Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2023, 14:31

General

  • Target

    e956dcf8b25ccc0d1c61e40075cbe18cef9e22f1b58f79998bbf2638642a7815.exe

  • Size

    1.3MB

  • MD5

    67753ac9fe4f92b79506a40197db937e

  • SHA1

    21221e792df2118cd16fa491c871058cef3105bd

  • SHA256

    e956dcf8b25ccc0d1c61e40075cbe18cef9e22f1b58f79998bbf2638642a7815

  • SHA512

    104bb766e506a3e3fd6efe6dc239d334a0fcd65cecbc2818ddddd7dcc4aeda6fef5318eb17ffc580aa44c5f591793d79ef699504c066857418b92f4e9aa5f41a

  • SSDEEP

    24576:/iry1KswscUUk//tmUsDnpEYxky/+oBc63Fc:7pz//EDnpU6d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 14 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e956dcf8b25ccc0d1c61e40075cbe18cef9e22f1b58f79998bbf2638642a7815.exe
    "C:\Users\Admin\AppData\Local\Temp\e956dcf8b25ccc0d1c61e40075cbe18cef9e22f1b58f79998bbf2638642a7815.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1936
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2564
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:2444
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1528
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1468
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 260 -NGENProcess 250 -Pipe 24c -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2276
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 254 -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:1676
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 248 -NGENProcess 260 -Pipe 1f4 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2812
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 1dc -NGENProcess 1d8 -Pipe 248 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 270 -NGENProcess 260 -Pipe 264 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2268
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2816
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1864
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1732
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:1996
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:2272
  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
    "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
    1⤵
    • Executes dropped EXE
    • Modifies data under HKEY_USERS
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    1.4MB

    MD5

    ab74d40873e1601ab472ef6332b643a0

    SHA1

    89eadaade6dab0bcb46a825f51d1463b451c4a60

    SHA256

    dd3d84774c8a3c543f6774cd2b57947498a3fb818bc2ae3be3ca7a5d52ee5b38

    SHA512

    93902aa5b14d9537e512fc913d6923107fe9b9ced801be08540725af55496f42ff91353eece1395b0a8a3fa30d1a2e8d22694b277709ff4cc73b2f3e750de984

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    30.1MB

    MD5

    6efaccbf306d7b8d3fd5c68dd187bc6e

    SHA1

    4b42b647e9f76a25bd78d0658f0832c39e47c429

    SHA256

    da21ba4c2f979fea4dda04b0ef60e3c415c5e27fe920715555e9ca225c9ead63

    SHA512

    bef092bdd5de6cc4818ec869bfbf61333f16191f0d6a00114914308855ae53ca5fe156e1dcee3942b62eee016045f41f33ef48ec04c1fa560e544471c4ffc8c1

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.5MB

    MD5

    fd362a473e67ce9cf58fdc0a621aaf7e

    SHA1

    2988208f1ff19b24eb76c8f10a1607e3fce04bb0

    SHA256

    0fdaa95f6fe97094fe2dda720be8e2c8632c9c866719ab5c7f9bdb6a81ffe494

    SHA512

    588b712219b2df9ad9b248e1dbc5f8e398ec738a59d1cb049887c913a77b549fdc36ad17ec46824064bb5ac538efd5b9f16814954650517d84dffca75e7239af

  • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE

    Filesize

    5.2MB

    MD5

    59865e9a2fe685f117a2b443ae3ccc3f

    SHA1

    5c81cd0f2af50f1ada3cacc52991d300123582e9

    SHA256

    ac57fa63092ad77d02bfc918e0249ac7c9ac4b0f54fd42ebcb4946001ee50500

    SHA512

    3160d12feeb4cada206af8a1563b161c151cc5ff4e6bf86bf067c50948ead5f031fc77dca46d9cf25506c6ece38810d7a900116e1cd2b32b82e100b6b0a3a968

