Analysis

  • max time kernel
    121s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    07-12-2021 17:34

General

  • Target

    583e2556ab2e0cad0be321e7225eee8f0d7d7b9fe2886290e1cdccc919745b3b.exe

  • Size

    403KB

  • MD5

    0554b0dc31ba8ab76f167f84002758f2

  • SHA1

    b27b024a9b3a98c4d9320c07cc389ae481462c75

  • SHA256

    583e2556ab2e0cad0be321e7225eee8f0d7d7b9fe2886290e1cdccc919745b3b

  • SHA512

    699224b72cf2caa6c22ce448c14157441690bc6a8f6b2d08b6078c059a67351349fc4caaab7702b6ec155921dd2e7f432118ef9f269afd7f32d20c744894cec9

Malware Config

Extracted

Family

cryptbot

C2

gomcds22.top

morbuq02.top

Attributes
  • payload_url

    http://peuocu14.top/download.php?file=tauten.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 18 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\583e2556ab2e0cad0be321e7225eee8f0d7d7b9fe2886290e1cdccc919745b3b.exe
    "C:\Users\Admin\AppData\Local\Temp\583e2556ab2e0cad0be321e7225eee8f0d7d7b9fe2886290e1cdccc919745b3b.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3940
      • C:\Users\Admin\AppData\Local\Temp\acmite\upslip.exe
        "C:\Users\Admin\AppData\Local\Temp\acmite\upslip.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
          "C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"
          4⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          PID:2332
      • C:\Users\Admin\AppData\Local\Temp\acmite\wonnervp.exe
        "C:\Users\Admin\AppData\Local\Temp\acmite\wonnervp.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\iwblpnypt.vbs"
          4⤵
            PID:3268
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lyesftjyf.vbs"
            4⤵
            • Blocklisted process makes network request
            PID:2296
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\IaxLhaig & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\583e2556ab2e0cad0be321e7225eee8f0d7d7b9fe2886290e1cdccc919745b3b.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Windows\SysWOW64\timeout.exe
          timeout 4
          3⤵
          • Delays execution with timeout.exe
          PID:2656

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    4
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    4
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
      MD5

      54e9306f95f32e50ccd58af19753d929

      SHA1

      eab9457321f34d4dcf7d4a0ac83edc9131bf7c57

      SHA256

      45f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72

      SHA512

      8711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
      MD5

      a385a1ab66f7fa81437e3193792b443c

      SHA1

      c0d75498b755808b7b8891ebcae3d61206db2f0b

      SHA256

      c1c3bc03273389f14ff59345b2e23b69d8e7e0c6e6e5fbf7582c80efaffc22a9

      SHA512

      0e5862e0887eb98b7bf093d97b0f5d353a0fae1c5eff5a2941084826d3369bd382a6506e295190bc4ba55a41ac3d70a9b9dc08ed30acaf35272c2341b26e9042

    • C:\Users\Admin\AppData\Local\Temp\File.exe
      MD5

      9fc22e85c5f60dfd7864ebe2f6f8ebd8

      SHA1

      79a6189f6c1e324503843cde41f9b8171b432937

      SHA256

      7ece9dddae81307b8855fb493213e5f5fe08ee9c8884df64275f1ed85c4a2703

      SHA512

      94f7bfb4b9fc2a904ebc0692eb4e984cd8616bcf4382aa6cafa858d8dfd8617d79d6a9da3d103a0f18874d20c777090b6a4bdf0eae8678cc922f3e99b4b07bb6

    • C:\Users\Admin\AppData\Local\Temp\File.exe
      MD5

      9fc22e85c5f60dfd7864ebe2f6f8ebd8

      SHA1

      79a6189f6c1e324503843cde41f9b8171b432937

      SHA256

      7ece9dddae81307b8855fb493213e5f5fe08ee9c8884df64275f1ed85c4a2703

      SHA512

      94f7bfb4b9fc2a904ebc0692eb4e984cd8616bcf4382aa6cafa858d8dfd8617d79d6a9da3d103a0f18874d20c777090b6a4bdf0eae8678cc922f3e99b4b07bb6

