Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    06-07-2023 00:12

General

  • Target

    5932E512FCA596DE1FA5774A45744D81.exe

  • Size

    1.3MB

  • MD5

    5932e512fca596de1fa5774a45744d81

  • SHA1

    c4d113bdc52299a7747a6583fce8b4e0b84d9b44

  • SHA256

    e69ad684b9ce869c919a006405130fb0eb918d38ec2372d0fc69372438d62551

  • SHA512

    caf150d5fe779167c8f1db3de3ffe0c379d3ca1c4bee3ad95cdae12cdf9323fe4bff8c2b80b3607125fc9b3fa4bd35f4faa0d0669d505c7f3f1533dc139f0204

  • SSDEEP

    24576:b255Z6Cl6D/NkA+oRQkXAhaAOiMmY3DJYv2crSxYu:Gn6Clc1kApRNQvOiMP82cGe

Malware Config

Extracted

Family

njrat

Version

Platinum

Botnet

Lox

C2

127.0.0.1:27486

Mutex

Defender.exe

Attributes
  • reg_key

    Defender.exe

  • splitter

    |Ghost|

Extracted

Family

njrat

Version

im523

Botnet

lox

C2

structure-tour.at.ply.gg:27475

Mutex

90e01f40b77fe25a11d52d46dae82c17

Attributes
  • reg_key

    90e01f40b77fe25a11d52d46dae82c17

  • splitter

    |'|'|

Extracted

Family

xworm

C2

programs-scsi.at.ply.gg:27411

Attributes
  • install_file

    USB.exe

aes.plain

Signatures

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 7 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5932E512FCA596DE1FA5774A45744D81.exe
    "C:\Users\Admin\AppData\Local\Temp\5932E512FCA596DE1FA5774A45744D81.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\New Client.exe
      "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Users\Admin\AppData\Roaming\Defender.exe
        "C:\Users\Admin\AppData\Roaming\Defender.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2792
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f
          4⤵
            PID:560
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\Defender.exe
            4⤵
            • Creates scheduled task(s)
            PID:952
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\New Client.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Windows\SysWOW64\choice.exe
            choice /C Y /N /D Y /T 5
            4⤵
              PID:2712
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
          2⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\svh0stt.exe
            "C:\Windows\svh0stt.exe"
            3⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops autorun.inf file
            • Drops file in Windows directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Windows\SysWOW64\netsh.exe
              netsh firewall add allowedprogram "C:\Windows\svh0stt.exe" "svh0stt.exe" ENABLE
              4⤵
              • Modifies Windows Firewall
              PID:2860
        • C:\Users\Admin\AppData\Local\Temp\XClient.exe
          "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
          2⤵
          • Drops startup file
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClient.exe'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2628
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2492
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2216
          • C:\Windows\System32\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /delete /f /tn "XClient"
            3⤵
              PID:2732
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE763.tmp.bat""
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2268
              • C:\Windows\system32\timeout.exe
                timeout 3
                4⤵
                • Delays execution with timeout.exe
                PID:1548
        • C:\Windows\system32\taskeng.exe
          taskeng.exe {2E15C3D4-D6A0-4EC9-B692-491729766936} S-1-5-21-1305762978-1813183296-1799492538-1000:CQOQSKLT\Admin:Interactive:[1]
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Users\Admin\AppData\Roaming\Defender.exe
            C:\Users\Admin\AppData\Roaming\Defender.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1028
          • C:\Users\Admin\AppData\Roaming\Defender.exe
            C:\Users\Admin\AppData\Roaming\Defender.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1936

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Local\Temp\New Client.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Local\Temp\New Client.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Local\Temp\XClient.exe

          Filesize

          43KB

          MD5

          24ebec5d3a911754938ac9bea7921625

          SHA1

          a79b84b232baf16f79780bdcf3171171f637684b

          SHA256

          e08a417139236da437b7cced4acee4f30b4e06e1067c436aa54c99bd637d45e8

          SHA512

          8e263f5ffef3877a605a81738c680d3afb01cde7eca4798661c24c2a53dd690e6fc681fc367c671c1c60125c6a959ba184c18326ea5273cb089780032f83be68

