Analysis

  • max time kernel
    25s
  • max time network
    27s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 01:48

General

  • Target

    Library.exe

  • Size

    4.1MB

  • MD5

    04ed10d94e5cd607770eecc9aee56105

  • SHA1

    f43752eb19d1359efcc90e8b1e7078594beed40c

  • SHA256

    7da1fb99de280b8baf392e8d5a62026cf709b202bf78cc74652c3f84c90c929f

  • SHA512

    ff770a81822005bd0ff9b901cea3fc25d73daf06dafeaebf75cf2ba38841004fae6f6b102e6b34f215d1df5a647c1a398423ed32179ef1bb28b7562fa6036a27

  • SSDEEP

    98304:+80h5vs4SZWnzJgKSF3UPDV/KQBR8rOI4i1q3:pGVs44WntglyCQwAz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Library.exe
    "C:\Users\Admin\AppData\Local\Temp\Library.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/blammed
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2ae146f8,0x7ffe2ae14708,0x7ffe2ae14718
        3⤵
          PID:3660
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:2
          3⤵
            PID:3068
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4784
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:8
            3⤵
              PID:432
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              3⤵
                PID:3156
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
                3⤵
                  PID:1200
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:1
                  3⤵
                    PID:5308
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:1
                    3⤵
                      PID:5396
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:1
                      3⤵
                        PID:5648
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                        3⤵
                          PID:5220
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:1
                          3⤵
                            PID:5448
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:8
                            3⤵
                              PID:6024
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:8
                              3⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5920
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3452 /prefetch:8
                              3⤵
                                PID:5508
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2116,5815469265173480920,17153144213127141154,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3504 /prefetch:8
                                3⤵
                                • Modifies registry class
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1860
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://blammed.pro/
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3008
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2ae146f8,0x7ffe2ae14708,0x7ffe2ae14718
                                3⤵
                                  PID:4812
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,11377654259072829286,6810534813806902974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
                                  3⤵
                                    PID:1612
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,11377654259072829286,6810534813806902974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                                    3⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2980
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/blammedsolutions
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4752
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2ae146f8,0x7ffe2ae14708,0x7ffe2ae14718
                                    3⤵
                                      PID:220
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1560,11069813349026707482,3101929663919056194,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:3
                                      3⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5496
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:5300
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:5484

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                      Filesize

                                      330B

                                      MD5

                                      b8881e8c6a7b07c6765d886736cba983

                                      SHA1

                                      612787a691cf94dda8a450d3d799153fff14c6ca

                                      SHA256

                                      33d69645c923f4ae72557e9b00b00d928a0954d99afccbf1733a083915cbe373

                                      SHA512

                                      09eb6ac0e1aa9bbe5977df5402ac2efc9255d24c8e0b8aeb9ae9d1df9536d514bdcf911954fe2638c2362dd3404458ff15c841d51f310a2823371ad3c9cab644

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      559ff144c30d6a7102ec298fb7c261c4

                                      SHA1

                                      badecb08f9a6c849ce5b30c348156b45ac9120b9

                                      SHA256

                                      5444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10

                                      SHA512

                                      3a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      e36b219dcae7d32ec82cec3245512f80

                                      SHA1

                                      6b2bd46e4f6628d66f7ec4b5c399b8c9115a9466

                                      SHA256

                                      16bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b

                                      SHA512

                                      fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      70568076c67dfc0ad56c8851219ac261

                                      SHA1

                                      15fdcf5b75e60e68d142f0d20964094791fa1769

                                      SHA256

                                      4b0a4b0d3c673f47ed8d0165ee68377a8c6fda6096707ace2cb04eaf83b44836

                                      SHA512

                                      9510468f7862f7526d8628f5909c85b8e0e215a8164be01aa87c61b36430877cf53592036949b137ba578780a9baf363e7d3dd6c2342954eda7560d01972bce6

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b5274661fd61abbf1ca55228ba4ae21d

                                      SHA1

                                      1d57f9c746656bf9237bac7138abbd07fe78efe6

                                      SHA256

                                      d7a11174d8e323b71be3d8f604cc0573a57e376c63b244635cf22f18d08bb04b

                                      SHA512

                                      777f4cd8c78553c5d9f038e3578cafe8aeb55248051b4934b1e170673f14e14caf22e225c7f593868067ff7e008f8c4a64918afde2b95bc171980aad20b246bc

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      8KB

                                      MD5

                                      eead50e1e21122d814e1163c9d3e2195

                                      SHA1

                                      40377958d5a0d6484c469f888594c1a28c606f12

                                      SHA256

                                      9cd7be1c1fd7ef610accea77bcdc1edc97c3545b5f5cc8a1d38f76076b1a6a73

                                      SHA512

                                      b570178b16641bff13267f628b02523247f2799f101f6661a7c98ebccf41d0074b245ae1417d9464add3cc437e054d41096090ba08ff7edb64028bfb0cefd632

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      8KB

                                      MD5

                                      1e5e4dd381f5b6fc22ed3a5f7daae753

                                      SHA1

                                      ad1ce95ba810c4853fead926fe8a13131f52c4d6

                                      SHA256

                                      7807183825068e47c17dd82615a35f7d5cb9d10d284d148b6d1dcb09d2391aa9

                                      SHA512

                                      da2eed19e0e2a8286844ad6ec390de45f9aa418eb3070ba147fa6b2e0fbea547f1cacdc3943cf6451e0fb4d2c9f5083815c825f0af76db0c997fa9cdb1712d49

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      ca5548ec3682458e3522ee590468e75e

                                      SHA1

                                      aef98cef3f9dd90a41c32e8833d0d1bc636ebe41

                                      SHA256

                                      b533bf22c2e0d508426953cdc860946083d93be6ed1100bd4191be5e533ebcaa

                                      SHA512

                                      f92752b5a11f9f7f57f90c7ee5b84e3641bbe83eae7263f312c518e5086a0e4509c53bfd7d99ec76c9aace96740f2fb9f1af314b6a311e655e96bde9bbe2336c

                                    • memory/2952-8-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-7-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-15-0x0000000005B40000-0x0000000005BD2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/2952-16-0x0000000005B00000-0x0000000005B0A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/2952-17-0x00000000067E0000-0x0000000006BB6000-memory.dmp

                                      Filesize

                                      3.8MB

                                    • memory/2952-18-0x0000000005C70000-0x0000000005C80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/2952-13-0x0000000000D10000-0x000000000164E000-memory.dmp

                                      Filesize

                                      9.2MB

                                    • memory/2952-23-0x0000000009F90000-0x000000000A02C000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/2952-12-0x0000000000D10000-0x000000000164E000-memory.dmp

                                      Filesize

                                      9.2MB

                                    • memory/2952-9-0x0000000077434000-0x0000000077436000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/2952-0-0x0000000000D10000-0x000000000164E000-memory.dmp

                                      Filesize

                                      9.2MB

                                    • memory/2952-14-0x0000000006230000-0x00000000067D4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/2952-6-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-5-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-4-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-3-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-209-0x0000000000D10000-0x000000000164E000-memory.dmp

                                      Filesize

                                      9.2MB

                                    • memory/2952-211-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-212-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-213-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-2-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-1-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-240-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB

                                    • memory/2952-241-0x0000000076F00000-0x0000000076FF0000-memory.dmp

                                      Filesize

                                      960KB