Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 12:16

General

  • Target

    ccd934c7dd80e3c5281f6912e8e5923e.exe

  • Size

    3.4MB

  • MD5

    ccd934c7dd80e3c5281f6912e8e5923e

  • SHA1

    8312f5101416a5a740a1de07882c662624c16b40

  • SHA256

    0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04

  • SHA512

    ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88

  • SSDEEP

    98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9

Malware Config

Signatures

  • Detect ZGRat V1 9 IoCs
  • Modifies WinLogon for persistence 2 TTPs 5 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 10 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccd934c7dd80e3c5281f6912e8e5923e.exe
    "C:\Users\Admin\AppData\Local\Temp\ccd934c7dd80e3c5281f6912e8e5923e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\cMC3vG7uf0oG.vbe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\b7te9U2.bat" "
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe
          "C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet/agentServerComponent.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\yrzdqvq3\yrzdqvq3.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1716
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES81AE.tmp" "c:\Windows\System32\CSCE2DB4BAD1407464583D93E4862381E4.TMP"
              6⤵
                PID:2248
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tGIk6cJu4x.bat"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1660
              • C:\Windows\system32\chcp.com
                chcp 65001
                6⤵
                  PID:2976
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  6⤵
                  • Runs ping.exe
                  PID:1812
                • C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe
                  "C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:1572
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1496
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2600
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 5 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1060
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1288
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1668
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2588
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2700
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2040
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2244
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Windows\Vss\Writers\System\sppsvc.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1648
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Vss\Writers\System\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2284
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\Vss\Writers\System\sppsvc.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2848
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\wininit.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1300
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\wininit.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2364
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\wininit.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2596

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\services.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • C:\Recovery\51eff5a2-489a-11ee-a5ee-62b3d3f2749b\audiodg.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • C:\Users\Admin\AppData\Local\Temp\RES81AE.tmp

              Filesize

              1KB

              MD5

              719a1966967eda2a8f8f39761a87ac45

              SHA1

              50599e0b93224b79da136dd992a1949f2c442943

              SHA256

              7ed1f5553ab099c446e9e907f86f0d532e05c96c2d49b7e6ce1ee9849ffe80fb

              SHA512

              4a153527a7dbb7e577d67925598059166c9283bce7f94aaeb215e6724a01a9f408d4c87655affb8ccfbdd90625e01450fbb9cdb6722e112019bd2964c9bb1e7c

            • C:\Users\Admin\AppData\Local\Temp\tGIk6cJu4x.bat

              Filesize

              188B

              MD5

              264e6d6371b106206dcca1b460d90152

              SHA1

              8c3fb7852ba66132a9e7e2b3b6c3606847818c3c

              SHA256

              8da1e721396ab5f945671b3c4201561c0ae9f40a72f3ad6529b3b65401c28547

              SHA512

              7b3c67003b5d2d5b8357af4d0584d7f3a7936faf5cbe3879cd796a2c3d2d9399c2cc7ecb6f074a52eb511d69541c848b8b99c6b60c95a9d97c7f47d88dcf7328

            • C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\b7te9U2.bat

              Filesize

              93B

              MD5

              b32388f95a1ac97cfca0a1a41c47604d

              SHA1

              568a535fd5a9175f4ed27c6716d65f917ca893df

              SHA256

              49d7bc2b118c854658c90b0fa9c47de42eb9f2426833e86b049bb33733bea5b9

              SHA512

              bcd9531dfd247542633c9cecacf1a46c7be70173a2ed6845386bd567ea7cb0c49aec4d3ed315ee80aaabd3ca96cee0c6e762e42d85b74b59793a4d766b83edc5

            • C:\Users\Admin\AppData\Roaming\BridgeportWebDllNet\cMC3vG7uf0oG.vbe

              Filesize

              211B

              MD5

              4d658105afcc52322262e2c793a8083a

              SHA1

              c81a04e2cf3ce5cdeab1c54673d9f9bdf646c43d

              SHA256

              e6ff322411e42d01aeb523e70b1fa1023d5427e1c6eed2d19a8b2eaa1b26acda

              SHA512

              a47b97494f1ca7528026adc4aabfbdc73e944e6342beb380022f0f3f72ce8b603517863cf31340068a9ee10229feca3a7e77f34644609c514b5568e49e29c7be

