Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:46

General

  • Target

    b4e634baeecde29b2599537d357f87a7.exe

  • Size

    89KB

  • MD5

    b4e634baeecde29b2599537d357f87a7

  • SHA1

    29ca3fd61d1563184e8c6353520ac2b0b82c81f5

  • SHA256

    9a56d506889bc7c1904d4869a9e21e383a6f66eadc0dd71191cb74d3a2ed20b6

  • SHA512

    c26d975be9a020a11248147526d1bc0733e62e4dee1cf146775cc463419161e9bad886c4a5fe56d4608f03540ce1655abd250d90f1fb2637cc1c597f6b61e64e

  • SSDEEP

    1536:lr9RFbR3XfYFHuI2Zod8+7gTSaSMi9xfQb+ng5aOmTcuOiFeR7Rkxr:fbR3XMuYd8jV5iQb+ngQZhYRV

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4e634baeecde29b2599537d357f87a7.exe
    "C:\Users\Admin\AppData\Local\Temp\b4e634baeecde29b2599537d357f87a7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\oculta.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\oculta.ps1"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\1119860\Win1119860\1119860.exe
          "C:\1119860\Win1119860\1119860.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          PID:3868
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://server.massgravs.pro/index.php
          4⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3608
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd7bb46f8,0x7ffbd7bb4708,0x7ffbd7bb4718
            5⤵
              PID:2292
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
              5⤵
                PID:3192
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1280
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3024 /prefetch:8
                5⤵
                  PID:1028
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                  5⤵
                    PID:2500
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                    5⤵
                      PID:4792
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                      5⤵
                        PID:3568
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                        5⤵
                          PID:3328
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                          5⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5096
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                          5⤵
                            PID:5088
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                            5⤵
                              PID:3924
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:1
                              5⤵
                                PID:5020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9885950212252514907,13794052485696159245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1
                                5⤵
                                  PID:2672
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3912
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4904

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\1119860\Win1119860\v8dll.dll

                              Filesize

                              14.8MB

                              MD5

                              a83f105025e40d95a9de06ed52026439

                              SHA1

                              084032f9f86e80081a3312423891e67f23cbc753

                              SHA256

                              f7822fd1f8a9a66a2d4ec56e29cf95c43b9f76c3dc27a261ea2f7dba85f89db2

                              SHA512

                              e3698fbbf8e1ac7b55939266a76ea00e287be8af3873e99e2c705a51dd2088eb6e9b3be4172aeeabbd03142874bcb6495e759902de49c05b4b0c79f07953c801

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              1ac52e2503cc26baee4322f02f5b8d9c

                              SHA1

                              38e0cee911f5f2a24888a64780ffdf6fa72207c8

                              SHA256

                              f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4

                              SHA512

                              7670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              b2a1398f937474c51a48b347387ee36a

                              SHA1

                              922a8567f09e68a04233e84e5919043034635949

                              SHA256

                              2dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6

                              SHA512

                              4a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              216B

                              MD5

                              4dd2778e773b3ecf5b721474cfbfe427

                              SHA1

                              6a5bcf38521e5c799258d1563763676e313c89a4

                              SHA256

                              5fd691453820d585fa2d7b658c0723ca3d580f3ca43f19ddb1d834a83c539031

                              SHA512

                              4f715225a00aadf29f69ad5678dc0d3aa2fdec0ee6cd512904412785aa821ec33faf2f2ac0fddfe083bf19e1081442cb23d2307afa8887381315680d48361b47

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              81146275252710b9ae4e9d94677f27f8

                              SHA1

                              257ccd202b50f112d79822ef5fa005b06879a318

                              SHA256

                              c7e7e8836f440d5a0cf7c10f179732000bb79e0c02a645bb37a3e0193aa6bf5e

                              SHA512

                              7dcf222b1e4a5a215867053f5297dab81734dd816f11a15117c02b55eb76e537e9632dd01d592199d086186cc54ff5f4ed2539c5d195829cf092fee1845d874f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              0a839e32218fdc602bd019c74071c554

                              SHA1

                              f6a4a512521a06062ceb8d808b38f5a3fa6c2ca5

                              SHA256

                              5e0a43f25e84a07695595fb92daf64f649c95ddf7c6ef10f34089d60ad697082

                              SHA512

                              161db81e573bd7ca071c5b30f7eea5bb2ac3809cbbb50ad417552ffec46048fc21603a08c3b1d7c1d177435fd13e3c1a6311c406cd18c362fd0b315f1535beff

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              53fdda464c6c54e928bae3b0668a62b0

                              SHA1

                              8b8c4f929dfec1cf85503996872cfdeed3fc731b

                              SHA256

                              82c521c7e8a53efbe92b158aa5067bad1a4e7e969aa7aaa99bba95a0e4783882

                              SHA512

                              ecb0b216628f09f8ff7d217081a29562ba0e3dfb7f76dde3dd6581391b94721f6e38fc075f4cb2d9ac0827bc39f4e8af64bf7ad6b39de0313d70a9c5fe4fbef8

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u5wfgmms.0ci.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\oculta.bat