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    2.1MB

    MD5

    443bf4aff7aa75d111f1e1b5b4c27668

    SHA1

    8a7fa237bcf82ea91b552759c06ec794a5755f17

    SHA256

    08ae0198b52114483e4279f27e1ef4ffa673da49032f36a46439a07f13a01e67

    SHA512

    7d42d5d66641946808e98db6f25a07169a802fc71fab011435b94a13a89a43952d281f6e417b93c0f857969981331e4a41deea9bceed6ff18d56fa959d56812b

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    bf4473dea998882da2ddb14ccbab0a8a

    SHA1

    e2124f4662aee2796370f0f749b9646ee296ed26

    SHA256

    d89d90dc1bb9b5d69c1ecd57cc913986e3a7f15e625b07ed23898686e955ae64

    SHA512

    4699af0288a1d2b4b9d7dc91fca9e1233f1c5daf73439dd29db0fd7d0c363fdd64ebed7e14b4573888b0bfe253ba2c7d24a10936ee11f9a66e286ba44e9c4236

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    ab63c6315b8f0920e83f99db8f6eec4d

    SHA1

    aaf4d4817c9e3a5faca36848fcf141650d598910

    SHA256

    909146f5b9406b797853214db8aaf117c41dcb7317261669aa65b4c14dc35ac3

    SHA512

    699e984d1b6c8354187ec04f31ed42c95b2fc13ce660913a89fd44aebf6f1a7635540540b9f45f67308441dc8d68de58d3803d62039d971dfb284fb553c1f3de

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    ab63c6315b8f0920e83f99db8f6eec4d

    SHA1

    aaf4d4817c9e3a5faca36848fcf141650d598910

    SHA256

    909146f5b9406b797853214db8aaf117c41dcb7317261669aa65b4c14dc35ac3

    SHA512

    699e984d1b6c8354187ec04f31ed42c95b2fc13ce660913a89fd44aebf6f1a7635540540b9f45f67308441dc8d68de58d3803d62039d971dfb284fb553c1f3de

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.4MB

    MD5

    9f88bfc3dd1753d00e02003a9a5c9788

    SHA1

    65a9308adb8558d724de978032af3d1d2d914f2e

    SHA256

    e3a2f15d1babb05e929aa67459f1dd09e8a869e600306358e26f90c7ede7c979

    SHA512

    1fa5e25010adea46a4130a8d24dc13c9b30168e3fad52f0cf5a98213d73c82aa35d96d06d6cedaf951d35a1df989ee4112d777f297ba5f78ebb228a762ce9966

  • C:\Windows\System32\alg.exe

    Filesize

    1.4MB

    MD5

    5a41735bf2ab30615eb3f961ecd5916f

    SHA1

    a01efd6293fff996675efd61dd02a0ec7c96a0a4

    SHA256

    03bcdc135a4d1f22940727ccc0dd87d38514fb785c5478473bd38d8accfcbf82

    SHA512

    1bddb8f912c190c53009005ccb79e20ee99c321d277895e87465a06520309458829a66e97555f7da7076c6c5272517068e459975d1948c3cb1736fa6deb4458b

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.3MB

    MD5

    bf4473dea998882da2ddb14ccbab0a8a

    SHA1

    e2124f4662aee2796370f0f749b9646ee296ed26

    SHA256

    d89d90dc1bb9b5d69c1ecd57cc913986e3a7f15e625b07ed23898686e955ae64

    SHA512

    4699af0288a1d2b4b9d7dc91fca9e1233f1c5daf73439dd29db0fd7d0c363fdd64ebed7e14b4573888b0bfe253ba2c7d24a10936ee11f9a66e286ba44e9c4236

  • \Windows\System32\alg.exe

    Filesize

    1.4MB

    MD5

    5a41735bf2ab30615eb3f961ecd5916f

    SHA1

    a01efd6293fff996675efd61dd02a0ec7c96a0a4

    SHA256

    03bcdc135a4d1f22940727ccc0dd87d38514fb785c5478473bd38d8accfcbf82

    SHA512

    1bddb8f912c190c53009005ccb79e20ee99c321d277895e87465a06520309458829a66e97555f7da7076c6c5272517068e459975d1948c3cb1736fa6deb4458b