            • \??\c:\Users\Admin\AppData\Local\Temp\yrzdqvq3\yrzdqvq3.0.cs

              Filesize

              392B

              MD5

              2b26b067683fc6d1881a739d2767b06c

              SHA1

              a12379cf85bf4f6d43974f08528c0eb10fff6504

              SHA256

              8d9d4200c1a2a2c96feb3356d35f2f0d39e87de447c39f16b6e2775a37f07a0d

              SHA512

              25c57d10b5e4110ab4bc25d1fda71ef538bc0ea11e75a392fade32abbbe290387bb87526411ffa743ba74bd7c2740ce31867cc18f4e41f8e15a154736b1f3da7

            • \??\c:\Users\Admin\AppData\Local\Temp\yrzdqvq3\yrzdqvq3.cmdline

              Filesize

              235B

              MD5

              129f878f1b2462b5caad5fa58e74b522

              SHA1

              dd6aa0465031ea0af82a6ce93b6d541050651805

              SHA256

              08a1d2630b72b7f0e131e49165c0599c7dcb19b897f8cab541fe5ad5532f6279

              SHA512

              74e4fa32be9d439b9602ff7f19892c126c2f4ba71b1d30ed51439e9630386c38fd28b7ac12e32dbd2fdf61a42d50ac6d7408e63f14ab3670cbec94730262511a

            • \??\c:\Windows\System32\CSCE2DB4BAD1407464583D93E4862381E4.TMP

              Filesize

              1KB

              MD5

              cad45b75304b5d1eab8700ac329e0039

              SHA1

              f491c8b2f37bc70283b3347ed7e3858e65a2417d

              SHA256

              ea45cb9b790405e859c9840ab3fdd75f37253050c8c5d5aa9e3cefdd4ccf5569

              SHA512

              faf2649747d29c38661c2ce8beb52cfb9094e8884454320561baa6ae48fc37cfbc8ca2ee3b1565b650561968e5f6e037dbf3d60b7eee71cf1701d94b73d1b505

            • \Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • \Users\Admin\AppData\Roaming\BridgeportWebDllNet\agentServerComponent.exe

              Filesize

              3.5MB

              MD5

              4b6bf7e06b6f4b01999a6febcddc09b7

              SHA1

              639ee42edde44f4ebe892aa0ac4fbddc49e144b8

              SHA256

              10dbba3481930c060fbcadfa77ff358e058578cf8cd12688e712bec4bfd99bc8

              SHA512

              36228e618307dd8d84939414f26dff00b8e003287af43ff7690cdb5b01e30e54958d33afb2938917d3013ef334367d30ce935d5bb48fa5b01e1321e09309bca8

            • memory/1572-115-0x000007FEF54D0000-0x000007FEF5EBC000-memory.dmp

              Filesize

              9.9MB

            • memory/1572-114-0x00000000010F0000-0x0000000001484000-memory.dmp

              Filesize

              3.6MB

            • memory/1572-116-0x0000000001030000-0x00000000010B0000-memory.dmp

              Filesize

              512KB

            • memory/2812-47-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-59-0x0000000077010000-0x0000000077011000-memory.dmp

              Filesize

              4KB

            • memory/2812-28-0x00000000770B0000-0x00000000770B1000-memory.dmp

              Filesize

              4KB

            • memory/2812-27-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

              Filesize

              9.9MB

            • memory/2812-31-0x0000000000300000-0x0000000000310000-memory.dmp

              Filesize

              64KB

            • memory/2812-29-0x00000000770A0000-0x00000000770A1000-memory.dmp

              Filesize

              4KB

            • memory/2812-32-0x0000000077090000-0x0000000077091000-memory.dmp

              Filesize

              4KB

            • memory/2812-34-0x0000000000490000-0x00000000004A8000-memory.dmp

              Filesize

              96KB

            • memory/2812-35-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-38-0x0000000000310000-0x0000000000320000-memory.dmp

