Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    23-11-2020 18:30

General

  • Target

    bei.dll

  • Size

    344KB

  • MD5

    0358fcd58c56d6cedec03b80c64ff988

  • SHA1

    34816e94bf4cc91c3c8bd6a8c087f6592ab28e96

  • SHA256

    10ec4e9f67028d2bf9f5e42cb2918663436e21760a5f1e08950b19ac2745e48c

  • SHA512

    677e4d1c61cfb19ca47c11d3fbfbc68f546ee5095e89075b76ba9c4b7b42ebe4f920ce0ff6b4174ce33fc87f97c398a757203c406413423751b8caa1d9d2248a

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

23/11

C2

https://orangeboxasia.com/wp-smarts.php

https://m3izoglass.ro/wp-smarts.php

https://bayza.ro/up_img_01.php

https://cofetariarodna.ro/errors.php

https://casapintea.ro/logs.php

https://roractaseja.ml/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blacklisted process makes network request 15 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Modifies service 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Discovers systems in the same network 1 TTPs 4 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 102 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\bei.dll
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          4⤵
          • Blacklisted process makes network request
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:912
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c ipconfig /all
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1916
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              6⤵
              • Modifies service
              • Gathers network information
              PID:1088
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1572
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net config workstation
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1748
            • C:\Windows\SysWOW64\net.exe
              net config workstation
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1428
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 config workstation
                7⤵
                  PID:1468
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c net view /all
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:896
              • C:\Windows\SysWOW64\net.exe
                net view /all
                6⤵
                • Discovers systems in the same network
                PID:2040
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c net view /all /domain
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2044
              • C:\Windows\SysWOW64\net.exe
                net view /all /domain
                6⤵
                • Discovers systems in the same network
                PID:1056
            • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\certutil.exe
              "C:\Users\Admin\AppData\Local\Temp\Cawaehpy\certutil.exe" -A -n "xeavcag" -t "C,C,C" -i "C:\Users\Admin\AppData\Local\Temp\ervyy.crt" -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jl56y3z6.default-release"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:680
      • C:\Windows\system32\cmd.exe
        cmd.exe /c ipconfig /all
        2⤵
          PID:456
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            3⤵
            • Modifies service
            • Gathers network information
            PID:1076
        • C:\Windows\system32\cmd.exe
          cmd.exe /c net config workstation
          2⤵
            PID:1080
            • C:\Windows\system32\net.exe
              net config workstation
              3⤵
                PID:1924
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 config workstation
                  4⤵
                    PID:1196
              • C:\Windows\system32\cmd.exe
                cmd.exe /c net view /all
                2⤵
                  PID:1472
                  • C:\Windows\system32\net.exe
                    net view /all
                    3⤵
                    • Discovers systems in the same network
                    PID:1996
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c net view /all /domain
                  2⤵
                    PID:1748
                    • C:\Windows\system32\net.exe
                      net view /all /domain
                      3⤵
                      • Discovers systems in the same network
                      PID:940
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c nltest /domain_trusts
                    2⤵
                      PID:1236
                      • C:\Windows\system32\nltest.exe
                        nltest /domain_trusts
                        3⤵
                          PID:1220
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c nltest /domain_trusts /all_trusts
                        2⤵
                          PID:1736
                          • C:\Windows\system32\nltest.exe
                            nltest /domain_trusts /all_trusts
                            3⤵
                              PID:604

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Execution

                        Command-Line Interface

                        1
                        T1059

                        Persistence

                        Modify Existing Service

                        1
                        T1031

                        Defense Evasion

                        Modify Registry

                        1
                        T1112

                        Credential Access

                        Credentials in Files

                        2
                        T1081

                        Discovery

                        Remote System Discovery

                        1
                        T1018

                        System Information Discovery

                        1
                        T1082

                        Collection

                        Data from Local System

                        2
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\MSVCR100.dll
                          MD5

                          0e37fbfa79d349d672456923ec5fbbe3

                          SHA1

                          4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                          SHA256

                          8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                          SHA512

                          2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\certutil.exe
                          MD5

                          0c6b43c9602f4d5ac9dcf907103447c4

                          SHA1

                          7a77c7ae99d400243845cce0e0931f029a73f79a

                          SHA256

                          5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

                          SHA512

                          b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\freebl3.dll
                          MD5

                          269beb631b580c6d54db45b5573b1de5

                          SHA1

                          64050c1159c2bcfc0e75da407ef0098ad2de17c8

                          SHA256

                          ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

                          SHA512

                          649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\libnspr4.dll
                          MD5