        • C:\Users\Admin\AppData\Local\Temp\XClient.exe

          Filesize

          43KB

          MD5

          24ebec5d3a911754938ac9bea7921625

          SHA1

          a79b84b232baf16f79780bdcf3171171f637684b

          SHA256

          e08a417139236da437b7cced4acee4f30b4e06e1067c436aa54c99bd637d45e8

          SHA512

          8e263f5ffef3877a605a81738c680d3afb01cde7eca4798661c24c2a53dd690e6fc681fc367c671c1c60125c6a959ba184c18326ea5273cb089780032f83be68

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • C:\Users\Admin\AppData\Local\Temp\tmpE763.tmp.bat

          Filesize

          159B

          MD5

          1fbda0bb747d622baaff558254f37967

          SHA1

          1d9a87777c0399e674675d91eedbf0cae6e1fcbb

          SHA256

          e05defd2f4e94fb5fc89f5de5658f0711f886baa3e52d637a8067b21912cceb6

          SHA512

          76e18c4dc087f66f5ee1ef199379314975145404c7f1dc2b101421af97b3e18c2981bf9063cbde602f35e04199bfa33024e9df20839d40950ec6c91b048cd588

        • C:\Users\Admin\AppData\Local\Temp\tmpE763.tmp.bat

          Filesize

          159B

          MD5

          1fbda0bb747d622baaff558254f37967

          SHA1

          1d9a87777c0399e674675d91eedbf0cae6e1fcbb

          SHA256

          e05defd2f4e94fb5fc89f5de5658f0711f886baa3e52d637a8067b21912cceb6

          SHA512

          76e18c4dc087f66f5ee1ef199379314975145404c7f1dc2b101421af97b3e18c2981bf9063cbde602f35e04199bfa33024e9df20839d40950ec6c91b048cd588

        • C:\Users\Admin\AppData\Roaming\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Roaming\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Roaming\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Roaming\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          34c10bb8dbd3b4b9940577bf860d0e09

          SHA1

          07df1fd90914825f4129ba6bceb0b8f8ebb51117

          SHA256

          99f699fb4c5c8813b8ecdf5b2b928ca274c49ac27c637a11420a1fea3ca9a95d

          SHA512

          c8890a7090161e64a70eab3467392aa976cecf61e7206da162cbf16cc0ad13dbce20426d0206a64413ed8f5c6d49a98d7a678e413556543087f882eaf65424da

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          34c10bb8dbd3b4b9940577bf860d0e09

          SHA1

          07df1fd90914825f4129ba6bceb0b8f8ebb51117

          SHA256

          99f699fb4c5c8813b8ecdf5b2b928ca274c49ac27c637a11420a1fea3ca9a95d

          SHA512

          c8890a7090161e64a70eab3467392aa976cecf61e7206da162cbf16cc0ad13dbce20426d0206a64413ed8f5c6d49a98d7a678e413556543087f882eaf65424da

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZCAJ7WFHAEOHAKGIFTN0.temp

          Filesize

          7KB

          MD5

          34c10bb8dbd3b4b9940577bf860d0e09

          SHA1

          07df1fd90914825f4129ba6bceb0b8f8ebb51117

          SHA256

          99f699fb4c5c8813b8ecdf5b2b928ca274c49ac27c637a11420a1fea3ca9a95d

          SHA512

          c8890a7090161e64a70eab3467392aa976cecf61e7206da162cbf16cc0ad13dbce20426d0206a64413ed8f5c6d49a98d7a678e413556543087f882eaf65424da

        • C:\Users\Admin\AppData\Roaming\XClient.exe

          Filesize

          43KB

          MD5

          24ebec5d3a911754938ac9bea7921625

          SHA1

          a79b84b232baf16f79780bdcf3171171f637684b

          SHA256

          e08a417139236da437b7cced4acee4f30b4e06e1067c436aa54c99bd637d45e8

          SHA512

          8e263f5ffef3877a605a81738c680d3afb01cde7eca4798661c24c2a53dd690e6fc681fc367c671c1c60125c6a959ba184c18326ea5273cb089780032f83be68

        • C:\Windows\svh0stt.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • C:\Windows\svh0stt.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • C:\Windows\svh0stt.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • \Users\Admin\AppData\Local\Temp\New Client.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • \Users\Admin\AppData\Local\Temp\XClient.exe

          Filesize

          43KB

          MD5

          24ebec5d3a911754938ac9bea7921625

          SHA1

          a79b84b232baf16f79780bdcf3171171f637684b

          SHA256

          e08a417139236da437b7cced4acee4f30b4e06e1067c436aa54c99bd637d45e8

          SHA512

          8e263f5ffef3877a605a81738c680d3afb01cde7eca4798661c24c2a53dd690e6fc681fc367c671c1c60125c6a959ba184c18326ea5273cb089780032f83be68

