Analysis
-
max time kernel
166s -
max time network
170s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 21:03
Static task
static1
Behavioral task
behavioral1
Sample
Setup_Win_09-12-2022_19-18-09.msi
Resource
win7-20220812-en
General
-
Target
Setup_Win_09-12-2022_19-18-09.msi
-
Size
824KB
-
MD5
0353ee6b786fc95a51d4c60d9c5486e2
-
SHA1
30a34141c94e3f82da655582e6dae4bf2028936c
-
SHA256
3d29a16fbc3ae7400fa96d9161defa473fcd2fd82c24929c8254824d50dead6b
-
SHA512
4db04fc840669fd7c3f65da63674cb2516f92b12c9b2f4552cbc354af7f8ff8b3f3b7336301f203ccf39775f01cb9399d99d7213ba867aa19a3b6016a8ed8baa
-
SSDEEP
24576:EHL0l9mTn3Tp9Lold0aID/kJAHCxWPXoPcTPbgrQlRNKIg8gx:Er0la3kd0oxWPXoPcTPbgrQlRNKIg8g
Malware Config
Extracted
icedid
1178326404
broskabrwaf.com
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 3 680 rundll32.exe 4 680 rundll32.exe 6 680 rundll32.exe -
Loads dropped DLL 6 IoCs
Processes:
MsiExec.exerundll32.exerundll32.exepid process 2040 MsiExec.exe 1916 rundll32.exe 680 rundll32.exe 680 rundll32.exe 680 rundll32.exe 680 rundll32.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe -
Drops file in Windows directory 15 IoCs
Processes:
DrvInst.exemsiexec.exerundll32.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\6c7f01.ipi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\6c7f01.ipi msiexec.exe File created C:\Windows\Installer\6c7f00.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI818F.tmp msiexec.exe File created C:\Windows\Installer\6c7f03.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI823E.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\6c7f00.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI823E.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI823E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI823E.tmp-\test.cs.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI823E.tmp-\WixSharp.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msiexec.exerundll32.exepid process 1892 msiexec.exe 1892 msiexec.exe 680 rundll32.exe 680 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeDrvInst.exedescription pid process Token: SeShutdownPrivilege 1372 msiexec.exe Token: SeIncreaseQuotaPrivilege 1372 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeSecurityPrivilege 1892 msiexec.exe Token: SeCreateTokenPrivilege 1372 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1372 msiexec.exe Token: SeLockMemoryPrivilege 1372 msiexec.exe Token: SeIncreaseQuotaPrivilege 1372 msiexec.exe Token: SeMachineAccountPrivilege 1372 msiexec.exe Token: SeTcbPrivilege 1372 msiexec.exe Token: SeSecurityPrivilege 1372 msiexec.exe Token: SeTakeOwnershipPrivilege 1372 msiexec.exe Token: SeLoadDriverPrivilege 1372 msiexec.exe Token: SeSystemProfilePrivilege 1372 msiexec.exe Token: SeSystemtimePrivilege 1372 msiexec.exe Token: SeProfSingleProcessPrivilege 1372 msiexec.exe Token: SeIncBasePriorityPrivilege 1372 msiexec.exe Token: SeCreatePagefilePrivilege 1372 msiexec.exe Token: SeCreatePermanentPrivilege 1372 msiexec.exe Token: SeBackupPrivilege 1372 msiexec.exe Token: SeRestorePrivilege 1372 msiexec.exe Token: SeShutdownPrivilege 1372 msiexec.exe Token: SeDebugPrivilege 1372 msiexec.exe Token: SeAuditPrivilege 1372 msiexec.exe Token: SeSystemEnvironmentPrivilege 1372 msiexec.exe Token: SeChangeNotifyPrivilege 1372 msiexec.exe Token: SeRemoteShutdownPrivilege 1372 msiexec.exe Token: SeUndockPrivilege 1372 msiexec.exe Token: SeSyncAgentPrivilege 1372 msiexec.exe Token: SeEnableDelegationPrivilege 1372 msiexec.exe Token: SeManageVolumePrivilege 1372 msiexec.exe Token: SeImpersonatePrivilege 1372 msiexec.exe Token: SeCreateGlobalPrivilege 1372 msiexec.exe Token: SeBackupPrivilege 1928 vssvc.exe Token: SeRestorePrivilege 1928 vssvc.exe Token: SeAuditPrivilege 1928 vssvc.exe Token: SeBackupPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1184 DrvInst.exe Token: SeLoadDriverPrivilege 1184 DrvInst.exe Token: SeLoadDriverPrivilege 1184 DrvInst.exe Token: SeLoadDriverPrivilege 1184 DrvInst.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe Token: SeTakeOwnershipPrivilege 1892 msiexec.exe Token: SeRestorePrivilege 1892 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 1372 msiexec.exe 1372 msiexec.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
