Resubmissions

17-11-2020 01:26

201117-zqbhmapg6s 8

15-11-2020 04:06

201115-m4aythcf8n 8

Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-11-2020 04:06

General

  • Target

    driver-updater-setup.exe

  • Size

    14.5MB

  • MD5

    28c730da7a3851db883e72977b63c682

  • SHA1

    4b0658c3ea50181e1186c28ded64d5697e571df6

  • SHA256

    696bccf15a7d0bb9853dabb86910c452cf1dc220a5d58643ce27a7fde8212833

  • SHA512

    5de52c43e49ccac93703c891b21b03b560d14b9f87af2ae01b4a61f86df969307c4b3c50e25c63b07b40e0a0c06bdf9470290dacdc888159a9a7e696713e7709

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • JavaScript code in executable 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Modifies registry class 7 IoCs
  • Modifies system certificate store 2 TTPs 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\driver-updater-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\driver-updater-setup.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Installer.exe
      "C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Installer.exe" /spid:1848 /splha:31008832
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks computer location settings
      • Loads dropped DLL
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1076

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    e64b6e6e38fbbd24cd2e242321e484df

    SHA1

    9eda0cd31af22e378f2545e0b8a0623bdf250cb8

    SHA256

    e236cb32f1cfd6d752bfb72ffa368c013b12b7fd1bf3e616ef21ab7ffab383f4

    SHA512

    369f678161b6722cac5d40ac18d84710fffee5e4329bb21d9c1cd291bb5535c36faeb107719a7b905c7ebcfd88755e32c41a13d5f8db9aa0fcfae161c3b957f5

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\AxComponentsRTL.bpl
    MD5

    7bd4ef160921d7b4f77c4ecadbdb0fa5

    SHA1

    4a7826800939cd068ec8d517f8719e1c898ebe97

    SHA256

    6573f299ea725d6778b411c37a8846fe873c63dca8abfac5e276a63a1dfb1412

    SHA512

    f7e4cc4137451739ce7c72d0039ac1e3a3dd699011e4aa8dd04b022076b2a83197c1bda7dd46d0fd1d7376cdcc0fc271db1bf0cc3798ca071811d18b6fca1c5b

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\AxComponentsVCL.bpl
    MD5

    d51d9739646903ce1ec31da766d34554

    SHA1

    be99bf09fa5173f208a1c6fd4ab25b24afc7697e

    SHA256

    8bf1d9ee9dbf0447f48e19380d4d95b15cfbc3205aedc74e4fa875a2ce18ef1e

    SHA512

    31b9c6db52c49e3e176af7d6c37aeb1e07cb4f49f72fe7f48a87c1e9beccb2c33909e17d8858fbcbc52880cc0a5cd4031f745b32574cc8355ac39335f6ce73a7

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\BrowserHelper.dll
    MD5

    bdc552572a296b44005a8aa815eaafc0

    SHA1

    c4463f88ea31f8c64326da8f687a356f26cc5cf9

    SHA256

    073c1e8980b9d4d46f9832552671919d2272e9925552889382a6074db9e05811

    SHA512

    8d38615fa8a1948094e428103ae3f538abf71dfc1f943c361eaee2660f979a2081da1cbbc7aca52f456c0d342951248c5e01c00263eb18054104948af27e305d

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\CommonForms.Site.dll
    MD5

    44a851e6cb88fba44c36bfb728dfc87a

    SHA1

    a3501d1ca0c5466043c45ff9811f1e6556ffab01

    SHA256

    e438deb44a57541c70dbeec7de63cb1bb65e853b962f1a56802a24c571944418

    SHA512

    5a71de9b825fd3017c0934bb1058f86e65d43d7f1a0d74d8268b9dcafe3bec5981480e24886b50072ff23f0cac3a0cce8525f235f0f83239fb93da7ffbf9fca1

