Analysis

  • max time kernel
    403s
  • max time network
    436s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    28-07-2021 10:21

General

  • Target

    f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe

  • Size

    1.2MB

  • MD5

    e330461dfd3ff5099a0b05e06bc4bda9

  • SHA1

    0faeb359703506fd0e0fa21ab3b23dda5ea868e6

  • SHA256

    f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e

  • SHA512

    078bd784300123e45954db43d8d2ad941af2015856e533781303a60357f56d013cf9a3da1c023b38df81e0e186103bf98ed7f8edede42b35a6128e0b4a9381dc

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.themainreport.co.nz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    -I;MGhTyL{AQ

Extracted

Family

oski

C2

fine.le-pearl.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
  • AgentTesla Payload 2 IoCs
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 1 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe
    "C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1512
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ayFJdzpy.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4012
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ayFJdzpy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA955.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2612
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ayFJdzpy.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4032
    • C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe
      "C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe"
      2⤵
        PID:696
      • C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe
        "C:\Users\Admin\AppData\Local\Temp\f85de586c3a33df88ebb5493c0bbcbd18c9f732e201c4c1604f2b2779976434e.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
          "C:\Users\Admin\AppData\Local\Temp\apwxc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1052
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\apwxc.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:912
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nllJKmehpTGztY.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1296
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nllJKmehpTGztY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4E3B.tmp"
            4⤵
            • Creates scheduled task(s)
            PID:3952
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nllJKmehpTGztY.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1020
          • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
            "C:\Users\Admin\AppData\Local\Temp\apwxc.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:2196
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c taskkill /pid 2196 & erase C:\Users\Admin\AppData\Local\Temp\apwxc.exe & RD /S /Q C:\\ProgramData\\335839472975008\\* & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:800
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /pid 2196
                6⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3012
          • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
            "C:\Users\Admin\AppData\Local\Temp\apwxc.exe"
            4⤵
            • Executes dropped EXE
            PID:504

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    4
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    4
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      MD5

      1c19c16e21c97ed42d5beabc93391fc5

      SHA1

      8ad83f8e0b3acf8dfbbf87931e41f0d664c4df68

      SHA256

      1bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05

      SHA512

      7d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      ceccb519ea365f5e2dbe9d85bcbe86b3

      SHA1

      48909b13e8acb855d3c5db765578aeb32f59c5f4

      SHA256

      5f2890c9d0479f70ade63d77476dc82cacdd1e9f9edc59087f52c7bb668b70dd

      SHA512

      7c5b93e3d2e24fe745386a7fbfbd2b65604fff42cfaf2c78ec61b622547ead089379af03bc1aa02b77df1548e395c4c9779f91fc05f609b35e7584069d0097bb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      105fcf1a36ebd60a8fe1c6851a929398

      SHA1

      2b6cacc21a6208c09377455f4ca372758a613427

      SHA256

      6875387767e015750b80c0e074244503b3f74189e66c61c1e4f3fa77cf7695c4

      SHA512

      3ee34fadd3fc1643a8725edf70ed3e234cc74ecbbf5b87415659c637373cf810f2c28d5ef5da85273e3a915cd8f33798f4e63bfdc40aa7483241371ff7d561dd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      828b7fff05fbd7d99b95dc2a18850438

      SHA1

      43e018efc20b4e44591af0064a7cc628eb6425be

      SHA256

      0a6e7e84ba8efd67231071296af7a5f92e051fdcd6080151bd9b0d980d6bef55

      SHA512

      148a37effb9b7860ecd442ab735c2ebc51455dfc22dad2c1a0c177d50f7408abde4eec9e3b4f75704abf05cb257c9134493e50763425f8e1df953c5c5b6c2cf4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      828b7fff05fbd7d99b95dc2a18850438

      SHA1

      43e018efc20b4e44591af0064a7cc628eb6425be

      SHA256

      0a6e7e84ba8efd67231071296af7a5f92e051fdcd6080151bd9b0d980d6bef55

      SHA512

      148a37effb9b7860ecd442ab735c2ebc51455dfc22dad2c1a0c177d50f7408abde4eec9e3b4f75704abf05cb257c9134493e50763425f8e1df953c5c5b6c2cf4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      828b7fff05fbd7d99b95dc2a18850438

      SHA1

      43e018efc20b4e44591af0064a7cc628eb6425be

      SHA256

      0a6e7e84ba8efd67231071296af7a5f92e051fdcd6080151bd9b0d980d6bef55

      SHA512

      148a37effb9b7860ecd442ab735c2ebc51455dfc22dad2c1a0c177d50f7408abde4eec9e3b4f75704abf05cb257c9134493e50763425f8e1df953c5c5b6c2cf4

    • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
      MD5

      ddde6fc0ce346b0ab7bb0c8c02a09d33

      SHA1

      1067652f21fd05902288613746b5e2ea79bd07f9

      SHA256

      a375d88a6666e7101b4f582ea0239033e4716e883ecb301245011e9c58054a9c

      SHA512

      66a92b7f14371069d78876add097fb8f847755eff95edd846939566f0ce219b686f265c8a57dbe6e19e5f12145bfbfcccff09371413a758005d1aee7d8490c49

    • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
      MD5

      ddde6fc0ce346b0ab7bb0c8c02a09d33

      SHA1

      1067652f21fd05902288613746b5e2ea79bd07f9

      SHA256

      a375d88a6666e7101b4f582ea0239033e4716e883ecb301245011e9c58054a9c

      SHA512

      66a92b7f14371069d78876add097fb8f847755eff95edd846939566f0ce219b686f265c8a57dbe6e19e5f12145bfbfcccff09371413a758005d1aee7d8490c49

    • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
      MD5

      ddde6fc0ce346b0ab7bb0c8c02a09d33

      SHA1

      1067652f21fd05902288613746b5e2ea79bd07f9

      SHA256

      a375d88a6666e7101b4f582ea0239033e4716e883ecb301245011e9c58054a9c

      SHA512

      66a92b7f14371069d78876add097fb8f847755eff95edd846939566f0ce219b686f265c8a57dbe6e19e5f12145bfbfcccff09371413a758005d1aee7d8490c49

    • C:\Users\Admin\AppData\Local\Temp\apwxc.exe
      MD5

      ddde6fc0ce346b0ab7bb0c8c02a09d33

      SHA1

      1067652f21fd05902288613746b5e2ea79bd07f9

      SHA256

      a375d88a6666e7101b4f582ea0239033e4716e883ecb301245011e9c58054a9c

      SHA512

      66a92b7f14371069d78876add097fb8f847755eff95edd846939566f0ce219b686f265c8a57dbe6e19e5f12145bfbfcccff09371413a758005d1aee7d8490c49

    • C:\Users\Admin\AppData\Local\Temp\tmp4E3B.tmp
      MD5

      2d0db30574bcd42f5fba0c7409a15d31

      SHA1

      bf469c636c84917b60ab08589f969abc79aec4cb

      SHA256

      f51e426e7b0c59c7afb642e6ce1e95821d51b58d5ac9c1606250854746422aae

      SHA512

      247137aed05bbe7c6481a28a61c738935dae459c070e3a496f34fce1845f9cb59590a8adf70d9fa7f5df62569439c034192908b26635bc65ae0b092dce4aa4ce

    • C:\Users\Admin\AppData\Local\Temp\tmpA955.tmp
      MD5

      feeb93395fb48f2686e565ea5e5206f1

      SHA1

      6774e67baeea2b3a21e742c4aea43b3ddad518e0

      SHA256

      f01dee970d1572a51e1a4a99db2b83a815b2cc1a5e7305cd807ceef8c61b4cd2

      SHA512

      c552d23661d43c9c52fe1319bac7351a6aa071edce826f9d5a0ea193f16147f06b7ed691eb83a99749ae0b793e7ff7db842dd3a1145f78814cf0160c2ad8bcfa

    • \ProgramData\mozglue.dll
      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\nss3.dll
      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \ProgramData\sqlite3.dll
      MD5

      e477a96c8f2b18d6b5c27bde49c990bf

      SHA1

      e980c9bf41330d1e5bd04556db4646a0210f7409

      SHA256

      16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

      SHA512

      335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

    • memory/800-1034-0x0000000000000000-mapping.dmp
    • memory/912-912-0x0000000006DD0000-0x0000000006DD1000-memory.dmp
      Filesize

      4KB

    • memory/912-1035-0x0000000006DD3000-0x0000000006DD4000-memory.dmp
      Filesize

      4KB

    • memory/912-916-0x0000000006DD2000-0x0000000006DD3000-memory.dmp
      Filesize

      4KB

    • memory/912-902-0x0000000000000000-mapping.dmp
    • memory/912-964-0x000000007E790000-0x000000007E791000-memory.dmp
      Filesize

      4KB

    • memory/1020-1042-0x000000007E820000-0x000000007E821000-memory.dmp
      Filesize

      4KB

    • memory/1020-1092-0x0000000004A33000-0x0000000004A34000-memory.dmp
      Filesize

      4KB

    • memory/1020-943-0x0000000004A30000-0x0000000004A31000-memory.dmp
      Filesize

      4KB

    • memory/1020-918-0x0000000000000000-mapping.dmp
    • memory/1020-945-0x0000000004A32000-0x0000000004A33000-memory.dmp
      Filesize

      4KB

    • memory/1052-887-0x0000000000000000-mapping.dmp
    • memory/1052-897-0x00000000057A0000-0x0000000005C9E000-memory.dmp
      Filesize

      5.0MB

    • memory/1296-1039-0x0000000004BB3000-0x0000000004BB4000-memory.dmp
      Filesize

      4KB

    • memory/1296-917-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
      Filesize

      4KB

    • memory/1296-914-0x0000000004BB2000-0x0000000004BB3000-memory.dmp
      Filesize