                          6e84af2875700285309dd29294365c6a

                          SHA1

                          fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

                          SHA256

                          1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

                          SHA512

                          0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\libplc4.dll
                          MD5

                          1fae68b740f18290b98b2f9e23313cc2

                          SHA1

                          fa3545dc8db38b3b27f1009e1d61dc2949df3878

                          SHA256

                          751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

                          SHA512

                          5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\libplds4.dll
                          MD5

                          9ae76db13972553a5de5bdd07b1b654d

                          SHA1

                          0c4508eb6f13b9b178237ccc4da759bff10af658

                          SHA256

                          38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

                          SHA512

                          db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\nss3.dll
                          MD5

                          a1c4628d184b6ab25550b1ce74f44792

                          SHA1

                          c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

                          SHA256

                          3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

                          SHA512

                          07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\nssutil3.dll
                          MD5

                          c26e940b474728e728cafe5912ba418a

                          SHA1

                          7256e378a419f8d87de71835e6ad12faadaaaf73

                          SHA256

                          1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

                          SHA512

                          bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\smime3.dll
                          MD5

                          a5c670edf4411bf7f132f4280026137b

                          SHA1

                          c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

                          SHA256

                          aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

                          SHA512

                          acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\softokn3.dll
                          MD5

                          2ab31c9401870adb4e9d88b5a6837abf

                          SHA1

                          4f0fdd699e63f614d79ed6e47ef61938117d3b7a

                          SHA256

                          22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

                          SHA512

                          bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

                        • C:\Users\Admin\AppData\Local\Temp\Cawaehpy\sqlite3.dll
                          MD5

                          b58848a28a1efb85677e344db1fd67e6

                          SHA1

                          dad48e2b2b3b936efc15ac2c5f9099b7a1749976

                          SHA256

                          00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

                          SHA512

                          762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

                        • C:\Users\Admin\AppData\Local\Temp\ervyy.crt
                          MD5

                          fb722c35ec45c801f26abea551c662bd

                          SHA1

                          e80b4a8e6f27c7bfee6eda62a82b179cc8a1a4a4

                          SHA256

                          71224ab5853988d067e6e30ab8482ae21ab94518da8f0d70cfde1007bc2ae63e

                          SHA512

                          44c884bfed7307b2e8e455ea20e0b88f144500809c2d82cefa68ce6d237811e58bd908fd9a2f478b439eba467eb4dd4d37ca194ff32fb5c785dc288a4542b50c

                        • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jl56y3z6.default-release\cert9.db
                          MD5

                          fd9b9e634bb063961901081f2902ea44

                          SHA1

                          9e38d69ed4315cca3633d3f9878f5c9e4f28f2bc

                          SHA256

                          4b2afbb30d9bbfc1fd435e7997ea8e33d0e06dd7afe122e4a835bf9ed1deff05

                          SHA512

                          b74d3a21553a056f71fdd555fea926b08c8ade2116235a9c07f9605af58962bad0b4222332d1a6839420a03b10df15e36f05f667080d1edb21650ec6170e9801

                        • C:\Users\Admin\AppData\Roaming\Uxy\ygi.an
                          MD5

                          2ae2c7c61cdd59ab1f5168f4e0f7941c

                          SHA1

                          ae1a81afea9615187e8009aa2221986a5cfbe0d0

                          SHA256

                          2bb35f1dc11a458cf0e00632987f8290ca7f5a00912a8d47b8d6ed060fe9855a

                          SHA512

                          9fabf80f847e0b083c84d4c404cd8c8ca48a1b391f82c25c50fead2cf72bb93317940a237d067749d2861f5b46f338b65e57536afd567d1b1a7c6a34ca566c8c

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\certutil.exe
                          MD5

                          0c6b43c9602f4d5ac9dcf907103447c4

                          SHA1

                          7a77c7ae99d400243845cce0e0931f029a73f79a

                          SHA256

                          5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

                          SHA512

                          b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\certutil.exe
                          MD5

                          0c6b43c9602f4d5ac9dcf907103447c4

                          SHA1

                          7a77c7ae99d400243845cce0e0931f029a73f79a

                          SHA256

                          5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

                          SHA512

                          b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\freebl3.dll
                          MD5

                          269beb631b580c6d54db45b5573b1de5

                          SHA1

                          64050c1159c2bcfc0e75da407ef0098ad2de17c8

                          SHA256

                          ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

                          SHA512

                          649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\libnspr4.dll
                          MD5

