\Config.iniFilesize
374B
MD5473bf74fab173e3612c44f05e376dda7
SHA1e9974bed8f7b07d3679ca4cef4b9ef5021eb44b3
SHA256c39d95bb3ed078feffa8cada92f84572dfd8931fd76dcf6b39b8a87bb6fd408a
SHA512691818c54ca5e4457755561bac543b67e7e50ef81eb5a940679324c67a93de78c4764585bfafc35a91875e3f4bd2eafb3154b0c37f636a790f7a3c3c9d4cad99
-
C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exeFilesize
49KB
MD55e1e1d2a8a7108c90fcea38b0dd27ddf
SHA12827ddd78f28e9831e59cbf4e2fa480ac0afd005
SHA25602317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d
SHA512b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6
-
C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exeFilesize
49KB
MD55e1e1d2a8a7108c90fcea38b0dd27ddf
SHA12827ddd78f28e9831e59cbf4e2fa480ac0afd005
SHA25602317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d
SHA512b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6
-
C:\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exeFilesize
2.2MB
MD533a03b105494fefceb9822adacb280b6
SHA18d44c5ea16ee6ab00d6530afb89d34d5bc22f705
SHA25663989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257
SHA51242a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8
-
C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpFilesize
2.8MB
MD55874ed6c6fdc30e613302986486f606f
SHA15347de369a045ba5c8e3bedc3a87a370cf2cff7b
SHA2565afa900bdf179f05d50930e2a299cfffccec93d2a3dfb4e203910c2dddbeb846
SHA512adfdabf349b8aef5b55526a564ac1352c44cec2121a075c8d24fb5a4971383dd0a04ad83b47a0979c322a458dc75e0fac35b25a7309fb12df1ade33db012a6b5
-
\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exeFilesize
49KB
MD55e1e1d2a8a7108c90fcea38b0dd27ddf
SHA12827ddd78f28e9831e59cbf4e2fa480ac0afd005
SHA25602317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d
SHA512b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6
-
\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exeFilesize
2.2MB
MD533a03b105494fefceb9822adacb280b6
SHA18d44c5ea16ee6ab00d6530afb89d34d5bc22f705
SHA25663989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257
SHA51242a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8
-
\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exeFilesize
2.2MB
MD533a03b105494fefceb9822adacb280b6
SHA18d44c5ea16ee6ab00d6530afb89d34d5bc22f705
SHA25663989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257
SHA51242a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8
-
\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmpFilesize
2.8MB
MD55874ed6c6fdc30e613302986486f606f
SHA15347de369a045ba5c8e3bedc3a87a370cf2cff7b
SHA2565afa900bdf179f05d50930e2a299cfffccec93d2a3dfb4e203910c2dddbeb846
SHA512adfdabf349b8aef5b55526a564ac1352c44cec2121a075c8d24fb5a4971383dd0a04ad83b47a0979c322a458dc75e0fac35b25a7309fb12df1ade33db012a6b5
-
memory/428-70-0x0000000000000000-mapping.dmp
-
memory/848-66-0x0000000074D81000-0x0000000074D83000-memory.dmpFilesize
8KB
-
memory/848-58-0x0000000000000000-mapping.dmp
-
memory/940-62-0x0000000000000000-mapping.dmp
-
memory/1096-84-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1096-54-0x0000000075ED1000-0x0000000075ED3000-memory.dmpFilesize
8KB
-
memory/1096-61-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1096-55-0x0000000000400000-0x0000000000439000-memory.dmpFilesize
228KB
-
memory/1196-69-0x0000000000000000-mapping.dmp
-
memory/1304-64-0x0000000000000000-mapping.dmp
-
memory/1348-72-0x0000000000000000-mapping.dmp
-
memory/1348-75-0x0000000000970000-0x0000000000980000-memory.dmpFilesize
64KB
-
memory/1348-82-0x0000000004E55000-0x0000000004E66000-memory.dmpFilesize
68KB
-
memory/1348-83-0x0000000004E55000-0x0000000004E66000-memory.dmpFilesize
68KB
-
memory/1496-79-0x0000000000000000-mapping.dmp
-
memory/1728-65-0x0000000000000000-mapping.dmp
-
memory/1776-67-0x0000000000000000-mapping.dmp
-
memory/1884-68-0x0000000000000000-mapping.dmp
-
memory/2012-63-0x0000000000000000-mapping.dmp