              Filesize

              64KB

            • memory/2812-36-0x0000000077080000-0x0000000077081000-memory.dmp

              Filesize

              4KB

            • memory/2812-39-0x0000000077070000-0x0000000077071000-memory.dmp

              Filesize

              4KB

            • memory/2812-41-0x0000000000320000-0x0000000000330000-memory.dmp

              Filesize

              64KB

            • memory/2812-42-0x0000000077060000-0x0000000077061000-memory.dmp

              Filesize

              4KB

            • memory/2812-44-0x00000000004B0000-0x00000000004BE000-memory.dmp

              Filesize

              56KB

            • memory/2812-24-0x00000000002F0000-0x00000000002FE000-memory.dmp

              Filesize

              56KB

            • memory/2812-48-0x0000000077050000-0x0000000077051000-memory.dmp

              Filesize

              4KB

            • memory/2812-46-0x0000000000A70000-0x0000000000A7E000-memory.dmp

              Filesize

              56KB

            • memory/2812-49-0x0000000077040000-0x0000000077041000-memory.dmp

              Filesize

              4KB

            • memory/2812-51-0x0000000000B30000-0x0000000000B42000-memory.dmp

              Filesize

              72KB

            • memory/2812-53-0x0000000077030000-0x0000000077031000-memory.dmp

              Filesize

              4KB

            • memory/2812-52-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-55-0x0000000000A80000-0x0000000000A90000-memory.dmp

              Filesize

              64KB

            • memory/2812-56-0x0000000077020000-0x0000000077021000-memory.dmp

              Filesize

              4KB

            • memory/2812-58-0x0000000000B50000-0x0000000000B66000-memory.dmp

              Filesize

              88KB

            • memory/2812-26-0x0000000000470000-0x000000000048C000-memory.dmp

              Filesize

              112KB

            • memory/2812-61-0x0000000000B70000-0x0000000000B82000-memory.dmp

              Filesize

              72KB

            • memory/2812-62-0x0000000077000000-0x0000000077001000-memory.dmp

              Filesize

              4KB

            • memory/2812-64-0x0000000000A90000-0x0000000000A9E000-memory.dmp

              Filesize

              56KB

            • memory/2812-65-0x0000000076FF0000-0x0000000076FF1000-memory.dmp

              Filesize

              4KB

            • memory/2812-67-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

              Filesize

              64KB

            • memory/2812-68-0x0000000076FE0000-0x0000000076FE1000-memory.dmp

              Filesize

              4KB

            • memory/2812-70-0x0000000000B90000-0x0000000000BA0000-memory.dmp

              Filesize

              64KB

            • memory/2812-71-0x0000000076FD0000-0x0000000076FD1000-memory.dmp

              Filesize

              4KB

            • memory/2812-73-0x0000000000EE0000-0x0000000000F3A000-memory.dmp

              Filesize

              360KB

            • memory/2812-75-0x0000000000BA0000-0x0000000000BAE000-memory.dmp

              Filesize

              56KB

            • memory/2812-77-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

              Filesize

              64KB

            • memory/2812-79-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

              Filesize

              56KB

            • memory/2812-22-0x00000000770C0000-0x00000000770C1000-memory.dmp

              Filesize

              4KB

            • memory/2812-21-0x0000000000440000-0x0000000000466000-memory.dmp

              Filesize

              152KB

            • memory/2812-19-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-18-0x00000000770D0000-0x00000000770D1000-memory.dmp

              Filesize

              4KB

            • memory/2812-81-0x0000000000BF0000-0x0000000000C08000-memory.dmp

              Filesize

              96KB

            • memory/2812-83-0x000000001B2C0000-0x000000001B30E000-memory.dmp

              Filesize

              312KB

            • memory/2812-111-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

              Filesize

              9.9MB

            • memory/2812-17-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-16-0x0000000000140000-0x0000000000141000-memory.dmp

              Filesize

              4KB

            • memory/2812-15-0x000000001B3E0000-0x000000001B460000-memory.dmp

              Filesize

              512KB

            • memory/2812-14-0x000007FEF58D0000-0x000007FEF62BC000-memory.dmp

              Filesize

              9.9MB

            • memory/2812-13-0x0000000001090000-0x0000000001424000-memory.dmp

              Filesize

              3.6MB