        • \Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          37KB

          MD5

          ab01301daa4c65810ffd2eb23b51c74c

          SHA1

          556963ab12f90cdc52f7654e00ef2b331ac418c6

          SHA256

          59b3dc90ef07497ef1107f75e40c3961c19f0326e2283f8caa7059fcef5b1a8c

          SHA512

          fb22b7c830090be9a0150d789ca988e8beab0aac544cf57ce59e7d4ef66a9e548baa37df57ac529dc10c25ac308ac55fbe06abd43978668296d78df0f962ae1b

        • \Users\Admin\AppData\Roaming\Defender.exe

          Filesize

          65KB

          MD5

          7512d672a1aa2990358a8edb98b8756e

          SHA1

          0240bd7397bfd80fe13df3039122c0802a71c5cf

          SHA256

          fffab737446fb972d49ddc851cfcd103323f499b54ee99ceeba2dbfa0cc46877

          SHA512

          2a6ad544c6e8b9bd6c0a87403c1f4c0cc4e1330f36e64c409701818948a8a71c62691b23dc6debd8fc9b5a0950e4479c5001c64152b712d330347d8bfcaf08b4

        • memory/320-79-0x0000000001F20000-0x0000000001F60000-memory.dmp

          Filesize

          256KB

        • memory/1028-155-0x00000000001A0000-0x00000000001E0000-memory.dmp

          Filesize

          256KB

        • memory/1652-95-0x0000000000730000-0x0000000000770000-memory.dmp

          Filesize

          256KB

        • memory/1652-140-0x0000000000730000-0x0000000000770000-memory.dmp

          Filesize

          256KB

        • memory/1884-80-0x0000000000570000-0x00000000005B0000-memory.dmp

          Filesize

          256KB

        • memory/1936-157-0x0000000000310000-0x0000000000350000-memory.dmp

          Filesize

          256KB

        • memory/2396-75-0x0000000000400000-0x00000000007D1000-memory.dmp

          Filesize

          3.8MB

        • memory/2396-70-0x0000000000400000-0x00000000007D1000-memory.dmp

          Filesize

          3.8MB

        • memory/2396-54-0x0000000000400000-0x00000000007D1000-memory.dmp

          Filesize

          3.8MB

        • memory/2492-125-0x000000001B320000-0x000000001B602000-memory.dmp

          Filesize

          2.9MB

        • memory/2492-124-0x00000000026E0000-0x0000000002760000-memory.dmp

          Filesize

          512KB

        • memory/2492-126-0x0000000001E50000-0x0000000001E58000-memory.dmp

          Filesize

          32KB

        • memory/2492-130-0x00000000026E4000-0x00000000026E7000-memory.dmp

          Filesize

          12KB

        • memory/2492-131-0x00000000026EB000-0x0000000002722000-memory.dmp

          Filesize

          220KB

        • memory/2628-112-0x000000000273B000-0x0000000002772000-memory.dmp

          Filesize

          220KB

        • memory/2628-111-0x0000000002734000-0x0000000002737000-memory.dmp

          Filesize

          12KB

        • memory/2628-110-0x0000000002310000-0x0000000002318000-memory.dmp

          Filesize

          32KB

        • memory/2628-109-0x000000001B110000-0x000000001B3F2000-memory.dmp

          Filesize

          2.9MB

        • memory/2696-101-0x0000000002360000-0x0000000002368000-memory.dmp

          Filesize

          32KB

        • memory/2696-103-0x000000000244B000-0x0000000002482000-memory.dmp

          Filesize

          220KB

        • memory/2696-102-0x0000000002444000-0x0000000002447000-memory.dmp

          Filesize

          12KB

        • memory/2696-100-0x000000001B240000-0x000000001B522000-memory.dmp

          Filesize

          2.9MB

        • memory/2792-153-0x0000000000A60000-0x0000000000AA0000-memory.dmp

          Filesize

          256KB

        • memory/2792-141-0x0000000000A60000-0x0000000000AA0000-memory.dmp

          Filesize

          256KB

        • memory/2848-81-0x000000001B1D0000-0x000000001B250000-memory.dmp

          Filesize

          512KB

        • memory/2848-77-0x00000000003E0000-0x00000000003F2000-memory.dmp

          Filesize

          72KB