Analysis
-
max time kernel
138s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
document_157_invoice#PDF.msi
Resource
win7-20220812-en
General
-
Target
document_157_invoice#PDF.msi
-
Size
660KB
-
MD5
c00b5441e87185716ce13e82dafabbf7
-
SHA1
40bdbd060266d60a325f1d83cad95ff8d0608af9
-
SHA256
979c1e609c8fb00a69412d69c50a8456fa9e9658ed1f8d538301a3d6e0ced032
-
SHA512
6e49a1452702a4f90fc6d431d2baabf0a41c7bc5caaffcdb5b799bbe157c13352c2a258647a53318407549b1eaa5d40a6a64f8886979911ae58a062a3e0d92b0
-
SSDEEP
12288:xwHL0D7HkCPumy9chfA+tL5O//Y777777LwmqLpSLF3u:uHL03/zyt+B5OXDV2F3u
Malware Config
Extracted
icedid
764376559
saintrefunda.com
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 860 rundll32.exe 4 860 rundll32.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exerundll32.exerundll32.exepid process 604 MsiExec.exe 1640 rundll32.exe 860 rundll32.exe 860 rundll32.exe 860 rundll32.exe 860 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Windows directory 15 IoCs
Processes:
DrvInst.exemsiexec.exerundll32.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\6d1aa4.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI1BAC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI1BAC.tmp-\WixSharp.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI1BAC.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\6d1aa3.msi msiexec.exe File opened for modification C:\Windows\Installer\6d1aa3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI1BAC.tmp-\test.cs.dll rundll32.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSI1BAC.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI653A.tmp msiexec.exe File created C:\Windows\Installer\6d1aa6.msi msiexec.exe File opened for modification C:\Windows\Installer\6d1aa4.ipi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exerundll32.exepid process 1144 msiexec.exe 1144 msiexec.exe 860 rundll32.exe 860 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1504 msiexec.exe Token: SeIncreaseQuotaPrivilege 1504 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeSecurityPrivilege 1144 msiexec.exe Token: SeCreateTokenPrivilege 1504 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1504 msiexec.exe Token: SeLockMemoryPrivilege 1504 msiexec.exe Token: SeIncreaseQuotaPrivilege 1504 msiexec.exe Token: SeMachineAccountPrivilege 1504 msiexec.exe Token: SeTcbPrivilege 1504 msiexec.exe Token: SeSecurityPrivilege 1504 msiexec.exe Token: SeTakeOwnershipPrivilege 1504 msiexec.exe Token: SeLoadDriverPrivilege 1504 msiexec.exe Token: SeSystemProfilePrivilege 1504 msiexec.exe Token: SeSystemtimePrivilege 1504 msiexec.exe Token: SeProfSingleProcessPrivilege 1504 msiexec.exe Token: SeIncBasePriorityPrivilege 1504 msiexec.exe Token: SeCreatePagefilePrivilege 1504 msiexec.exe Token: SeCreatePermanentPrivilege 1504 msiexec.exe Token: SeBackupPrivilege 1504 msiexec.exe Token: SeRestorePrivilege 1504 msiexec.exe Token: SeShutdownPrivilege 1504 msiexec.exe Token: SeDebugPrivilege 1504 msiexec.exe Token: SeAuditPrivilege 1504 msiexec.exe Token: SeSystemEnvironmentPrivilege 1504 msiexec.exe Token: SeChangeNotifyPrivilege 1504 msiexec.exe Token: SeRemoteShutdownPrivilege 1504 msiexec.exe Token: SeUndockPrivilege 1504 msiexec.exe Token: SeSyncAgentPrivilege 1504 msiexec.exe Token: SeEnableDelegationPrivilege 1504 msiexec.exe Token: SeManageVolumePrivilege 1504 msiexec.exe Token: SeImpersonatePrivilege 1504 msiexec.exe Token: SeCreateGlobalPrivilege 1504 msiexec.exe Token: SeBackupPrivilege 800 vssvc.exe Token: SeRestorePrivilege 800 vssvc.exe Token: SeAuditPrivilege 800 vssvc.exe Token: SeBackupPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1532 DrvInst.exe Token: SeLoadDriverPrivilege 1532 DrvInst.exe Token: SeLoadDriverPrivilege 1532 DrvInst.exe Token: SeLoadDriverPrivilege 1532 DrvInst.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe Token: SeTakeOwnershipPrivilege 1144 msiexec.exe Token: SeRestorePrivilege 1144 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1504 msiexec.exe 1504 msiexec.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
