Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 06:18

General

  • Target

    49870a9a095a00bda9c216b8b6583c087fcfa3abb8c29e4ed82af3070fa94ae8.exe

  • Size

    12.5MB

  • MD5

    737026c2e3083208c3013bb9f938c2d5

  • SHA1

    208dc36aa490fa019cb980d616043cf77ad0e63c

  • SHA256

    49870a9a095a00bda9c216b8b6583c087fcfa3abb8c29e4ed82af3070fa94ae8

  • SHA512

    0ce7b82ce2fd4cd89b61a2d59cc0e82fe0f46dfebbbc66a3b9d1afa1f6292b2e69e124c3542c455a2d83a6b958fbb9721bba20b87d77e72e572f2450fa441759

  • SSDEEP

    393216:TSihinP0xrVjWZyR8itPEodgTt7nZWrRGbHr6ZDsD:tuP0xoditcodgBbMyHr6ZDsD

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49870a9a095a00bda9c216b8b6583c087fcfa3abb8c29e4ed82af3070fa94ae8.exe
    "C:\Users\Admin\AppData\Local\Temp\49870a9a095a00bda9c216b8b6583c087fcfa3abb8c29e4ed82af3070fa94ae8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://wwhs.lanzouo.com/XTSpeed
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffec10246f8,0x7ffec1024708,0x7ffec1024718
        3⤵
          PID:4008
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:1
          3⤵
            PID:4192
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:1
            3⤵
              PID:1420
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:8
              3⤵
                PID:4116
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
                3⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1144
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:2
                3⤵
                  PID:1828
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:8
                  3⤵
                    PID:496
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3688
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                    3⤵
                      PID:2924
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:1
                      3⤵
                        PID:4900
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
                        3⤵
                          PID:2188
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                          3⤵
                            PID:4740
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,2888849639324627301,945294013395011786,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3568
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ipconfig /renew
                          2⤵
                            PID:4960
                            • C:\Windows\SysWOW64\ipconfig.exe
                              ipconfig /renew
                              3⤵
                              • Gathers network information
                              PID:4764
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1856
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1880

                            Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    3423d7e71b832850019e032730997f69

                                    SHA1

                                    bbc91ba3960fb8f7f2d5a190e6585010675d9061

                                    SHA256

                                    53770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649

                                    SHA512

                                    03d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    96B

                                    MD5

                                    adf8e07d6427c157072378c4e6ba8880

                                    SHA1

                                    5ef6fe16fcadd26c0f239d2361bbc543bbe8d595

                                    SHA256

                                    26ad564d88d2e142667d2107844dadcedccbcc4cf469454717422d401bf1ff00

                                    SHA512

                                    fe8f04a630b35ef238ecda08822d0a7f5a4272dbff4519ad339150fc8b4b8fe22f1666f5db10217b4a72f86bcb1fac54a6ee7c9c8f509afea480e158b1783a2f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    285252a2f6327d41eab203dc2f402c67

                                    SHA1

                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                    SHA256

                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                    SHA512

                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    182B

                                    MD5

                                    2a34e3b0cb9618524ad550fde8717ef6

                                    SHA1

                                    a3868e26390a7448be6f2f9507bb5012f604517e

                                    SHA256

                                    869ef21fe529217d02556f8e6a5b3387a3d8c785809d7d52fecc7c8cf1795dbb

                                    SHA512

                                    7fa1168b89b26751123d36e1456e102b77a5532e036a6ec09a1186ab9c6a21f8a3cbbbf6a3fa3fa730af59f2a8eb265a4a5dcb5547a3e56d4d2ea86257ddadcb

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    111B

                                    MD5

                                    807419ca9a4734feaf8d8563a003b048

                                    SHA1

                                    a723c7d60a65886ffa068711f1e900ccc85922a6

                                    SHA256

                                    aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                    SHA512

                                    f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    98b02a6305642e696d991376649723d8

                                    SHA1

                                    2596c177978a40ff717c2c705994d667ea351bc1

                                    SHA256

                                    323c905927d5fab5a3fffd6d0bb67b0fa5b8584e116d3f2542ae294ee2890cd6

                                    SHA512

                                    e588b895ba57715ce482d843452a0f1f1e72ac9ff87b47df3aabcc83513530995a9a4bf53c5c30c6a39fb8becbd22ac30e36347ccb4335777a3f1dab95249c0f