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\IOITQE~1.ZIP
      MD5

      b425ab7071b6e1a5c908ebae3d3a066f

      SHA1

      9cfb164cd25ab343a3ceeb15691b4c2ba5ec85dd

      SHA256

      c234581e530808615aa210792f7ff8dc064209f0bbb98636f96d6178200f4b96

      SHA512

      0eae34090525d5be19e32a31f8dce9dac6965f9fa44788a3490c1c7051720eff11e0fe3b8800859dcd094b58595b02cf470025e09bd13c89088547b2334f2b08

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\NCOGMY~1.ZIP
      MD5

      3e25eca3ad6e6348dd5aa9c416fa63c6

      SHA1

      3503a76b3cb12ceaebb9ec54b4952f4399a341c3

      SHA256

      10279168ee525938ef1f1e5933b3d822d08cd9747c3f7da38cd07c60629eec2d

      SHA512

      3a9b960e29013dd91fcb4b52bd107dc732123bdf1f2ac8622cded8a6d0e7cfc8b51ce054ad82d523c294efed78afd5ddee5864956b95beec38820956ce771297

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_Chrome\DEFAUL~1.BIN
      MD5

      d4026455697acb78d4f621b54352b4f0

      SHA1

      f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9

      SHA256

      2e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624

      SHA512

      efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_Chrome\DEFAUL~1.DB
      MD5

      b608d407fc15adea97c26936bc6f03f6

      SHA1

      953e7420801c76393902c0d6bb56148947e41571

      SHA256

      b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

      SHA512

      cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_Chrome\DEFAUL~2.DB
      MD5

      055c8c5c47424f3c2e7a6fc2ee904032

      SHA1

      5952781d22cff35d94861fac25d89a39af6d0a87

      SHA256

      531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

      SHA512

      c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_Chrome\DEFAUL~3.DB
      MD5

      8ee018331e95a610680a789192a9d362

      SHA1

      e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

      SHA256

      94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

      SHA512

      4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_INFOR~1.TXT
      MD5

      1915df2c28108dc2c8c90205f0db9db9

      SHA1

      d688c3d4bc698bae904fff16ce6905ab69847bd1

      SHA256

      ab45b87c2e77d7d0b328edaec445706ab50b089e38a01b40ad2456b82c0a2dab

      SHA512

      9533c6feb051918f46d2b54e76e10bf5dd121248671086d6e7d76c5d5f5c4f9647fb2963979ffa0a7de00944c8e931a76a5347a003a8d728b7c5f1b90568f982

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\_Files\_SCREE~1.JPE
      MD5

      de16bdb840e022aea811aa91447143ab

      SHA1

      f8e1b40fe14e464aec92a3ebcca1d6823db08c8a

      SHA256

      c4b57164772939704f7a01df818d1f555bbd61ca4527ed5d7f51d9503661a235

      SHA512

      3517cc458dab7a91b5a15cc16225452e6acfe28b18192fb91bbd056fc31c8fb0950072e4a109b19e7c5471637bb923f8bbe4689436626e1d26078013033363df

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\SCREEN~1.JPG
      MD5

      de16bdb840e022aea811aa91447143ab

      SHA1

      f8e1b40fe14e464aec92a3ebcca1d6823db08c8a

      SHA256

      c4b57164772939704f7a01df818d1f555bbd61ca4527ed5d7f51d9503661a235

      SHA512

      3517cc458dab7a91b5a15cc16225452e6acfe28b18192fb91bbd056fc31c8fb0950072e4a109b19e7c5471637bb923f8bbe4689436626e1d26078013033363df

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\SYSTEM~1.TXT
      MD5

      1915df2c28108dc2c8c90205f0db9db9

      SHA1

      d688c3d4bc698bae904fff16ce6905ab69847bd1

      SHA256

      ab45b87c2e77d7d0b328edaec445706ab50b089e38a01b40ad2456b82c0a2dab

      SHA512

      9533c6feb051918f46d2b54e76e10bf5dd121248671086d6e7d76c5d5f5c4f9647fb2963979ffa0a7de00944c8e931a76a5347a003a8d728b7c5f1b90568f982