msiexec.exeMsiExec.exerundll32.exedescription pid process target process PID 1144 wrote to memory of 604 1144 msiexec.exe MsiExec.exe PID 1144 wrote to memory of 604 1144 msiexec.exe MsiExec.exe PID 1144 wrote to memory of 604 1144 msiexec.exe MsiExec.exe PID 1144 wrote to memory of 604 1144 msiexec.exe MsiExec.exe PID 1144 wrote to memory of 604 1144 msiexec.exe MsiExec.exe PID 604 wrote to memory of 1640 604 MsiExec.exe rundll32.exe PID 604 wrote to memory of 1640 604 MsiExec.exe rundll32.exe PID 604 wrote to memory of 1640 604 MsiExec.exe rundll32.exe PID 1640 wrote to memory of 860 1640 rundll32.exe rundll32.exe PID 1640 wrote to memory of 860 1640 rundll32.exe rundll32.exe PID 1640 wrote to memory of 860 1640 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\document_157_invoice#PDF.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding 86519195F1F5A3569FDC17522405DBC42⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI1BAC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7150805 1 test.cs!Test.CustomActions.MyAction3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\tmp4423.dll",init4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "000000000000049C" "0000000000000570"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4423.dllFilesize
209KB
MD55cb757d0aed9740075cbd4e381f5432a
SHA15134ea14539d68615e82e8cab6fecee521068d1e
SHA256d2061db77dd5377d5e9006ef166196ef1b6604f670d9f695a6c4f265fda9d2b6
SHA512695d1613ac3d68e8ee9802ea1869af9592223272c4167422cb527b1ee3ad0e92a5cfa87609146e49210cfb1195d843f32c9506e13c355e7a71eb59e1ec38e40e
-
C:\Windows\Installer\MSI1BAC.tmpFilesize
413KB
MD573f4256925d931f7e18e045b5c94fa8e
SHA1b50352241abc5fb8f79b305fa18b7da5f8992868
SHA256b58f861ba94c6d118c0f28d9494fe0233657e1150595ad9d220beb92af6f4cc8
SHA5128120a439d7882f7d4ee49d3b81667b21a09ef2b345f4025f48426d90b103d55c9b9bc64258a98417d8e86f5984ceffb316557e46e8927a05c814d296a9560496
-
\??\PIPE\samrMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\tmp4423.dllFilesize
209KB
MD55cb757d0aed9740075cbd4e381f5432a
SHA15134ea14539d68615e82e8cab6fecee521068d1e
SHA256d2061db77dd5377d5e9006ef166196ef1b6604f670d9f695a6c4f265fda9d2b6
SHA512695d1613ac3d68e8ee9802ea1869af9592223272c4167422cb527b1ee3ad0e92a5cfa87609146e49210cfb1195d843f32c9506e13c355e7a71eb59e1ec38e40e
-
\Users\Admin\AppData\Local\Temp\tmp4423.dllFilesize
209KB
MD55cb757d0aed9740075cbd4e381f5432a
SHA15134ea14539d68615e82e8cab6fecee521068d1e
SHA256d2061db77dd5377d5e9006ef166196ef1b6604f670d9f695a6c4f265fda9d2b6
SHA512695d1613ac3d68e8ee9802ea1869af9592223272c4167422cb527b1ee3ad0e92a5cfa87609146e49210cfb1195d843f32c9506e13c355e7a71eb59e1ec38e40e
-
\Users\Admin\AppData\Local\Temp\tmp4423.dllFilesize
209KB
MD55cb757d0aed9740075cbd4e381f5432a
SHA15134ea14539d68615e82e8cab6fecee521068d1e
SHA256d2061db77dd5377d5e9006ef166196ef1b6604f670d9f695a6c4f265fda9d2b6
SHA512695d1613ac3d68e8ee9802ea1869af9592223272c4167422cb527b1ee3ad0e92a5cfa87609146e49210cfb1195d843f32c9506e13c355e7a71eb59e1ec38e40e
-
\Users\Admin\AppData\Local\Temp\tmp4423.dllFilesize
209KB
MD55cb757d0aed9740075cbd4e381f5432a
SHA15134ea14539d68615e82e8cab6fecee521068d1e
SHA256d2061db77dd5377d5e9006ef166196ef1b6604f670d9f695a6c4f265fda9d2b6
SHA512695d1613ac3d68e8ee9802ea1869af9592223272c4167422cb527b1ee3ad0e92a5cfa87609146e49210cfb1195d843f32c9506e13c355e7a71eb59e1ec38e40e
-
\Windows\Installer\MSI1BAC.tmpFilesize
413KB
MD573f4256925d931f7e18e045b5c94fa8e
SHA1b50352241abc5fb8f79b305fa18b7da5f8992868
SHA256b58f861ba94c6d118c0f28d9494fe0233657e1150595ad9d220beb92af6f4cc8
SHA5128120a439d7882f7d4ee49d3b81667b21a09ef2b345f4025f48426d90b103d55c9b9bc64258a98417d8e86f5984ceffb316557e46e8927a05c814d296a9560496
-
\Windows\Installer\MSI1BAC.tmpFilesize
413KB
MD573f4256925d931f7e18e045b5c94fa8e
SHA1b50352241abc5fb8f79b305fa18b7da5f8992868
SHA256b58f861ba94c6d118c0f28d9494fe0233657e1150595ad9d220beb92af6f4cc8
SHA5128120a439d7882f7d4ee49d3b81667b21a09ef2b345f4025f48426d90b103d55c9b9bc64258a98417d8e86f5984ceffb316557e46e8927a05c814d296a9560496
-
memory/604-57-0x0000000000000000-mapping.dmp
-
memory/860-67-0x0000000000000000-mapping.dmp
-
memory/860-73-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB
-
memory/1504-54-0x000007FEFC141000-0x000007FEFC143000-memory.dmpFilesize
8KB
-
memory/1640-64-0x0000000001BF0000-0x0000000001BFA000-memory.dmpFilesize
40KB
-
memory/1640-65-0x00000000020A0000-0x0000000002110000-memory.dmpFilesize
448KB
-
memory/1640-63-0x0000000000200000-0x000000000022E000-memory.dmpFilesize
184KB
-
memory/1640-61-0x0000000000000000-mapping.dmp