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    72c9574e56474456906a6b71f275580c

                                    SHA1

                                    49b9650cc491fda301131976b91e80eb16b918fd

                                    SHA256

                                    aa13787c9292f2d2a297129058e73bf335ab8f2b0e6edc826496516aabaa1135

                                    SHA512

                                    230a6b9eaa2c962e3c0f043020454a5b7a3d2ac31183448ac9c73498ff5afd0dcc48ff23707ec0ff8fa1f048680bab0d7e91eb68f130b6f9b1885203383e5c36

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                    Filesize

                                    24KB

                                    MD5

                                    0e78f9a3ece93ae9434c64ea2bff51dc

                                    SHA1

                                    a0e4c75fe32417fe2df705987df5817326e1b3b9

                                    SHA256

                                    5c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68

                                    SHA512

                                    9d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    dcea1bcba02a71a6a590ab1f64697366

                                    SHA1

                                    8caead3e51e83975d402d756a43532e9fb75a984

                                    SHA256

                                    4815666ca077ec9b8ef11bb833b88f266ca91f49ec275ee867a6d2295e932851

                                    SHA512

                                    fa31381ab49434aa1487815180425c5eed18ea65ae340015dd1bf5614480b7ebdc083e1ece7fbe577f3226e28b5d9d99552a3a99f4c6e00a3f572fd952464fbd

                                  • C:\Users\Admin\AppData\Local\Temp\ExuiKrnln_Win32_20230430.lib

                                    Filesize

                                    1.5MB

                                    MD5

                                    b5ac6dd9d245766a3920b9afe659c4c6

                                    SHA1

                                    0d078ce94996eb52da5a4e6dcfed36538496078a

                                    SHA256

                                    5723d1d8d0c12d8d0e4118c738e19b7a720ed3494b3d583a6e261cce2e208338

                                    SHA512

                                    9cf44e4664bf2e9919c98e76e406d5bd89f2a5821e636508d4245ff29b1e91b9ab82e95209e4a19e3c10ed2caebf5514be506750734268d88c0efd7ba024eafe

                                  • memory/4476-24-0x0000000003E20000-0x0000000003E21000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-45-0x0000000004140000-0x00000000041D2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4476-14-0x0000000003D80000-0x0000000003D81000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-15-0x0000000003D90000-0x0000000003D91000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-16-0x0000000003DA0000-0x0000000003DA1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-17-0x0000000003DB0000-0x0000000003DB1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-18-0x0000000003DC0000-0x0000000003DC1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-20-0x0000000003DE0000-0x0000000003DE1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-19-0x0000000003DD0000-0x0000000003DD1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-21-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-22-0x0000000003E00000-0x0000000003E01000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-23-0x0000000003E10000-0x0000000003E11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-0-0x0000000001F20000-0x0000000001F21000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-25-0x0000000003E30000-0x0000000003E31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-26-0x0000000003E40000-0x0000000003E41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-27-0x0000000003E80000-0x0000000004133000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/4476-34-0x0000000003E80000-0x0000000004133000-memory.dmp

                                    Filesize

                                    2.7MB

                                  • memory/4476-35-0x0000000004140000-0x00000000041D2000-memory.dmp

                                    Filesize

                                    584KB

                                  • memory/4476-40-0x00000000041E0000-0x00000000041F6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/4476-10-0x0000000003D50000-0x0000000003D51000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-46-0x00000000041E0000-0x00000000041F6000-memory.dmp

                                    Filesize

                                    88KB

                                  • memory/4476-47-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-12-0x0000000003D70000-0x0000000003D71000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-57-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-59-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-13-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-75-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-11-0x0000000003D60000-0x0000000003D61000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-8-0x0000000003D30000-0x0000000003D31000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-9-0x0000000003D40000-0x0000000003D41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-7-0x0000000003D20000-0x0000000003D21000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-6-0x0000000003D10000-0x0000000003D11000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-5-0x0000000003D00000-0x0000000003D01000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-3-0x0000000003CF0000-0x0000000003CF1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-4-0x0000000000400000-0x0000000001E25000-memory.dmp

                                    Filesize

                                    26.1MB

                                  • memory/4476-1-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4476-2-0x0000000003CE0000-0x0000000003CE1000-memory.dmp

                                    Filesize

                                    4KB