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Data\main.ini
    MD5

    a8e6c3097c85934ff7d7e5b764118511

    SHA1

    c09cb5db172a0831186395bf6ba9976be83d1841

    SHA256

    010ccf3561f1a8d3f0d8f2b8b99388294b69dac724b181b292ee4bbc67a80681

    SHA512

    c06c483db4d426898c09951c58811e099450a8455bbfa02e9d7221e2abd63557b3c6b2d1f74f8601f9af12f659b1dc868e79b113f564a95a2b2cc9c5986dfeb2

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\DriverUpdater.exe
    MD5

    007e7be7bc49e4156de6f39e4558c95d

    SHA1

    d43dbd19965bf4e51a05feffd0082f8d802cda6f

    SHA256

    e485ece40c605f0b0f9ba6eb1d90de6e150b8f8ff17e118c5de4f602b5d061c1

    SHA512

    828cf5a9c914dc2859c5343b37863717767491a09ea8dc53e2020021dbb9e9d3be1b722f34d2e31c1a6dad4ee78483b6f5a433b7bd435f27d74cae647d1d1a45

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\GoogleAnalyticsHelper.dll
    MD5

    acfbacf23cd9f9d37186d663adeed2e0

    SHA1

    94aa51a0587f3c477a3bf493caf073422759c651

    SHA256

    03e8e29695cb7dfbda2fe5009c32efcfeead0bc49c6271c1d66aa14cbed3c4bb

    SHA512

    c13399d49662ba75a028bd2ec4c945d4a6c206668826895c8c654eef5ff072042ceef4df65c06892ecec6ff98f9123987f710fc3e1f637f71c0492f256ba8add

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Installer.exe
    MD5

    61e23a60b54435a56d2ab68f595a77f2

    SHA1

    83472d12919ef09da41b1bab417c045faae678b1

    SHA256

    13eebee6a99dbbbb07be6b5bfd3202bebeef2b23fed193b4a8f482f7b5f1e32c

    SHA512

    282bc807f67d124b49191550907d350d1f91251edfa381610231a0b691fecd6d96022728325257933ff01456719739a9630c431452ece18e3f2593f0c7f6fd7c

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Installer.exe
    MD5

    61e23a60b54435a56d2ab68f595a77f2

    SHA1

    83472d12919ef09da41b1bab417c045faae678b1

    SHA256

    13eebee6a99dbbbb07be6b5bfd3202bebeef2b23fed193b4a8f482f7b5f1e32c

    SHA512

    282bc807f67d124b49191550907d350d1f91251edfa381610231a0b691fecd6d96022728325257933ff01456719739a9630c431452ece18e3f2593f0c7f6fd7c

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Lang\enu.lng
    MD5

    3646141c0530c659aa18772296f4233f

    SHA1

    e31ddfb2a700d93e697f03b2213e374a76216d6e

    SHA256

    7d53e66cee9ff83ab75febb6fb2c8a7450fc9eecaeadde8dcabbf67321b455c0

    SHA512

    2de598c58f9c4ae417e545ce60691e491aa315059ccb07916cbdd03e4fc23046dc7755a0869efe6e63c5b77ceb8d6b2e52bea784946d60d7fb47d5edd3953aad

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\Localizer.dll
    MD5

    907c5479da139bbbc4df8dd27d6255c4

    SHA1

    cd2303895e075f848bc206793657238ea5b233c5

    SHA256

    4b31ee97ac3efff8b1339f14434c48ef5379d057b9ad64044b8de7e9fa91a874

    SHA512

    8ca407edfb6984268bda3286cba27e0ffbdfafb86e06ce86d7896bcbd98cb8e088b7f931a052877fbc6adb54ef5299fa81245681e78a658fb7e6fc6c89154617

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\SetupHelper.dll
    MD5

    8a68fd9a4c1553adde687a821e4916e5

    SHA1

    4d71d15b5ea5c686fe51041c5cefbdd62968c311

    SHA256

    f9efb9c3e3e799ab58d50e44ce8fb1c988e2c0c29501b42fcd0d849153012ed3

    SHA512

    363b62e374f163377859b4449f8dd3c7e6c6a333de93a47bd5cc5c4fa90311cbe0e404a7d75e7686ebf04683ba05d152fbb421654a86715eac4213f7137b37e7