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\_Chrome\DEFAUL~1.BIN
      MD5

      d4026455697acb78d4f621b54352b4f0

      SHA1

      f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9

      SHA256

      2e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624

      SHA512

      efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\_Chrome\DEFAUL~1.DB
      MD5

      b608d407fc15adea97c26936bc6f03f6

      SHA1

      953e7420801c76393902c0d6bb56148947e41571

      SHA256

      b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

      SHA512

      cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\_Chrome\DEFAUL~2.DB
      MD5

      055c8c5c47424f3c2e7a6fc2ee904032

      SHA1

      5952781d22cff35d94861fac25d89a39af6d0a87

      SHA256

      531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

      SHA512

      c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

    • C:\Users\Admin\AppData\Local\Temp\IaxLhaig\files_\_Chrome\DEFAUL~3.DB
      MD5

      8ee018331e95a610680a789192a9d362

      SHA1

      e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

      SHA256

      94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

      SHA512

      4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

    • C:\Users\Admin\AppData\Local\Temp\acmite\upslip.exe
      MD5

      7ba3ad2b7c238641ce1a984792c4b82d

      SHA1

      c5af6316cee6e39216e7a89723e8d04b1683ace1

      SHA256

      555d171aa7908d6ef0347ad9bcf5d470751f9be1008c2ac700dc483579e7c55b

      SHA512

      3620437549425310b6f3729bc42d24109ec7526beaa0cab8c322b9ed60814196bd42c1c1b1d576a6ad4733875f5c9fa9ef7619cf47e8642ae9c047f50d590ea8

    • C:\Users\Admin\AppData\Local\Temp\acmite\upslip.exe
      MD5

      7ba3ad2b7c238641ce1a984792c4b82d

      SHA1

      c5af6316cee6e39216e7a89723e8d04b1683ace1

      SHA256

      555d171aa7908d6ef0347ad9bcf5d470751f9be1008c2ac700dc483579e7c55b

      SHA512

      3620437549425310b6f3729bc42d24109ec7526beaa0cab8c322b9ed60814196bd42c1c1b1d576a6ad4733875f5c9fa9ef7619cf47e8642ae9c047f50d590ea8

    • C:\Users\Admin\AppData\Local\Temp\acmite\wonnervp.exe
      MD5

      db5310e2cb916d847c9bd14d2fe71a4a

      SHA1

      a3a27fedc720903b62d76b2cf5c0d865471649de

      SHA256

      990fd1953f91f3415ebf4976ad2b77ddfb1327055a6a5c9d90573fd261ebf45b

      SHA512

      4adbc250684bb243f93486470331edbf305545b4974e1b1861b06feb9091c845abbf7537f120df9448176e6858755f2e1044aeba0fa5ac813a7ce9efea6064aa

    • C:\Users\Admin\AppData\Local\Temp\acmite\wonnervp.exe
      MD5

      db5310e2cb916d847c9bd14d2fe71a4a

      SHA1

      a3a27fedc720903b62d76b2cf5c0d865471649de

      SHA256

      990fd1953f91f3415ebf4976ad2b77ddfb1327055a6a5c9d90573fd261ebf45b

      SHA512

      4adbc250684bb243f93486470331edbf305545b4974e1b1861b06feb9091c845abbf7537f120df9448176e6858755f2e1044aeba0fa5ac813a7ce9efea6064aa

    • C:\Users\Admin\AppData\Local\Temp\iwblpnypt.vbs
      MD5

      d66097784c7fcbbf7bde51daaae51eb9

      SHA1

      2585f54afea14114ecda9d8dfb8a1f8e4d4c4c46

      SHA256

      a294886199323fd62c26405f78ec4ce6fb93b9a973fbcafa6a61ae958228b137

      SHA512

      f3e14a42641725bc8ce2b39db88da4e583b7b5f4ff5165a468e6eed575b905ba02b9f8e977822d10bc954a1aa0242ffb4d2817fff83b5ade01512240322d6010

