Analysis

  • max time kernel
    59s
  • max time network
    62s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2024 11:39

General

  • Target

    Growtopia Auto-CCS.exe

  • Size

    20.8MB

  • MD5

    f67d2e36d2fef9bac3eb2e22f697d766

  • SHA1

    e039b22c54bd76ac71e41e901479adb46fd9885c

  • SHA256

    d3f12c274e75824ded175557b6d4bc660d3c057db24ca33b7f8c655229afc921

  • SHA512

    feb884c8f49fcee93365d2a06827086c63da39089c17b62437ef51b1d3b6c7fa7c3ab5b65b2239b559f15cb7d8990e4c148a26f2a28cd889acb1d6b822a0658e

  • SSDEEP

    393216:yO6nODMKMw6nJVA9+0Of08iEQAsHq9/zTre7Up7Ts+Tn1:6uMwj9BOcHY9reoRR1

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 2 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Growtopia Auto-CCS.exe
    "C:\Users\Admin\AppData\Local\Temp\Growtopia Auto-CCS.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\AUTO-CCS BY REALGOBLINS.EXE
      "C:\Users\Admin\AppData\Local\Temp\AUTO-CCS BY REALGOBLINS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4416
    • C:\Users\Admin\AppData\Local\Temp\XXXX.EXE
      "C:\Users\Admin\AppData\Local\Temp\XXXX.EXE"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Users\Admin\AppData\Local\Temp\dcd.exe
        "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
        3⤵
        • Executes dropped EXE
        PID:3204
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xfc,0x128,0x7fff539946f8,0x7fff53994708,0x7fff53994718
      2⤵
        PID:2884
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:2
        2⤵
          PID:2428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4016
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
          2⤵
            PID:2608
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
            2⤵
              PID:1592
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
              2⤵
                PID:4956
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                2⤵
                  PID:5244
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:1
                  2⤵
                    PID:5252
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:8
                    2⤵
                      PID:5484
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5500
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:1
                      2⤵
                        PID:5588
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:1
                        2⤵
                          PID:5596
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10602765871299608399,1195665195130184608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:1
                          2⤵
                            PID:5772
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1352
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2132

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              e1b45169ebca0dceadb0f45697799d62

                              SHA1

                              803604277318898e6f5c6fb92270ca83b5609cd5

                              SHA256

                              4c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60

                              SHA512

                              357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              9ffb5f81e8eccd0963c46cbfea1abc20

                              SHA1

                              a02a610afd3543de215565bc488a4343bb5c1a59

                              SHA256

                              3a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc

                              SHA512

                              2d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              180B

                              MD5

                              00a455d9d155394bfb4b52258c97c5e5

                              SHA1

                              2761d0c955353e1982a588a3df78f2744cfaa9df

                              SHA256

                              45a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed

                              SHA512

                              9553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              c6e16c78fd892521b8d25e9849a11385

                              SHA1

                              009cbe8185401a0e419578d3092e40888a0b7aa5

                              SHA256

                              ad6fdaad15680e473226aabce1ad06606d0e38739c084f51e56324696d1c7276

                              SHA512

                              53351cca2e13125bfa247e583a4ab0be2512293225a624761ad0fa587e7ab1862794c63d01998c0fc1931d8bd98d4709e4dd7a8248e058baaf8d6ee01786932f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              fac0222cd1d13ab7bf52af83c0ef30d4

                              SHA1

                              367d404a6260500643c5622466388b69c95693e0

                              SHA256

                              2b96d8efbaf4d3c2a8723290423eec984c56c564bea45fb6380728583831c40f

                              SHA512

                              3a9c31ba1b18b2a64b731a3b79c2996267097f8b8628beb7a0e5f18590bad8366f54047c3e0f049058d18447fe4a4daef6e37b8d1ab97a8197a0fee428cf1a9a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              d3360ca71f0222a475fefda6f5d18f51

                              SHA1

                              738abce3e37c25933efd131986952b948471260d

                              SHA256

                              128d6323fe9d9b9c6130419fcd793c3e427b5046e7004818ab86fc70a8f9cbec

                              SHA512

                              79c407c0d5f2f31186a24e04be3ea2cf7c20a8c5936e115a0d4d4002364532da0517fabfd8db19630883f9b3993b080b673a4bdf030d1196a9c3cfd428bce106

                            • C:\Users\Admin\AppData\Local\Temp\AUTO-CCS BY REALGOBLINS.EXE

                              Filesize

                              2.9MB

                              MD5

                              a710c4a91035142710394d4438ddaf75

                              SHA1

                              19c0f163c0b3d9f6db33fc8b1803d4923fc34455

                              SHA256

                              e73ce88ab22aa93ed3a9ae42726acb12b0d748806e1eb36e69cc6fe83fde43c4

                              SHA512

                              e1493b298935237c4fc7eccbcde645d0e924d06047a910ff4574b3c05dda057e9a86caaeb9d750568fc9021db87b7f8ceef659c1ab8e090c1821fa912a6a015a

                            • C:\Users\Admin\AppData\Local\Temp\AUTO-CCS BY REALGOBLINS.EXE

                              Filesize

                              9.2MB

                              MD5

                              6a3deb9fc7e350da02f879381b4b133e

                              SHA1

                              a4f1acbb13ee7a2b1d9388eb174ff55191f3d1c3

                              SHA256

                              88b148139fdf636021e5f2fe138b7336b9913f3ae4dd9767760989c5b06c6e87

                              SHA512

                              175a8c766661f26188092642d450839018e55df3c8dcfc606d472d2342351b4ab37294dcb5962ba6e6178812fce23892ba3e245913d984c8c24571da8b652f59

