Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29-03-2023 07:01
Static task
static1
Behavioral task
behavioral1
Sample
Office365 Checker.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Office365 Checker.exe
Resource
win10v2004-20230220-en
General
-
Target
Office365 Checker.exe
-
Size
1015KB
-
MD5
13070b929870d933534ac2169adaffe7
-
SHA1
4c6a9dedc8b85335e40f67786d025b2005a054f7
-
SHA256
0bd0e4c5302be6496b439de8c8b86fed3e94eca9d803dce5b0d1ef8d08a14d35
-
SHA512
732796485f8853b24adfbc7b7d7b58e5d4d95cd92cc20be547ba19ff27f89ac233763f4f370a1719290daf3a94f90a043528ee5f52dbe0b3fba87049f48d4922
-
SSDEEP
12288:LDCmeZxmoAQhPmeZxmoYTmr4/YO2MoLOA0sU+nCpCBMutsN:fWJIWJbr4/YOroLyB+nCpQDts
Malware Config
Extracted
njrat
0.7d
HacKed
blog.hackcrack.io:8082
Windows Explorer
-
reg_key
Windows Explorer
-
splitter
|'|'|
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
-
Executes dropped EXE 6 IoCs
Processes:
Setup.exeSetup.exeOffice365 Checker .exesvchost.exesvchost.exeexplorer.exepid process 572 Setup.exe 520 Setup.exe 1152 Office365 Checker .exe 1764 svchost.exe 1732 svchost.exe 912 explorer.exe -
Loads dropped DLL 5 IoCs
Processes:
WerFault.exepid process 832 WerFault.exe 832 WerFault.exe 832 WerFault.exe 832 WerFault.exe 832 WerFault.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Setup.exeSetup.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Corporation Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Corporation Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Explorer = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\explorer.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explorer.exedescription pid process target process PID 912 set thread context of 1488 912 explorer.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 832 1152 WerFault.exe Office365 Checker .exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
explorer.exepid process 912 explorer.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
Processes:
explorer.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 912 explorer.exe Token: SeDebugPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe Token: 33 1488 RegAsm.exe Token: SeIncBasePriorityPrivilege 1488 RegAsm.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
Office365 Checker.exeSetup.exeSetup.exeOffice365 Checker .exesvchost.exeexplorer.exeRegAsm.exedescription pid process target process PID 2012 wrote to memory of 572 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 572 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 572 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 520 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 520 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 520 2012 Office365 Checker.exe Setup.exe PID 2012 wrote to memory of 1152 2012 Office365 Checker.exe Office365 Checker .exe PID 2012 wrote to memory of 1152 2012 Office365 Checker.exe Office365 Checker .exe PID 2012 wrote to memory of 1152 2012 Office365 Checker.exe Office365 Checker .exe PID 2012 wrote to memory of 1152 2012 Office365 Checker.exe Office365 Checker .exe PID 520 wrote to memory of 1764 520 Setup.exe svchost.exe PID 520 wrote to memory of 1764 520 Setup.exe svchost.exe PID 520 wrote to memory of 1764 520 Setup.exe svchost.exe PID 572 wrote to memory of 1732 572 Setup.exe svchost.exe PID 572 wrote to memory of 1732 572 Setup.exe svchost.exe PID 572 wrote to memory of 1732 572 Setup.exe svchost.exe PID 1152 wrote to memory of 832 1152 Office365 Checker .exe WerFault.exe PID 1152 wrote to memory of 832 1152 Office365 Checker .exe WerFault.exe PID 1152 wrote to memory of 832 1152 Office365 Checker .exe WerFault.exe PID 1152 wrote to memory of 832 1152 Office365 Checker .exe WerFault.exe PID 1732 wrote to memory of 912 1732 svchost.exe explorer.exe PID 1732 wrote to memory of 912 1732 svchost.exe explorer.exe PID 1732 wrote to memory of 912 1732 svchost.exe explorer.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 912 wrote to memory of 1488 912 explorer.exe RegAsm.exe PID 1488 wrote to memory of 1952 1488 RegAsm.exe netsh.exe PID 1488 wrote to memory of 1952 1488 RegAsm.exe netsh.exe PID 1488 wrote to memory of 1952 1488 RegAsm.exe netsh.exe PID 1488 wrote to memory of 1952 1488 RegAsm.exe netsh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"C:\Users\Admin\AppData\Local\Temp\Office365 Checker.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe#cmd5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" "RegAsm.exe" ENABLE6⤵