msiexec.exeMsiExec.exerundll32.exedescription pid process target process PID 1892 wrote to memory of 2040 1892 msiexec.exe MsiExec.exe PID 1892 wrote to memory of 2040 1892 msiexec.exe MsiExec.exe PID 1892 wrote to memory of 2040 1892 msiexec.exe MsiExec.exe PID 1892 wrote to memory of 2040 1892 msiexec.exe MsiExec.exe PID 1892 wrote to memory of 2040 1892 msiexec.exe MsiExec.exe PID 2040 wrote to memory of 1916 2040 MsiExec.exe rundll32.exe PID 2040 wrote to memory of 1916 2040 MsiExec.exe rundll32.exe PID 2040 wrote to memory of 1916 2040 MsiExec.exe rundll32.exe PID 1916 wrote to memory of 680 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 680 1916 rundll32.exe rundll32.exe PID 1916 wrote to memory of 680 1916 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\Setup_Win_09-12-2022_19-18-09.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding F1A54D24A303BB8591A4FC2ED40FDCA12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI823E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7111477 1 test.cs!Test.CustomActions.MyAction3⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\tmp8E0D.dll",init4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005B8" "00000000000004AC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8E0D.dllFilesize
374KB
MD5406807302fb7a2018049151f6cb83a2c
SHA1cf5981be45e5c2728820023b823639b3cfcf4e18
SHA256c21756e3dafea8adc4119fdd5421c3e430dfa80aa961505133b39d41b4a7c26e
SHA5126ada4f56d88eaacf0d47bce69610be4f58281f0410316ae27728a794b4ada10f3bf6717c38769beb1e8944266e13ee77096e620955de1ef1907ad0e71cd8767b
-
C:\Windows\Installer\MSI823E.tmpFilesize
413KB
MD5aa2bfd71132b87e7533538ee3dfa9283
SHA17a3e00dec0dcf5c5a1f6f8c1d27672343f2e1f9c
SHA25692ed364ccd1942fc953c0fb1d3b039b54a541f242b0dd460c77c55f69c4c28e3
SHA512610b0ba2f9cf0c552c8e354affe1ed43afbdbe9026aab5532ff747e3a3b36911348696074ea2cc50a410746129c60337405a90564254462d2eb2ec8fa85ec050
-
\Users\Admin\AppData\Local\Temp\tmp8E0D.dllFilesize
374KB
MD5406807302fb7a2018049151f6cb83a2c
SHA1cf5981be45e5c2728820023b823639b3cfcf4e18
SHA256c21756e3dafea8adc4119fdd5421c3e430dfa80aa961505133b39d41b4a7c26e
SHA5126ada4f56d88eaacf0d47bce69610be4f58281f0410316ae27728a794b4ada10f3bf6717c38769beb1e8944266e13ee77096e620955de1ef1907ad0e71cd8767b
-
\Users\Admin\AppData\Local\Temp\tmp8E0D.dllFilesize
374KB
MD5406807302fb7a2018049151f6cb83a2c
SHA1cf5981be45e5c2728820023b823639b3cfcf4e18
SHA256c21756e3dafea8adc4119fdd5421c3e430dfa80aa961505133b39d41b4a7c26e
SHA5126ada4f56d88eaacf0d47bce69610be4f58281f0410316ae27728a794b4ada10f3bf6717c38769beb1e8944266e13ee77096e620955de1ef1907ad0e71cd8767b
-
\Users\Admin\AppData\Local\Temp\tmp8E0D.dllFilesize
374KB
MD5406807302fb7a2018049151f6cb83a2c
SHA1cf5981be45e5c2728820023b823639b3cfcf4e18
SHA256c21756e3dafea8adc4119fdd5421c3e430dfa80aa961505133b39d41b4a7c26e
SHA5126ada4f56d88eaacf0d47bce69610be4f58281f0410316ae27728a794b4ada10f3bf6717c38769beb1e8944266e13ee77096e620955de1ef1907ad0e71cd8767b
-
\Users\Admin\AppData\Local\Temp\tmp8E0D.dllFilesize
374KB
MD5406807302fb7a2018049151f6cb83a2c
SHA1cf5981be45e5c2728820023b823639b3cfcf4e18
SHA256c21756e3dafea8adc4119fdd5421c3e430dfa80aa961505133b39d41b4a7c26e
SHA5126ada4f56d88eaacf0d47bce69610be4f58281f0410316ae27728a794b4ada10f3bf6717c38769beb1e8944266e13ee77096e620955de1ef1907ad0e71cd8767b
-
\Windows\Installer\MSI823E.tmpFilesize
413KB
MD5aa2bfd71132b87e7533538ee3dfa9283
SHA17a3e00dec0dcf5c5a1f6f8c1d27672343f2e1f9c
SHA25692ed364ccd1942fc953c0fb1d3b039b54a541f242b0dd460c77c55f69c4c28e3
SHA512610b0ba2f9cf0c552c8e354affe1ed43afbdbe9026aab5532ff747e3a3b36911348696074ea2cc50a410746129c60337405a90564254462d2eb2ec8fa85ec050
-
\Windows\Installer\MSI823E.tmpFilesize
413KB
MD5aa2bfd71132b87e7533538ee3dfa9283
SHA17a3e00dec0dcf5c5a1f6f8c1d27672343f2e1f9c
SHA25692ed364ccd1942fc953c0fb1d3b039b54a541f242b0dd460c77c55f69c4c28e3
SHA512610b0ba2f9cf0c552c8e354affe1ed43afbdbe9026aab5532ff747e3a3b36911348696074ea2cc50a410746129c60337405a90564254462d2eb2ec8fa85ec050
-
memory/680-72-0x00000000001A0000-0x00000000001A9000-memory.dmpFilesize
36KB
-
memory/680-66-0x0000000000000000-mapping.dmp
-
memory/1372-54-0x000007FEFC371000-0x000007FEFC373000-memory.dmpFilesize
8KB
-
memory/1916-60-0x0000000000000000-mapping.dmp
-
memory/1916-64-0x000000001A430000-0x000000001A4A0000-memory.dmpFilesize
448KB
-
memory/1916-63-0x0000000001C20000-0x0000000001C2A000-memory.dmpFilesize
40KB
-
memory/1916-62-0x0000000001C40000-0x0000000001C6E000-memory.dmpFilesize
184KB
-
memory/2040-56-0x0000000000000000-mapping.dmp