Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2023, 15:53

General

  • Target

    CheatEngine75P.exe

  • Size

    26.3MB

  • MD5

    124e5ba725b21e8b9efc27a94a7c0e6b

  • SHA1

    0c94aad1ba26b9f49814b949433488c7a2004054

  • SHA256

    bc37bba7efe232feebe23a7152f8a7407e5f868e771a46bf67106e70f295cbc4

  • SHA512

    a5260695ea7a27ad6a060809647fff447f51f8cec19f91568c37f4cc66278547fc41bb7c6b9f390c5d8f11f63df4c267b6e2cc0c56a87b363d9847bd945dfbb6

  • SSDEEP

    786432:4ru6+EORu4HYTd1AEtHYzENmuF7oUNUQWQu7bZmhxZTtU:4coJTd1dtHkENvhoLXQNTu

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe
    "C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5052
    • C:\Users\Admin\AppData\Local\Temp\is-PURRT.tmp\CheatEngine75P.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-PURRT.tmp\CheatEngine75P.tmp" /SL5="$401D8,26635706,832512,C:\Users\Admin\AppData\Local\Temp\CheatEngine75P.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.patreon.com/oauth2/authorize?response_type=code&client_id=Ee5CBUULyVg9XvCXN5O4Ckb8scfLqvrS7ciLBTFDNOukA_rte9ln17e0ho3NV7ry&state=XSOe7LL4HI5gdpo7wX2o2vYluoZnSqeQj24qOQvw&redirect_uri=https%3A%2F%2Fcheatengine.org%2Fpatreon%2FLogin2.php&scope=identity
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ff8252246f8,0x7ff825224708,0x7ff825224718
          4⤵
            PID:4000
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:3
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3220
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
            4⤵
              PID:4696
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 /prefetch:8
              4⤵
                PID:3356
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                4⤵
                  PID:4356
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:1
                  4⤵
                    PID:4608
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:1
                    4⤵
                      PID:2856
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:1
                      4⤵
                        PID:4284
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                        4⤵
                          PID:2304
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:8
                          4⤵
                            PID:4280
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:8
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1440
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:1
                            4⤵
                              PID:3316
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1
                              4⤵
                                PID:4140
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,3679125813514254887,278607565452252365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:2
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4904
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4284
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3508

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                              Filesize

                              1KB

                              MD5

                              0ae109b187809ee925374355f2d1287a

                              SHA1

                              2ce90b19e3409a896fd9d00cb6da1f462cedfe09

                              SHA256

                              6b733e5085383602a6a9b13f60738a2ff23ff5ec4771b03f86afe6244b3dfa9b

                              SHA512

                              c0e6e1f12048bcca6ee964751e18c8d8714665771e06d4bc0d514ac0977a636186e16010aae5a57762b11dbf2139ac6b2ff83ef4fe17aeae184e52c5e5c69ee9

                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27

                              Filesize

                              408B

                              MD5

                              a5c27dbf3b58fb6b5f0f5e152b05ed2f

                              SHA1

                              b036408caa6a08411c63908650241ee19ec3f13e

                              SHA256

                              19fa1924deb21c65052297f7f6830cb0bbf6034a95c58ecf847606ddb57cd3fd

                              SHA512

                              60f080038ca39ea493ed68d432cc32f4bf4879df0f3e27ca2eeedc61a3fa7ca9317b93573e5d87ace130f40b2b36ee8ca409da0c189274e8e1263b2e28672e45

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              3423d7e71b832850019e032730997f69

                              SHA1

                              bbc91ba3960fb8f7f2d5a190e6585010675d9061

                              SHA256

                              53770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649

                              SHA512

                              03d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              74d3d46d4277082bf34ea4b78d6c026b

                              SHA1

                              aa074ed32723aea0f9a41f0c4b9a455a8750c552

                              SHA256

                              f5b6f93b86d75f12ff8a93781981a722752cdc80e505b0daedf13f32b8f49b45

                              SHA512

                              6c4ea9312f5070c18d151cbd4c1c3e5e7ca4073d1ba7f18e991223490f0eda674f78a5cc778c59360f30627233103a0130dca119fe2df9fe882fe53c92ddaf74

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              3KB

                              MD5

                              1f365bae17f363d30160e10cbf28a791

                              SHA1

                              30398de0013c75895dcead206bfbda73fbb3b4a2

                              SHA256

                              9681aeadac6a9fb3fea2aff75dba0340c93bc093ccf0c42497afa23647c04548

                              SHA512

                              add13fe44765e27636766c6efe5e12496aff670b856b5828612d976c193e0363c21072e5f402855ce5e17caf7c2a3cf1a2fce390f9bf1de612562c3ec7bc6452

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              285252a2f6327d41eab203dc2f402c67

                              SHA1

                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                              SHA256

                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                              SHA512

                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              b1d9e7f65111d69b4bc71f2b41b5a948

                              SHA1

                              c9dc72d01aab545d303e2b860238be184ceabdc8

                              SHA256

                              0c891270c81c8dd2d2f3804490b5bc83ed7f53cdfe9882ba2e4d7990a9c90a8a

                              SHA512

                              740cdc194567ae32530291c7ad2148286d1f62e4d3990f4ae1c1f8181e21dfc44292788c1d5bc7990865ee01b9592bc3bf109a0cc95417c67886d847a906b56a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              b7d60e7fa1846deee2d25d505e94d39c