                          6e84af2875700285309dd29294365c6a

                          SHA1

                          fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

                          SHA256

                          1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

                          SHA512

                          0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\libplc4.dll
                          MD5

                          1fae68b740f18290b98b2f9e23313cc2

                          SHA1

                          fa3545dc8db38b3b27f1009e1d61dc2949df3878

                          SHA256

                          751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

                          SHA512

                          5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\libplds4.dll
                          MD5

                          9ae76db13972553a5de5bdd07b1b654d

                          SHA1

                          0c4508eb6f13b9b178237ccc4da759bff10af658

                          SHA256

                          38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

                          SHA512

                          db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\msvcr100.dll
                          MD5

                          0e37fbfa79d349d672456923ec5fbbe3

                          SHA1

                          4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

                          SHA256

                          8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

                          SHA512

                          2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\nss3.dll
                          MD5

                          a1c4628d184b6ab25550b1ce74f44792

                          SHA1

                          c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

                          SHA256

                          3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

                          SHA512

                          07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\nssutil3.dll
                          MD5

                          c26e940b474728e728cafe5912ba418a

                          SHA1

                          7256e378a419f8d87de71835e6ad12faadaaaf73

                          SHA256

                          1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

                          SHA512

                          bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\smime3.dll
                          MD5

                          a5c670edf4411bf7f132f4280026137b

                          SHA1

                          c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

                          SHA256

                          aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

                          SHA512

                          acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\softokn3.dll
                          MD5

                          2ab31c9401870adb4e9d88b5a6837abf

                          SHA1

                          4f0fdd699e63f614d79ed6e47ef61938117d3b7a

                          SHA256

                          22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

                          SHA512

                          bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

                        • \Users\Admin\AppData\Local\Temp\Cawaehpy\sqlite3.dll
                          MD5

                          b58848a28a1efb85677e344db1fd67e6

                          SHA1

                          dad48e2b2b3b936efc15ac2c5f9099b7a1749976

                          SHA256

                          00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

                          SHA512

                          762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

                        • memory/456-45-0x0000000000000000-mapping.dmp
                        • memory/604-57-0x0000000000000000-mapping.dmp
                        • memory/680-21-0x0000000000000000-mapping.dmp
                        • memory/896-12-0x0000000000000000-mapping.dmp
                        • memory/912-16-0x00000000047A0000-0x000000000497B000-memory.dmp
                          Filesize

                          1.9MB

                        • memory/912-2-0x00000000000C0000-0x00000000000C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/912-3-0x0000000000090000-0x00000000000B5000-memory.dmp
                          Filesize

                          148KB

                        • memory/912-1-0x0000000000090000-0x00000000000B5000-memory.dmp
                          Filesize

                          148KB

                        • memory/912-4-0x0000000000000000-mapping.dmp
                        • memory/940-53-0x0000000000000000-mapping.dmp
                        • memory/1056-18-0x0000000000000000-mapping.dmp
                        • memory/1076-46-0x0000000000000000-mapping.dmp
                        • memory/1080-47-0x0000000000000000-mapping.dmp
                        • memory/1088-8-0x0000000000000000-mapping.dmp
                        • memory/1160-0-0x0000000000000000-mapping.dmp
                        • memory/1196-49-0x0000000000000000-mapping.dmp
                        • memory/1220-55-0x0000000000000000-mapping.dmp
                        • memory/1236-54-0x0000000000000000-mapping.dmp
                        • memory/1276-14-0x0000000002A00000-0x0000000002A35000-memory.dmp
                          Filesize

                          212KB

                        • memory/1428-10-0x0000000000000000-mapping.dmp
                        • memory/1468-11-0x0000000000000000-mapping.dmp
                        • memory/1472-50-0x0000000000000000-mapping.dmp
                        • memory/1572-6-0x0000000000000000-mapping.dmp
                        • memory/1672-5-0x000007FEF79D0000-0x000007FEF7C4A000-memory.dmp
                          Filesize

                          2.5MB

                        • memory/1736-56-0x0000000000000000-mapping.dmp
                        • memory/1748-52-0x0000000000000000-mapping.dmp
                        • memory/1748-9-0x0000000000000000-mapping.dmp
                        • memory/1916-7-0x0000000000000000-mapping.dmp
                        • memory/1924-48-0x0000000000000000-mapping.dmp
                        • memory/1996-51-0x0000000000000000-mapping.dmp
                        • memory/2040-13-0x0000000000000000-mapping.dmp
                        • memory/2044-17-0x0000000000000000-mapping.dmp