                            • C:\Users\Admin\AppData\Local\Temp\AUTO-CCS BY REALGOBLINS.EXE

                              Filesize

                              4.8MB

                              MD5

                              94bf3cd1b1fa3359dcb76fa198ac1d3a

                              SHA1

                              f5e0784cbd9b1e19c32e5ba63b5927aadd9722cb

                              SHA256

                              c9b6b4b55528ca6d3e4f4c6594295216865987564acddf5ea2e84bbee17523fb

                              SHA512

                              932d1cc926a260aed6886c03c0df12f32b06be4cf71a4d17984a4fdaf4454726ff6803b7370e962b3fd268d623a462d17ef7b930f6b509b3ebd8ff24c1eaec5e

                            • C:\Users\Admin\AppData\Local\Temp\XXXX.EXE

                              Filesize

                              886KB

                              MD5

                              e7a4858381dd731ecbf3a2cb40c72e64

                              SHA1

                              bf97c51e6bd5af726bd4728c82f52c27690aa775

                              SHA256

                              05c2c1262516d9886bd1da76504c561462fab8003168747f5bdd70066d7006b7

                              SHA512

                              c46b1819938b4a2ef4679d83838c41dbd2f88e272426d0c6e3f9ff230f9e84a8ca8486eba5cf7efc4ed72ed1ec62dd76cf7a9e4233c4d6d43a4dafa9d7fa970a

                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe

                              Filesize

                              227KB

                              MD5

                              b5ac46e446cead89892628f30a253a06

                              SHA1

                              f4ad1044a7f77a1b02155c3a355a1bb4177076ca

                              SHA256

                              def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

                              SHA512

                              bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

                            • memory/4416-50-0x00007FFF71C60000-0x00007FFF71C62000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-58-0x00000000020F0000-0x000000000219D000-memory.dmp

                              Filesize

                              692KB

                            • memory/4416-37-0x00007FFF71900000-0x00007FFF71902000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-39-0x00007FFF6F4D0000-0x00007FFF6F4D2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-40-0x00007FFF71BD0000-0x00007FFF71BD2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-38-0x00007FFF6F4C0000-0x00007FFF6F4C2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-42-0x00007FFF71BF0000-0x00007FFF71BF2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-43-0x0000000140000000-0x0000000142ADD000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/4416-41-0x00007FFF71BE0000-0x00007FFF71BE2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-45-0x00007FFF71C10000-0x00007FFF71C12000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-46-0x00007FFF71C20000-0x00007FFF71C22000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-44-0x00007FFF71C00000-0x00007FFF71C02000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-47-0x00007FFF71C30000-0x00007FFF71C32000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-48-0x00007FFF71C40000-0x00007FFF71C42000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-49-0x00007FFF71C50000-0x00007FFF71C52000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-35-0x00007FFF71BC0000-0x00007FFF71BC2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-51-0x00007FFF71C70000-0x00007FFF71C72000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-52-0x00007FFF71C80000-0x00007FFF71C82000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-53-0x00007FFF71C90000-0x00007FFF71C92000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-54-0x00007FFF71CA0000-0x00007FFF71CA2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-55-0x00007FFF71CB0000-0x00007FFF71CB2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-56-0x00007FFF71CC0000-0x00007FFF71CC2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-57-0x00007FFF71CD0000-0x00007FFF71CD2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-36-0x00007FFF718F0000-0x00007FFF718F2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-66-0x00000000021A0000-0x00000000024F9000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4416-74-0x00000000020F0000-0x000000000219D000-memory.dmp

                              Filesize

                              692KB

                            • memory/4416-75-0x00000000021A0000-0x00000000024F9000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4416-76-0x0000000002500000-0x0000000002734000-memory.dmp

                              Filesize

                              2.2MB

                            • memory/4416-82-0x0000000000400000-0x000000000041A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4416-88-0x0000000002040000-0x0000000002096000-memory.dmp

                              Filesize

                              344KB

                            • memory/4416-94-0x0000000002740000-0x00000000027A6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4416-108-0x0000000140000000-0x0000000142ADD000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/4416-31-0x00007FFF71B90000-0x00007FFF71B92000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-32-0x00007FFF71BA0000-0x00007FFF71BA2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4416-34-0x0000000140000000-0x0000000142ADD000-memory.dmp

                              Filesize

                              42.9MB

                            • memory/4416-33-0x00007FFF71BB0000-0x00007FFF71BB2000-memory.dmp

                              Filesize

                              8KB

                            • memory/4644-111-0x00007FFF531A0000-0x00007FFF53C61000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4644-26-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4644-22-0x0000000001050000-0x0000000001051000-memory.dmp

                              Filesize

                              4KB

                            • memory/4644-21-0x0000000002970000-0x00000000029C0000-memory.dmp

                              Filesize

                              320KB

                            • memory/4644-20-0x00007FFF531A0000-0x00007FFF53C61000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4644-18-0x0000000000790000-0x0000000000876000-memory.dmp

                              Filesize

                              920KB

                            • memory/4644-25-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4644-24-0x0000000001060000-0x000000000109E000-memory.dmp

                              Filesize

                              248KB

                            • memory/4644-23-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

                              Filesize

                              64KB