- Modifies Windows Firewall
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1152 -s 5403⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Local\Temp\Setup.exeFilesize
451KB
MD58279b0e5326e13b048dc80d47ce7e86b
SHA1336ff5fbe4cae573d9a5f7092eb53ca879a9b456
SHA256d063a1f446540260d177d7e4f25510164cbb079d22ce7715a51ad357aa71cfa6
SHA51271c4d09c9a654ce6b682e1e832b2187cf71a22cd413d8da0828236542933f9607fbdf06ba8350d5e32f349469a690cd7239284f7986fcaba1f587ba89c7409e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
208KB
MD5fdba80a556cada3d7e2b5df86d1948a5
SHA11b8aaafbebc63f0aa886169eedbead626498efe3
SHA256175c43bdbfff0d22282e59c122c47c8555a60538a930efeb29738d34ccd59b05
SHA512ef9e9c0c80054c8d06d373455229d1de0bc8b0ac570ba29ba833325e1d534db1ee2140a769d0900a9bff07d925b969bb2db2bf473d2c4b21b8f60cf72247f824
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exeFilesize
318KB
MD523ce98b7618b4feb3c10bee606d171bd
SHA13e2359692f447a175610312be6f98f726d9defb3
SHA256520d313db85b0b768df9ab47e1f13b8b38a2b77db505a3bb268709e02ed1c881
SHA5126db4ac9a0a0a87ed37e053924fc6f6378de97131cbd11e58dde81839b8e2f1869cfdbcb1cd518bab6b3d43ae6d3b7ca7674ee5880e3e80c91cec1920fb61c38b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.zipFilesize
268KB
MD5aa593e0f1bcb39782bfb6f4cfaee14b0
SHA1110ed06e0af7fa36016b5d2c5e810f2a070b8f39
SHA256030e3bfc09e0c73dac64c65dbdd59af54350f76125e5ce2163c6e9000fde7099
SHA512a3ae6ccd3bda9a8429667783aad627fe594fa077e5704e21bf95f1ebc5977716c2c9885e3aac3913720a47f5813b5c08d16aee343b2b5ef349bf830c3564dddc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.zipFilesize
268KB
MD5aa593e0f1bcb39782bfb6f4cfaee14b0
SHA1110ed06e0af7fa36016b5d2c5e810f2a070b8f39
SHA256030e3bfc09e0c73dac64c65dbdd59af54350f76125e5ce2163c6e9000fde7099
SHA512a3ae6ccd3bda9a8429667783aad627fe594fa077e5704e21bf95f1ebc5977716c2c9885e3aac3913720a47f5813b5c08d16aee343b2b5ef349bf830c3564dddc
-
\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
\Users\Admin\AppData\Local\Temp\Office365 Checker .exeFilesize
547KB
MD54b9c5a8a3386819c1974a49c066506e2
SHA1d370f517ff579a17eb02901134db27f17360c4d9
SHA2561e2bee91808d72e9ea94d00cd5148ff5f2055c5c3de3ff3b02e8346a095acecc
SHA51293f36633a58fed9f24dff8f31a3644dc63e8725f8b37e2a9e5d7a7b33b0b00827aec7eb42f7b277a336dbc4edaa6da8af1f2e3de3e7465e6c4b5943124e8cf8f
-
memory/520-73-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/572-68-0x0000000002150000-0x00000000021D0000-memory.dmpFilesize
512KB
-
memory/572-65-0x0000000000A10000-0x0000000000A86000-memory.dmpFilesize
472KB
-
memory/912-108-0x0000000001DC0000-0x0000000001DDA000-memory.dmpFilesize
104KB
-
memory/912-107-0x0000000000750000-0x0000000000772000-memory.dmpFilesize
136KB
-
memory/912-106-0x0000000001DF0000-0x0000000001E70000-memory.dmpFilesize
512KB
-
memory/912-105-0x0000000000020000-0x000000000005A000-memory.dmpFilesize
232KB
-
memory/1152-84-0x0000000000B50000-0x0000000000BDE000-memory.dmpFilesize
568KB
-
memory/1488-114-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-118-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-122-0x00000000007A0000-0x00000000007E0000-memory.dmpFilesize
256KB
-
memory/1488-121-0x00000000007A0000-0x00000000007E0000-memory.dmpFilesize
256KB
-
memory/1488-120-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-116-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-115-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1488-112-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-111-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1488-113-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1732-85-0x0000000000BD0000-0x0000000000C50000-memory.dmpFilesize
512KB
-
memory/1732-83-0x0000000000260000-0x0000000000268000-memory.dmpFilesize
32KB
-
memory/1732-82-0x0000000001340000-0x0000000001396000-memory.dmpFilesize
344KB
-
memory/1732-98-0x0000000000BD0000-0x0000000000C50000-memory.dmpFilesize
512KB
-
memory/1764-86-0x0000000000A70000-0x0000000000AF0000-memory.dmpFilesize
512KB
-
memory/2012-67-0x0000000000B90000-0x0000000000C10000-memory.dmpFilesize
512KB
-
memory/2012-54-0x0000000000C50000-0x0000000000D54000-memory.dmpFilesize
1.0MB