Resubmissions

18-11-2020 14:18

201118-dj27sn3f52 10

18-11-2020 13:42

201118-1arz86e7w6 10

18-11-2020 13:38

201118-n8jh228ctn 10

Analysis

  • max time kernel
    61s
  • max time network
    79s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 13:38

General

  • Target

    Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 58 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\Archive.zip__ccacaxs2tbz2t6ob3e.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:508
    • C:\Users\Admin\AppData\Local\Temp\Temp\WCInstaller.exe
      C:\Users\Admin\AppData\Local\Temp\Temp\WCInstaller.exe --silent --partner=AE190201 --homepage=1 --search=1 --campaign=292
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\WebCompanionInstaller.exe
        .\WebCompanionInstaller.exe --partner=AE190201 --campaign=292 --version=7.0.2354.4185 --prod --silent --partner=AE190201 --homepage=1 --search=1 --campaign=292
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" Create "WCAssistantService" binPath= "C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe" DisplayName= "WC Assistant" start= auto
          4⤵
            PID:1772
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" failure WCAssistantService reset= 30 actions= restart/60000
            4⤵
              PID:2236
            • C:\Windows\SysWOW64\sc.exe
              "sc.exe" description "WCAssistantService" "Ad-Aware Web Companion Internet security service"
              4⤵
                PID:2564
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C netsh http add urlacl url=http://+:9007/ user=Everyone
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1900
                • C:\Windows\SysWOW64\netsh.exe
                  netsh http add urlacl url=http://+:9007/ user=Everyone
                  5⤵
                    PID:4060
                • C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe
                  "C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe" --silent --install --geo=
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3696
          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe
            "C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe"
            1⤵
            • Executes dropped EXE
            • Modifies data under HKEY_USERS
            PID:3040

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Interop.LavasoftTcpServiceLib.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.AppCore.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Compression.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Events.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SearchProtect.Business.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SysInfo.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Utils.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.WCAssistant.WinService.exe.config

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\MozCompressor.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\Newtonsoft.Json.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\VCRUNTIME140D.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe

            MD5

            74adc34bd86c6bb013850136eb097456

            SHA1

            ad2a9a0544b48d1f42e7115eed1f24c6bc411913

            SHA256

            17850159d4cdb54ebd044b10ae62886a0e878576e6eb529e17e4750eacd99fd8

            SHA512

            d96f659f88b1ac6fc9501a4a71d26c02069c79d9edaa555c9c85b717c130e8eb3be9c656224e188f5ab7b991aec1f4e2008f1e86c5b52b18d4a0dfaca3bb9b80

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe

            MD5

            74adc34bd86c6bb013850136eb097456

            SHA1

            ad2a9a0544b48d1f42e7115eed1f24c6bc411913

            SHA256

            17850159d4cdb54ebd044b10ae62886a0e878576e6eb529e17e4750eacd99fd8

            SHA512

            d96f659f88b1ac6fc9501a4a71d26c02069c79d9edaa555c9c85b717c130e8eb3be9c656224e188f5ab7b991aec1f4e2008f1e86c5b52b18d4a0dfaca3bb9b80

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\WebCompanion.exe.config

            MD5

            8a41e1820d9ffd37491c51b331b379ec

            SHA1

            f2e32cccc16fa110d76da596b34908869f855d16

            SHA256

            c3dc39ae81e9d1b01e3a9adac090a98f79e976e00550f5b047427f5eae958d00

            SHA512

            d2ab76d2278152d4031fc5251b7e897a1e0b02a510b495644b704c58f0bce7b253a6b1d236a77f97551077f60559257dd11d55273c89342e7f7ee3a2a1e89c5e

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\liblz4.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\log4net.dll

          • C:\Program Files (x86)\Lavasoft\Web Companion\Application\ucrtbased.dll

          • C:\ProgramData\Lavasoft\Web Companion\Options\Partner.txt

          • C:\ProgramData\Lavasoft\Web Companion\Options\Statistics.txt

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EA618097E393409AFA316F0F87E2C202_28DD3630238B51427119DAF9326B45F2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C46E7B0F942663A1EDC8D9D6D7869173_6043FC604A395E1485AF7AC16D16B7CE

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EA618097E393409AFA316F0F87E2C202_28DD3630238B51427119DAF9326B45F2

          • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\ICSharpCode.SharpZipLib.dll

            MD5

            5a8ee1e57a63d4c6afd0b09eeb860219

            SHA1

            231ede81f741cb3d736f360dc5d5bfb2ac44ba12

            SHA256

            dc009d4ebdb578c98e4edc752ed7dcd46fc3ffa199ecaccbec5542dd3b34eaa6

            SHA512

            1beed12d412c6b2d62ade03888a0f31b1b4735e6f93270d0a3a5a91773f0084efe0ae4494f4b7969b37d07ca8c1266582725becbb34958e91b64d9bc6be9bb74

          • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\Newtonsoft.Json.dll

            MD5

            5d06e0b95f7e4128194a6f517125bede

            SHA1

            a78d45faffbc3628f2fc3243485e59fbd429721e

            SHA256

            530b79ff0f7dcfeceb0d369f7aa4ff9e0ee97b7c604cf8932c27dcbe29198b2c

            SHA512

            5de8b691f012454044c9737730b9b06239fdbdbb343407d299e1c5c58cd8cc63f12ba0c9520d695a4ac55eee239fd354d92e57d68b24a29c0494a3fa0730c861

          • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\WebCompanionInstaller.exe

            MD5

            86f911c125a0750b159990af56f524f6

            SHA1

            baedde9e161f5f5cbe470fe147978f1845dbdbc9

            SHA256

            0063bc6e62666112f32273e4175c62f78c9ad9c75e1fd8c6dbd2c56cf68a961c

            SHA512

            4c2cfcdb64df5b749aa5e448e12fafad3d9bf47b61f3b9c2423af1651acee373379338f4a0c52898fcd4dc6a9cb96c19b081eea5c9165d1ea90128e01053fbf3

          • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\WebCompanionInstaller.exe

            MD5

            86f911c125a0750b159990af56f524f6

            SHA1

            baedde9e161f5f5cbe470fe147978f1845dbdbc9

            SHA256

            0063bc6e62666112f32273e4175c62f78c9ad9c75e1fd8c6dbd2c56cf68a961c

            SHA512

            4c2cfcdb64df5b749aa5e448e12fafad3d9bf47b61f3b9c2423af1651acee373379338f4a0c52898fcd4dc6a9cb96c19b081eea5c9165d1ea90128e01053fbf3

          • C:\Users\Admin\AppData\Local\Temp\7zS4E9D11D4\WebCompanionInstaller.exe.config

            MD5

            0d86e732c7d385b99b69eb1ec27af0a3

            SHA1

            f5ff2bfc03b4b7704f5c2add6f7efcd7e177006e

            SHA256

            b33e2cb24a9641d16dab02ba41564b7b3a6cfd9c81843878d04f93b4a6ea875e

            SHA512

            87b8a4de11c14b9d0f3b93b26f8bab47c53feae3a00d4d11da7a1ff4dd3fd4408ffb9a2157752608800f0a0beaba15fb4dadaaa0d16db28c6604ca400979c36b

          • C:\Users\Admin\AppData\Local\Temp\Temp\WCInstaller.exe

            MD5

            d3541b516a76755a3da9c5fe5d06940c

            SHA1

            c28f4c4ebf1fa7a94415ebf41776c65b2de7eee9

            SHA256

            ddba9a0e5ec5829c79b4c81100fd8bd7f6e5f5f854e7be6b27287d846424d719

            SHA512

            dccaf71a8fa6d9b87d7480e2a7d32f7b741e45fec875feb39be8d6fd44979469db48cccbd029e65765b7f28bdf908152cbe9da620d4c1e3d00bd653cd9e5af25

          • C:\Users\Admin\AppData\Local\Temp\Temp\WCInstaller.exe

            MD5

            d3541b516a76755a3da9c5fe5d06940c

            SHA1

            c28f4c4ebf1fa7a94415ebf41776c65b2de7eee9

            SHA256

            ddba9a0e5ec5829c79b4c81100fd8bd7f6e5f5f854e7be6b27287d846424d719

            SHA512

            dccaf71a8fa6d9b87d7480e2a7d32f7b741e45fec875feb39be8d6fd44979469db48cccbd029e65765b7f28bdf908152cbe9da620d4c1e3d00bd653cd9e5af25

          • \Program Files (x86)\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.LavasoftTcpServiceLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.LavasoftTcpServiceLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.LavasoftTcpServiceLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Interop.LavasoftTcpServiceLib.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.AppCore.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.AppCore.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.AppCore.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.AppCore.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Compression.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Compression.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Compression.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Compression.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Events.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Events.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Events.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Events.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SearchProtect.Business.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SearchProtect.Business.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SearchProtect.Business.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SearchProtect.Business.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SysInfo.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SysInfo.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SysInfo.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.SysInfo.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Utils.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Utils.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Utils.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Lavasoft.Utils.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\MozCompressor.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\MozCompressor.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\MozCompressor.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Newtonsoft.Json.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Newtonsoft.Json.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Newtonsoft.Json.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\Newtonsoft.Json.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\liblz4.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\log4net.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\log4net.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\log4net.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\log4net.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\ucrtbased.dll

          • \Program Files (x86)\Lavasoft\Web Companion\Application\vcruntime140d.dll

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\ICSharpCode.SharpZipLib.dll

            MD5

            5a8ee1e57a63d4c6afd0b09eeb860219

            SHA1

            231ede81f741cb3d736f360dc5d5bfb2ac44ba12

            SHA256

            dc009d4ebdb578c98e4edc752ed7dcd46fc3ffa199ecaccbec5542dd3b34eaa6

            SHA512

            1beed12d412c6b2d62ade03888a0f31b1b4735e6f93270d0a3a5a91773f0084efe0ae4494f4b7969b37d07ca8c1266582725becbb34958e91b64d9bc6be9bb74