      4KB

    • memory/1296-995-0x000000007EFE0000-0x000000007EFE1000-memory.dmp
      Filesize

      4KB

    • memory/1296-903-0x0000000000000000-mapping.dmp
    • memory/1512-160-0x0000000004D42000-0x0000000004D43000-memory.dmp
      Filesize

      4KB

    • memory/1512-171-0x0000000008830000-0x0000000008831000-memory.dmp
      Filesize

      4KB

    • memory/1512-210-0x000000007E060000-0x000000007E061000-memory.dmp
      Filesize

      4KB

    • memory/1512-125-0x0000000000000000-mapping.dmp
    • memory/1512-158-0x0000000004D40000-0x0000000004D41000-memory.dmp
      Filesize

      4KB

    • memory/1512-138-0x0000000007690000-0x0000000007691000-memory.dmp
      Filesize

      4KB

    • memory/1512-268-0x0000000004D43000-0x0000000004D44000-memory.dmp
      Filesize

      4KB

    • memory/1512-130-0x0000000004D50000-0x0000000004D51000-memory.dmp
      Filesize

      4KB

    • memory/1512-131-0x00000000077B0000-0x00000000077B1000-memory.dmp
      Filesize

      4KB

    • memory/2100-140-0x000000000043783E-mapping.dmp
    • memory/2100-164-0x00000000051C0000-0x00000000056BE000-memory.dmp
      Filesize

      5.0MB

    • memory/2100-139-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/2100-960-0x00000000051C0000-0x00000000056BE000-memory.dmp
      Filesize

      5.0MB

    • memory/2196-921-0x000000000040717B-mapping.dmp
    • memory/2196-942-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/2612-127-0x0000000000000000-mapping.dmp
    • memory/3012-1125-0x0000000000000000-mapping.dmp
    • memory/3952-904-0x0000000000000000-mapping.dmp
    • memory/4004-118-0x0000000005370000-0x0000000005371000-memory.dmp
      Filesize

      4KB

    • memory/4004-122-0x0000000001390000-0x000000000139B000-memory.dmp
      Filesize

      44KB

    • memory/4004-123-0x0000000006190000-0x0000000006208000-memory.dmp
      Filesize

      480KB

    • memory/4004-124-0x0000000006210000-0x0000000006249000-memory.dmp
      Filesize

      228KB

    • memory/4004-121-0x00000000052D0000-0x00000000057CE000-memory.dmp
      Filesize

      5.0MB

    • memory/4004-120-0x0000000005540000-0x0000000005541000-memory.dmp
      Filesize

      4KB

    • memory/4004-119-0x00000000052E0000-0x00000000052E1000-memory.dmp
      Filesize

      4KB

    • memory/4004-117-0x00000000057D0000-0x00000000057D1000-memory.dmp
      Filesize

      4KB

    • memory/4004-116-0x0000000005230000-0x0000000005231000-memory.dmp
      Filesize

      4KB

    • memory/4004-114-0x00000000008E0000-0x00000000008E1000-memory.dmp
      Filesize

      4KB

    • memory/4012-167-0x0000000008750000-0x0000000008751000-memory.dmp
      Filesize

      4KB

    • memory/4012-208-0x0000000009800000-0x0000000009801000-memory.dmp
      Filesize

      4KB

    • memory/4012-146-0x0000000008190000-0x0000000008191000-memory.dmp
      Filesize

      4KB

    • memory/4012-150-0x0000000008200000-0x0000000008201000-memory.dmp
      Filesize

      4KB

    • memory/4012-163-0x0000000007352000-0x0000000007353000-memory.dmp
      Filesize

      4KB

    • memory/4012-143-0x0000000008110000-0x0000000008111000-memory.dmp
      Filesize

      4KB

    • memory/4012-161-0x0000000007350000-0x0000000007351000-memory.dmp
      Filesize

      4KB

    • memory/4012-126-0x0000000000000000-mapping.dmp
    • memory/4012-272-0x0000000007353000-0x0000000007354000-memory.dmp
      Filesize

      4KB

    • memory/4012-222-0x0000000009B50000-0x0000000009B51000-memory.dmp
      Filesize

      4KB

    • memory/4012-214-0x000000007F660000-0x000000007F661000-memory.dmp
      Filesize

      4KB

    • memory/4012-169-0x0000000008790000-0x0000000008791000-memory.dmp
      Filesize

      4KB

    • memory/4012-192-0x0000000009A20000-0x0000000009A53000-memory.dmp
      Filesize

      204KB

    • memory/4032-137-0x0000000000000000-mapping.dmp
    • memory/4032-276-0x0000000004353000-0x0000000004354000-memory.dmp
      Filesize

      4KB

    • memory/4032-166-0x0000000004352000-0x0000000004353000-memory.dmp
      Filesize

      4KB

    • memory/4032-264-0x000000007E880000-0x000000007E881000-memory.dmp
      Filesize

      4KB

    • memory/4032-165-0x0000000004350000-0x0000000004351000-memory.dmp
      Filesize

      4KB