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\__setup\_setup64.tmp
    MD5

    e4211d6d009757c078a9fac7ff4f03d4

    SHA1

    019cd56ba687d39d12d4b13991c9a42ea6ba03da

    SHA256

    388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95

    SHA512

    17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\rtl250.bpl
    MD5

    f4b9548b5c6fd1586b0daf1a40967abd

    SHA1

    b8c608a8888fcf69e18bada7c8d25f4da7f6649d

    SHA256

    a684cf9c15f3428d94a1f13b0d2f22b7f06a8f4001ae5138aedec32152c0a0ee

    SHA512

    00c0affe89aef3526f4729534218e10129caef3dffcb8b389674e3c2d507a1e23a360e4e0428bf3383830fa7abaf659b470f8ed99675a28c86e5a069dc75a2e0

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\vcl250.bpl
    MD5

    314823e1e0980f0a78e34e867d6a14f8

    SHA1

    7a84bcc150c2a60b6f613a923654b7e761a28c0e

    SHA256

    fce48b6b27fb13d1aa91617751c70ae6f75f14a868209b7dd0a09491cddc6611

    SHA512

    ff3d5b2b25c229e95c80db9d35a6f0e4807442f62a0a5b4427114ba54f361a372556f646d9db53ec7de78e29ff5dae575f7cf9a51a7a9a24b2329aecd94cb249

  • C:\Users\Admin\AppData\Local\Temp\is-24297717.tmp\vclimg250.bpl
    MD5

    44f70a10e6fcbb4ccefad3b2f6566616

    SHA1

    67972d835d9de63f4011210c77b83fd0aeef8d93

    SHA256

    81b220d0faf33bdc3c3bfde2e9d162757f66c111265a898ccbecd974d0a51fa4

    SHA512

    8770fbb8c3482299c37cf77eb342fb0c13bf74b75e3cf41eaf2915d0d12f277dfe328d4c1000a10b8a8835101972e42253169025d19a8d8115722daafe777016

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WZKRVSLM.txt
    MD5

    a6081e719d06638e5d9490058f6136e1

    SHA1

    24bf42f7592d0829d26031c341584cc5b64ead5f

    SHA256

    339e3928a7e9bc5dc259782cd87de78fef6487b71b412ff1fe0856b5853e5cb4

    SHA512

    a1a00751101ded0ac374e481912451cae32070fda09a2bab5b67718783be9408c4d3dd42f8d9acd4559513c29210878782e1b3e22df9fc52e59e22035b2bb551

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\AxComponentsRTL.bpl
    MD5

    7bd4ef160921d7b4f77c4ecadbdb0fa5

    SHA1

    4a7826800939cd068ec8d517f8719e1c898ebe97

    SHA256

    6573f299ea725d6778b411c37a8846fe873c63dca8abfac5e276a63a1dfb1412

    SHA512

    f7e4cc4137451739ce7c72d0039ac1e3a3dd699011e4aa8dd04b022076b2a83197c1bda7dd46d0fd1d7376cdcc0fc271db1bf0cc3798ca071811d18b6fca1c5b

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\AxComponentsVCL.bpl
    MD5

    d51d9739646903ce1ec31da766d34554

    SHA1

    be99bf09fa5173f208a1c6fd4ab25b24afc7697e

    SHA256

    8bf1d9ee9dbf0447f48e19380d4d95b15cfbc3205aedc74e4fa875a2ce18ef1e

    SHA512

    31b9c6db52c49e3e176af7d6c37aeb1e07cb4f49f72fe7f48a87c1e9beccb2c33909e17d8858fbcbc52880cc0a5cd4031f745b32574cc8355ac39335f6ce73a7

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\BrowserHelper.dll
    MD5

    bdc552572a296b44005a8aa815eaafc0

    SHA1

    c4463f88ea31f8c64326da8f687a356f26cc5cf9

    SHA256

    073c1e8980b9d4d46f9832552671919d2272e9925552889382a6074db9e05811

    SHA512

    8d38615fa8a1948094e428103ae3f538abf71dfc1f943c361eaee2660f979a2081da1cbbc7aca52f456c0d342951248c5e01c00263eb18054104948af27e305d