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\ICSharpCode.SharpZipLib.dll

            MD5

            5a8ee1e57a63d4c6afd0b09eeb860219

            SHA1

            231ede81f741cb3d736f360dc5d5bfb2ac44ba12

            SHA256

            dc009d4ebdb578c98e4edc752ed7dcd46fc3ffa199ecaccbec5542dd3b34eaa6

            SHA512

            1beed12d412c6b2d62ade03888a0f31b1b4735e6f93270d0a3a5a91773f0084efe0ae4494f4b7969b37d07ca8c1266582725becbb34958e91b64d9bc6be9bb74

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\ICSharpCode.SharpZipLib.dll

            MD5

            5a8ee1e57a63d4c6afd0b09eeb860219

            SHA1

            231ede81f741cb3d736f360dc5d5bfb2ac44ba12

            SHA256

            dc009d4ebdb578c98e4edc752ed7dcd46fc3ffa199ecaccbec5542dd3b34eaa6

            SHA512

            1beed12d412c6b2d62ade03888a0f31b1b4735e6f93270d0a3a5a91773f0084efe0ae4494f4b7969b37d07ca8c1266582725becbb34958e91b64d9bc6be9bb74

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\ICSharpCode.SharpZipLib.dll

            MD5

            5a8ee1e57a63d4c6afd0b09eeb860219

            SHA1

            231ede81f741cb3d736f360dc5d5bfb2ac44ba12

            SHA256

            dc009d4ebdb578c98e4edc752ed7dcd46fc3ffa199ecaccbec5542dd3b34eaa6

            SHA512

            1beed12d412c6b2d62ade03888a0f31b1b4735e6f93270d0a3a5a91773f0084efe0ae4494f4b7969b37d07ca8c1266582725becbb34958e91b64d9bc6be9bb74

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\Newtonsoft.Json.dll

            MD5

            5d06e0b95f7e4128194a6f517125bede

            SHA1

            a78d45faffbc3628f2fc3243485e59fbd429721e

            SHA256

            530b79ff0f7dcfeceb0d369f7aa4ff9e0ee97b7c604cf8932c27dcbe29198b2c

            SHA512

            5de8b691f012454044c9737730b9b06239fdbdbb343407d299e1c5c58cd8cc63f12ba0c9520d695a4ac55eee239fd354d92e57d68b24a29c0494a3fa0730c861

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\Newtonsoft.Json.dll

            MD5

            5d06e0b95f7e4128194a6f517125bede

            SHA1

            a78d45faffbc3628f2fc3243485e59fbd429721e

            SHA256

            530b79ff0f7dcfeceb0d369f7aa4ff9e0ee97b7c604cf8932c27dcbe29198b2c

            SHA512

            5de8b691f012454044c9737730b9b06239fdbdbb343407d299e1c5c58cd8cc63f12ba0c9520d695a4ac55eee239fd354d92e57d68b24a29c0494a3fa0730c861

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\Newtonsoft.Json.dll

            MD5

            5d06e0b95f7e4128194a6f517125bede

            SHA1

            a78d45faffbc3628f2fc3243485e59fbd429721e

            SHA256

            530b79ff0f7dcfeceb0d369f7aa4ff9e0ee97b7c604cf8932c27dcbe29198b2c

            SHA512

            5de8b691f012454044c9737730b9b06239fdbdbb343407d299e1c5c58cd8cc63f12ba0c9520d695a4ac55eee239fd354d92e57d68b24a29c0494a3fa0730c861

          • \Users\Admin\AppData\Local\Temp\7zS4E9D11D4\Newtonsoft.Json.dll

            MD5

            5d06e0b95f7e4128194a6f517125bede

            SHA1

            a78d45faffbc3628f2fc3243485e59fbd429721e

            SHA256

            530b79ff0f7dcfeceb0d369f7aa4ff9e0ee97b7c604cf8932c27dcbe29198b2c

            SHA512

            5de8b691f012454044c9737730b9b06239fdbdbb343407d299e1c5c58cd8cc63f12ba0c9520d695a4ac55eee239fd354d92e57d68b24a29c0494a3fa0730c861

          • memory/1772-18-0x0000000000000000-mapping.dmp

          • memory/1900-21-0x0000000000000000-mapping.dmp

          • memory/2236-19-0x0000000000000000-mapping.dmp

          • memory/2532-0-0x0000000000000000-mapping.dmp

          • memory/2564-20-0x0000000000000000-mapping.dmp

          • memory/3032-3-0x0000000000000000-mapping.dmp

          • memory/3040-106-0x00007FF808200000-0x00007FF808BA0000-memory.dmp

            Filesize

            9.6MB

          • memory/3696-97-0x000000006F490000-0x000000006FB7E000-memory.dmp

            Filesize

            6.9MB

          • memory/3696-100-0x000000000CE60000-0x000000000CE61000-memory.dmp

            Filesize

            4KB

          • memory/3696-23-0x0000000000000000-mapping.dmp

          • memory/4060-22-0x0000000000000000-mapping.dmp