                              SHA1

                              fdb9206e8be4a6e8132faf283c1660835aaa6fda

                              SHA256

                              31a8cdc411e38e5ffc650b105078adcd712655698b06cea4b2ce9d70d5b37e30

                              SHA512

                              d2207eb97586fb5a5165ca046f45aa0361f932563b5850008181da2073a5f7364e3cd1a49b892f018d5c660436a48c2d1cfd67f229f693a108e8a2df5295e7db

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              0788dfa9fe840f77d947fd28af48406f

                              SHA1

                              0f35e99fda923ad51db6e5178e505d7ea52c537a

                              SHA256

                              8ac5d91e45122ad77de04f480d129883d5ede49d9ae04b2b4b118717b5b78452

                              SHA512

                              09e80acbce1dab54489e5656c0ecb292fc23c9e45349fbc4ca2667d4117d468fe0acd7e77c29e343eed671d37377774dd287e69c0802dbce8ffd38f2985cf95c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              0e78f9a3ece93ae9434c64ea2bff51dc

                              SHA1

                              a0e4c75fe32417fe2df705987df5817326e1b3b9

                              SHA256

                              5c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68

                              SHA512

                              9d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              1KB

                              MD5

                              b31fb81cf89037be7bf049bcb778ecdd

                              SHA1

                              958e37640d62037b4179a020df12ec39aa6f98bf

                              SHA256

                              d00681f0c3182dffd8056c1de21b373fda7d44fd5b99d3e27265abceab930d05

                              SHA512

                              8afbcf66da6740c021938dcd8d95e8df3090af5cbcc49548c775afb60daf620839f78e1652decf7c891c271e657904cb76166f2c49ba93e8bf50dc51021aeaac

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe586da9.TMP

                              Filesize

                              1KB

                              MD5

                              a18d78cd832b6a8ebc49a0c12fcfa486

                              SHA1

                              e23f35cc46beeea2d0a71364fd8865add1f529dc

                              SHA256

                              07cf14eada18c4fdd3f29552a5bb2f3a3fab7cd8483116fb68b82a47bf3c523b

                              SHA512

                              36bf28cbd3dbe716d84a0f8507525e251f4202d404d5b18024a9761f0b47676f88d658931da0f6c955b532b178cf2f0359365d0d0dc1f71eb4483d4af5500761

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              12KB

                              MD5

                              f67f2d00e0e84c53e0a8218c92147a2f

                              SHA1

                              e614a99d7e5aa0f89c1c8f602d0a4e21b3bc59c1

                              SHA256

                              3496dfe10f45ad35e4e25fc974f2b91e2ac8e73add2d1c22d1855d5b5d05cdab

                              SHA512

                              e9f5cae55ee17cd4c334d5e50558dbeba59194c97fb97e6d2d26881d741c5941d97021200fdba5796308001601bfc2077f934451bff02c82c8f7c64333b3f137

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              12KB

                              MD5

                              1473dc74fa30d366f24377c038d55303

                              SHA1

                              cbeab78f7260bc9b84151e1e9e4197de95ac9f28

                              SHA256

                              88b6a81e88a37e2ba4365482a22a857c70191ffc590b1aff1e8bfc6380321df1

                              SHA512

                              70ff4a3994c4d4c182807de4919cdf75c4aadd3d12704f6ff1a6b681242c87f0363a556f6c6925e1a53ef350d8e97de6d243271d99486f2e76142b86679f3aeb

                            • C:\Users\Admin\AppData\Local\Temp\is-FVGML.tmp\pcheck.dll

                              Filesize

                              347KB

                              MD5

                              5663d99464c96a2677bf7a37efbead5d

                              SHA1

                              270520e3b3a30232109887213d25972c37677d3d

                              SHA256

                              cab93d088904265378f94b9a3ad7f2f93480b4c3f645bd1627b259f0cffb5fa8

                              SHA512

                              521ff832f662d4458114d17ffc7ae4e0bc66cbd06d2a676fb02acbf94cb8e86ba62aa7fe3901adac284080cebc5451750b91b7be3dd5422e1ef8a23603141a02

                            • C:\Users\Admin\AppData\Local\Temp\is-PURRT.tmp\CheatEngine75P.tmp

                              Filesize

                              3.1MB

                              MD5

                              ce748c0283fa3fdbb974580ad37c6e71

                              SHA1

                              40118bd5160d4b9cfba97d51fd842a9421203111

                              SHA256

                              4f807664e75665e2f4b46183327ce0125a9fc1d4e38f55a42113ecfa5c519847

                              SHA512

                              4beafc83f4808bec3026b158ee11b3de8976e510d24a1b330cd01d9e864c11b11cee56b0f740e1c296be4ee572a3e63529c041503e9c46f17d805953a7d93f00

                            • memory/4508-141-0x0000000000400000-0x000000000071B000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4508-291-0x0000000000400000-0x000000000071B000-memory.dmp

                              Filesize

                              3.1MB

                            • memory/4508-139-0x0000000002720000-0x0000000002721000-memory.dmp

                              Filesize

                              4KB

                            • memory/5052-134-0x0000000000400000-0x00000000004D8000-memory.dmp

                              Filesize

                              864KB

                            • memory/5052-140-0x0000000000400000-0x00000000004D8000-memory.dmp

                              Filesize

                              864KB