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\CommonForms.Site.dll
    MD5

    44a851e6cb88fba44c36bfb728dfc87a

    SHA1

    a3501d1ca0c5466043c45ff9811f1e6556ffab01

    SHA256

    e438deb44a57541c70dbeec7de63cb1bb65e853b962f1a56802a24c571944418

    SHA512

    5a71de9b825fd3017c0934bb1058f86e65d43d7f1a0d74d8268b9dcafe3bec5981480e24886b50072ff23f0cac3a0cce8525f235f0f83239fb93da7ffbf9fca1

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\DriverUpdater.exe
    MD5

    007e7be7bc49e4156de6f39e4558c95d

    SHA1

    d43dbd19965bf4e51a05feffd0082f8d802cda6f

    SHA256

    e485ece40c605f0b0f9ba6eb1d90de6e150b8f8ff17e118c5de4f602b5d061c1

    SHA512

    828cf5a9c914dc2859c5343b37863717767491a09ea8dc53e2020021dbb9e9d3be1b722f34d2e31c1a6dad4ee78483b6f5a433b7bd435f27d74cae647d1d1a45

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\DriverUpdater.exe
    MD5

    007e7be7bc49e4156de6f39e4558c95d

    SHA1

    d43dbd19965bf4e51a05feffd0082f8d802cda6f

    SHA256

    e485ece40c605f0b0f9ba6eb1d90de6e150b8f8ff17e118c5de4f602b5d061c1

    SHA512

    828cf5a9c914dc2859c5343b37863717767491a09ea8dc53e2020021dbb9e9d3be1b722f34d2e31c1a6dad4ee78483b6f5a433b7bd435f27d74cae647d1d1a45

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\GoogleAnalyticsHelper.dll
    MD5

    acfbacf23cd9f9d37186d663adeed2e0

    SHA1

    94aa51a0587f3c477a3bf493caf073422759c651

    SHA256

    03e8e29695cb7dfbda2fe5009c32efcfeead0bc49c6271c1d66aa14cbed3c4bb

    SHA512

    c13399d49662ba75a028bd2ec4c945d4a6c206668826895c8c654eef5ff072042ceef4df65c06892ecec6ff98f9123987f710fc3e1f637f71c0492f256ba8add

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\Installer.exe
    MD5

    61e23a60b54435a56d2ab68f595a77f2

    SHA1

    83472d12919ef09da41b1bab417c045faae678b1

    SHA256

    13eebee6a99dbbbb07be6b5bfd3202bebeef2b23fed193b4a8f482f7b5f1e32c

    SHA512

    282bc807f67d124b49191550907d350d1f91251edfa381610231a0b691fecd6d96022728325257933ff01456719739a9630c431452ece18e3f2593f0c7f6fd7c

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\InstallerUtils.dll
    MD5

    88044842667e400acc491ebfa865b2f8

    SHA1

    072cf704c0a5cfe433203787818c03bdbeceac80

    SHA256

    67ab2b5d70d9acc362529bb1b957f814899716286e4c919e0e7826862339ae53

    SHA512

    7becbc9f46d94eaa97fef33144eec6b6487bdeb65571a91653549ffeaf1a1b58dcf20ea7ecf51af2ba3aa3e84d2815d39687b2f51855f8f8d215b98c3a4e1ed7

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\Localizer.dll
    MD5

    907c5479da139bbbc4df8dd27d6255c4

    SHA1

    cd2303895e075f848bc206793657238ea5b233c5

    SHA256

    4b31ee97ac3efff8b1339f14434c48ef5379d057b9ad64044b8de7e9fa91a874

    SHA512

    8ca407edfb6984268bda3286cba27e0ffbdfafb86e06ce86d7896bcbd98cb8e088b7f931a052877fbc6adb54ef5299fa81245681e78a658fb7e6fc6c89154617