  • memory/1408-44-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/1408-45-0x0000000000800000-0x0000000000867000-memory.dmp

    Filesize

    412KB

  • memory/1408-51-0x0000000000800000-0x0000000000867000-memory.dmp

    Filesize

    412KB

  • memory/1468-264-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/1468-274-0x0000000072DA0000-0x000000007348E000-memory.dmp

    Filesize

    6.9MB

  • memory/1468-265-0x00000000002C0000-0x0000000000327000-memory.dmp

    Filesize

    412KB

  • memory/1528-251-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/1528-271-0x0000000072DA0000-0x000000007348E000-memory.dmp

    Filesize

    6.9MB

  • memory/1528-252-0x0000000000620000-0x0000000000687000-memory.dmp

    Filesize

    412KB

  • memory/1676-325-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/1676-326-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/1676-327-0x0000000072DA0000-0x000000007348E000-memory.dmp

    Filesize

    6.9MB

  • memory/1732-85-0x0000000000AC0000-0x0000000000B27000-memory.dmp

    Filesize

    412KB

  • memory/1732-90-0x0000000000AC0000-0x0000000000B27000-memory.dmp

    Filesize

    412KB

  • memory/1864-75-0x00000000003E0000-0x0000000000440000-memory.dmp

    Filesize

    384KB

  • memory/1864-81-0x00000000003E0000-0x0000000000440000-memory.dmp

    Filesize

    384KB

  • memory/1936-8-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/1936-1-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/1936-0-0x0000000140000000-0x000000014014B000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-6-0x0000000140000000-0x000000014014B000-memory.dmp

    Filesize

    1.3MB

  • memory/1936-39-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/1936-9-0x0000000001C10000-0x0000000001C70000-memory.dmp

    Filesize

    384KB

  • memory/1936-41-0x0000000140000000-0x000000014014B000-memory.dmp

    Filesize

    1.3MB

  • memory/1996-100-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1996-107-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/1996-106-0x0000000140000000-0x000000014023F000-memory.dmp

    Filesize

    2.2MB

  • memory/1996-94-0x00000000008E0000-0x0000000000940000-memory.dmp

    Filesize

    384KB

  • memory/2276-318-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2276-323-0x0000000072DA0000-0x000000007348E000-memory.dmp

    Filesize

    6.9MB

  • memory/2276-320-0x0000000000B50000-0x0000000000BB7000-memory.dmp

    Filesize

    412KB

  • memory/2444-37-0x0000000000950000-0x00000000009B0000-memory.dmp

    Filesize

    384KB

  • memory/2444-30-0x0000000000950000-0x00000000009B0000-memory.dmp

    Filesize

    384KB

  • memory/2444-29-0x0000000140000000-0x0000000140212000-memory.dmp

    Filesize

    2.1MB

  • memory/2564-22-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/2564-18-0x0000000100000000-0x0000000100219000-memory.dmp

    Filesize

    2.1MB

  • memory/2564-23-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/2564-15-0x0000000000860000-0x00000000008C0000-memory.dmp

    Filesize

    384KB

  • memory/2816-58-0x0000000000620000-0x0000000000680000-memory.dmp

    Filesize

    384KB

  • memory/2816-67-0x0000000000620000-0x0000000000680000-memory.dmp

    Filesize

    384KB

  • memory/2816-59-0x0000000140000000-0x0000000140223000-memory.dmp

    Filesize

    2.1MB

  • memory/2884-355-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/2884-364-0x0000000000230000-0x0000000000297000-memory.dmp

    Filesize

    412KB

  • memory/2884-365-0x0000000072DA0000-0x000000007348E000-memory.dmp

    Filesize

    6.9MB