    • C:\Users\Admin\AppData\Local\Temp\lyesftjyf.vbs
      MD5

      9a280e7cb229da8c253e171dfa5303cd

      SHA1

      c41f5d103dc08e31a7b342b0453c03c078c81457

      SHA256

      e251410d6c8ff9350d96f2c92b420ca77a3a5d0e8c9dc831a0cb1e4479a39430

      SHA512

      5bfd89712ac92bedad80465f0fdeaa5e964da4fc6c4f47f3b702def5999d1d3c2e98b6fd0ca09e2c272add68a3ce125e223b155ca3ee849924bddc96d7a15191

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      7ba3ad2b7c238641ce1a984792c4b82d

      SHA1

      c5af6316cee6e39216e7a89723e8d04b1683ace1

      SHA256

      555d171aa7908d6ef0347ad9bcf5d470751f9be1008c2ac700dc483579e7c55b

      SHA512

      3620437549425310b6f3729bc42d24109ec7526beaa0cab8c322b9ed60814196bd42c1c1b1d576a6ad4733875f5c9fa9ef7619cf47e8642ae9c047f50d590ea8

    • C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe
      MD5

      7ba3ad2b7c238641ce1a984792c4b82d

      SHA1

      c5af6316cee6e39216e7a89723e8d04b1683ace1

      SHA256

      555d171aa7908d6ef0347ad9bcf5d470751f9be1008c2ac700dc483579e7c55b

      SHA512

      3620437549425310b6f3729bc42d24109ec7526beaa0cab8c322b9ed60814196bd42c1c1b1d576a6ad4733875f5c9fa9ef7619cf47e8642ae9c047f50d590ea8

    • \Users\Admin\AppData\Local\Temp\nsn954.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/400-146-0x00000000772E0000-0x000000007746E000-memory.dmp
      Filesize

      1.6MB

    • memory/400-144-0x0000000000270000-0x0000000000964000-memory.dmp
      Filesize

      7.0MB

    • memory/400-148-0x0000000000270000-0x0000000000964000-memory.dmp
      Filesize

      7.0MB

    • memory/400-145-0x0000000000270000-0x0000000000964000-memory.dmp
      Filesize

      7.0MB

    • memory/400-138-0x0000000000000000-mapping.dmp
    • memory/400-150-0x0000000000270000-0x0000000000964000-memory.dmp
      Filesize

      7.0MB

    • memory/2296-164-0x0000000000000000-mapping.dmp
    • memory/2332-160-0x0000000000F20000-0x0000000001614000-memory.dmp
      Filesize

      7.0MB

    • memory/2332-156-0x0000000000000000-mapping.dmp
    • memory/2332-163-0x0000000000F20000-0x0000000001614000-memory.dmp
      Filesize

      7.0MB

    • memory/2332-162-0x0000000000F20000-0x0000000001614000-memory.dmp
      Filesize

      7.0MB

    • memory/2332-161-0x0000000000F20000-0x0000000001614000-memory.dmp
      Filesize

      7.0MB

    • memory/2332-159-0x00000000772E0000-0x000000007746E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-141-0x0000000000000000-mapping.dmp
    • memory/2496-147-0x00000000772E0000-0x000000007746E000-memory.dmp
      Filesize

      1.6MB

    • memory/2496-149-0x0000000001250000-0x000000000190B000-memory.dmp
      Filesize

      6.7MB

    • memory/2496-153-0x0000000001250000-0x000000000190B000-memory.dmp
      Filesize

      6.7MB

    • memory/2496-152-0x0000000001250000-0x000000000190B000-memory.dmp
      Filesize

      6.7MB

    • memory/2496-151-0x0000000001250000-0x000000000190B000-memory.dmp
      Filesize

      6.7MB

    • memory/2656-137-0x0000000000000000-mapping.dmp
    • memory/2724-115-0x00000000007F1000-0x0000000000817000-memory.dmp
      Filesize

      152KB

    • memory/2724-117-0x0000000000400000-0x00000000004E6000-memory.dmp
      Filesize

      920KB

    • memory/2724-116-0x00000000005C0000-0x0000000000605000-memory.dmp
      Filesize

      276KB

    • memory/3268-154-0x0000000000000000-mapping.dmp
    • memory/3940-118-0x0000000000000000-mapping.dmp
    • memory/4008-121-0x0000000000000000-mapping.dmp