                              Filesize

                              158B

                              MD5

                              54c2f3a00d5bc5ffd7f5338b8d7e265c

                              SHA1

                              5c4086ecf9a3508666b1bd4e27ba8f7a517813be

                              SHA256

                              a6aec3bbc95bc0a300857092e35a602c601397eefc8565f2bc42e7e77df1eddb

                              SHA512

                              05bf9854e0ba84f12e7ddbaf14886491d98a832ef3287b3affc08079b9d08c88d01c386737a3b3e1d9be3cd8850266bb9ea037269e027209410f1ea6c5cf685c

                            • C:\Users\Admin\AppData\Local\Temp\oculta.ps1

                              Filesize

                              1KB

                              MD5

                              921c2fb8f2423f9fb469e274eed1d860

                              SHA1

                              48bf33a865d9415e514281ecb48ac8e8e43ad4bc

                              SHA256

                              ce0bd47287e5b4ebe9de5d050e27e36ba863af9a9b21c52a3e8bc5f135252220

                              SHA512

                              31d6a485ff59da843ce4048322d4357ec1eb832b7acb0bff4aa6a9005efdd26be97163cdc5e8da30684ce2b45b72b1b9d02bcec800c7726b26fb52f6dafb16db

                            • \??\pipe\LOCAL\crashpad_3608_GZVLTXBSPLELCNKB

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/1192-7-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1192-0-0x000000007502E000-0x000000007502F000-memory.dmp

                              Filesize

                              4KB

                            • memory/1192-6-0x0000000004E40000-0x0000000004E96000-memory.dmp

                              Filesize

                              344KB

                            • memory/1192-36-0x000000007502E000-0x000000007502F000-memory.dmp

                              Filesize

                              4KB

                            • memory/1192-5-0x0000000004BC0000-0x0000000004BCA000-memory.dmp

                              Filesize

                              40KB

                            • memory/1192-4-0x0000000004C50000-0x0000000004CE2000-memory.dmp

                              Filesize

                              584KB

                            • memory/1192-3-0x0000000005160000-0x0000000005704000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/1192-2-0x0000000004B10000-0x0000000004BAC000-memory.dmp

                              Filesize

                              624KB

                            • memory/1192-1-0x0000000000110000-0x000000000012A000-memory.dmp

                              Filesize

                              104KB

                            • memory/1192-37-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-15-0x00000000056D0000-0x00000000056F2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1704-58-0x0000000008AB0000-0x0000000008AC1000-memory.dmp

                              Filesize

                              68KB

                            • memory/1704-33-0x0000000007750000-0x00000000077E6000-memory.dmp

                              Filesize

                              600KB

                            • memory/1704-31-0x0000000007DD0000-0x000000000844A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1704-32-0x0000000006BF0000-0x0000000006C0A000-memory.dmp

                              Filesize

                              104KB

                            • memory/1704-38-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-40-0x00000000067E0000-0x0000000006812000-memory.dmp

                              Filesize

                              200KB

                            • memory/1704-41-0x000000006FF80000-0x000000006FFCC000-memory.dmp

                              Filesize

                              304KB

                            • memory/1704-42-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-43-0x0000000070040000-0x0000000070394000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1704-54-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-53-0x0000000007CB0000-0x0000000007CCE000-memory.dmp

                              Filesize

                              120KB

                            • memory/1704-55-0x0000000008A00000-0x0000000008AA3000-memory.dmp

                              Filesize

                              652KB

                            • memory/1704-56-0x0000000007DA0000-0x0000000007DAA000-memory.dmp

                              Filesize

                              40KB

                            • memory/1704-57-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-34-0x0000000006C90000-0x0000000006CB2000-memory.dmp

                              Filesize

                              136KB

                            • memory/1704-59-0x0000000008AF0000-0x0000000008B02000-memory.dmp

                              Filesize

                              72KB

                            • memory/1704-60-0x0000000008AE0000-0x0000000008AEA000-memory.dmp

                              Filesize

                              40KB

                            • memory/1704-29-0x0000000006A30000-0x0000000006A7C000-memory.dmp

                              Filesize

                              304KB

                            • memory/1704-11-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-89-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-28-0x00000000066A0000-0x00000000066BE000-memory.dmp

                              Filesize

                              120KB

                            • memory/1704-27-0x00000000060A0000-0x00000000063F4000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/1704-16-0x0000000005FA0000-0x0000000006006000-memory.dmp

                              Filesize

                              408KB

                            • memory/1704-17-0x0000000006010000-0x0000000006076000-memory.dmp

                              Filesize

                              408KB

                            • memory/1704-14-0x0000000075020000-0x00000000757D0000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/1704-13-0x0000000005800000-0x0000000005E28000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/1704-12-0x0000000002DB0000-0x0000000002DE6000-memory.dmp

                              Filesize

                              216KB

                            • memory/3868-165-0x0000000004E40000-0x0000000005D22000-memory.dmp

                              Filesize

                              14.9MB

                            • memory/3868-164-0x0000000000400000-0x0000000004836000-memory.dmp

                              Filesize

                              68.2MB

                            • memory/3868-85-0x0000000004E40000-0x0000000005D22000-memory.dmp

                              Filesize

                              14.9MB