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\SetupHelper.dll
    MD5

    8a68fd9a4c1553adde687a821e4916e5

    SHA1

    4d71d15b5ea5c686fe51041c5cefbdd62968c311

    SHA256

    f9efb9c3e3e799ab58d50e44ce8fb1c988e2c0c29501b42fcd0d849153012ed3

    SHA512

    363b62e374f163377859b4449f8dd3c7e6c6a333de93a47bd5cc5c4fa90311cbe0e404a7d75e7686ebf04683ba05d152fbb421654a86715eac4213f7137b37e7

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\SetupHelper.dll
    MD5

    8a68fd9a4c1553adde687a821e4916e5

    SHA1

    4d71d15b5ea5c686fe51041c5cefbdd62968c311

    SHA256

    f9efb9c3e3e799ab58d50e44ce8fb1c988e2c0c29501b42fcd0d849153012ed3

    SHA512

    363b62e374f163377859b4449f8dd3c7e6c6a333de93a47bd5cc5c4fa90311cbe0e404a7d75e7686ebf04683ba05d152fbb421654a86715eac4213f7137b37e7

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\rtl250.bpl
    MD5

    f4b9548b5c6fd1586b0daf1a40967abd

    SHA1

    b8c608a8888fcf69e18bada7c8d25f4da7f6649d

    SHA256

    a684cf9c15f3428d94a1f13b0d2f22b7f06a8f4001ae5138aedec32152c0a0ee

    SHA512

    00c0affe89aef3526f4729534218e10129caef3dffcb8b389674e3c2d507a1e23a360e4e0428bf3383830fa7abaf659b470f8ed99675a28c86e5a069dc75a2e0

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\vcl250.bpl
    MD5

    314823e1e0980f0a78e34e867d6a14f8

    SHA1

    7a84bcc150c2a60b6f613a923654b7e761a28c0e

    SHA256

    fce48b6b27fb13d1aa91617751c70ae6f75f14a868209b7dd0a09491cddc6611

    SHA512

    ff3d5b2b25c229e95c80db9d35a6f0e4807442f62a0a5b4427114ba54f361a372556f646d9db53ec7de78e29ff5dae575f7cf9a51a7a9a24b2329aecd94cb249

  • \Users\Admin\AppData\Local\Temp\is-24297717.tmp\vclimg250.bpl
    MD5

    44f70a10e6fcbb4ccefad3b2f6566616

    SHA1

    67972d835d9de63f4011210c77b83fd0aeef8d93

    SHA256

    81b220d0faf33bdc3c3bfde2e9d162757f66c111265a898ccbecd974d0a51fa4

    SHA512

    8770fbb8c3482299c37cf77eb342fb0c13bf74b75e3cf41eaf2915d0d12f277dfe328d4c1000a10b8a8835101972e42253169025d19a8d8115722daafe777016

  • memory/324-2-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp
    Filesize

    2.5MB

  • memory/368-92-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp
    Filesize

    2.5MB

  • memory/1076-24-0x0000000000000000-mapping.dmp
  • memory/1660-38-0x00000000712A0000-0x0000000071443000-memory.dmp
    Filesize

    1.6MB

  • memory/1660-45-0x000000000C1B0000-0x000000000C1C0000-memory.dmp
    Filesize

    64KB

  • memory/1660-57-0x000000000C1B0000-0x000000000C210000-memory.dmp
    Filesize

    384KB

  • memory/1660-63-0x000000000D010000-0x000000000D070000-memory.dmp
    Filesize

    384KB

  • memory/1660-68-0x000000000D060000-0x000000000D068000-memory.dmp
    Filesize

    32KB

  • memory/1660-75-0x000000000F440000-0x000000000F4C0000-memory.dmp
    Filesize

    512KB

  • memory/1660-85-0x000000000C200000-0x000000000C201000-memory.dmp
    Filesize

    4KB

  • memory/1660-39-0x000000000CCF0000-0x000000000CD00000-memory.dmp
    Filesize

    64KB

  • memory/1660-22-0x0000000006780000-0x00000000067A0000-memory.dmp
    Filesize

    128KB

  • memory/1660-4-0x0000000000000000-mapping.dmp
  • memory/1660-34-0x000000000B980000-0x000000000B9A0000-memory.dmp
    Filesize

    128KB