Analysis

  • max time kernel
    257s
  • max time network
    257s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240704-en
  • resource tags

    arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-07-2024 11:52

General

  • Target

    Loader.exe

  • Size

    857KB

  • MD5

    2b4ca19ce32a373dde70fb0ebdf96fc7

  • SHA1

    0273612af7bd1080541d32496162f1a62bac27e6

  • SHA256

    6f18bcd3189e785d72b313e0d453eae7548af0b55a36eded240f532475f734da

  • SHA512

    89082aaaf1c11159b55ef038c4c7e303708f5b850d82b4302ba6903381c5f70ff80c9c2b54416a1211944fbc7fd9cf4fc6ef121b39a4de62692d277c21ab4b81

  • SSDEEP

    12288:kAyjhkgp8WRcJ/VQ/Rm8g5rbEU8cwqAWfg0um2IvZc94WvGGQsh61HdpTmgSBex2:8hk1sJRxyxAgFRZc94QbQsGTmBKy

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3168
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe917bab58,0x7ffe917bab68,0x7ffe917bab78
      2⤵
        PID:4960
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1548 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:2
        2⤵
          PID:3156
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:8
          2⤵
            PID:4608
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1728 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:8
            2⤵
              PID:4504
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
              2⤵
                PID:1440
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3144 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                2⤵
                  PID:752
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4228 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                  2⤵
                    PID:5552
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:8
                    2⤵
                      PID:5964
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4764 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:8
                      2⤵
                        PID:4516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4812 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:8
                        2⤵
                          PID:5344
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4236 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                          2⤵
                            PID:2440
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2900 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                            2⤵
                              PID:636
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2720 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                              2⤵
                                PID:3296
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4864 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:1
                                2⤵
                                  PID:4724
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3804 --field-trial-handle=1792,i,6002875366422716257,703013187739195052,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4508
                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                1⤵
                                  PID:5304

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                  Filesize

                                  211KB

                                  MD5

                                  151fb811968eaf8efb840908b89dc9d4

                                  SHA1

                                  7ec811009fd9b0e6d92d12d78b002275f2f1bee1

                                  SHA256

                                  043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed

                                  SHA512

                                  83aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                  Filesize

                                  24KB

                                  MD5

                                  c594a826934b9505d591d0f7a7df80b7

                                  SHA1

                                  c04b8637e686f71f3fc46a29a86346ba9b04ae18

                                  SHA256

                                  e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610

                                  SHA512

                                  04a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\1f5632c0e2d2c806_0

                                  Filesize

                                  19KB

                                  MD5

                                  b925d6919ebc354432c701b5344dd9b1

                                  SHA1

                                  bf6c97861eee70d167417b09fc3a681cc1e08407

                                  SHA256

                                  3bf25adcf152724b280cfd58e20bead701b934c823dad485e73dd9dafc6e6cc6

                                  SHA512

                                  e1d65b728f40a1d384a002cd1b26f71a32ae9834db6997d7909cba87823489de25ef954aa654ddd71e3500cabddbca8d769846da205f42c9e09fe1621ad12186

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\d628bace90128654_0

                                  Filesize

                                  280B

                                  MD5

                                  d5850e4170821804a5198a453db5229a

                                  SHA1

                                  20bb0f9fd0e89f5927ba7fca67ecff68fc4a3f58

                                  SHA256

                                  c7386af52cb74b19f8daf5ac3671d34e3cd72f18c4f6ad16d66f3c3229b031e3

                                  SHA512

                                  d277890bd6bd34bdab3ed96545d136d986c3ec505f97728f8ad22f83f451b32fc77af5d341ff470254720c87d5f7efe937be184da3748a4e2da6b66fbdedeb1f

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  a85b4e6ec3338d97fcf04b8d7ab92334

                                  SHA1

                                  9d66517937f26b5753fad8fd2d2b0d50d40e4ef0

                                  SHA256

                                  819a4822e5814ece3f73c436a763dbe232edf4a63293b70c093fe3f70f435bc9

                                  SHA512

                                  c6c21d96b770002318f5a8f6ebc17fbb6bcce2da7357c5233b72ed48cb6097a45dc0e3b15235805f2ae3e913231f66c1248d4b45524e91e39093bb7b3e436765

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  b2a8184d742c175965e1bab95ab006df

                                  SHA1

                                  4aced89c121fb72cbc523a3a211307c0cb8c717d

                                  SHA256

                                  2ee1b096b9c99a68a3c819fef3916a14d152519859fd9351d52faf31e637d3ea

                                  SHA512

                                  3a25bf49f747c78f8eccd527cac6db820751e590971a68f0f9def74c1852eb82732cc058a41b56a6ef60c6ea214399640315f24daacb2baa736e2c12b2a6c7ab

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  e1db7c2202e21ce0834b4f6b4d83951a

                                  SHA1

                                  30d382aa0591eddbee753ce0c3691bf3476ee4b8

                                  SHA256

                                  b2a7c758f98a45cb64bc3f1582dcaabf16b0965b6e9bfa389ff88893044585f5

                                  SHA512

                                  0dd6d9fdbb4589cbc3669c14dfb5bd18fdbfd2ba6327aae8e9bfd9db430747aedd7e6f9f71c9624b7c7af76fe3fa0808fa74bb1ce1288ad3db374e01ee800bfe

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  1KB

                                  MD5

                                  d9dd751335296fe02295f7e99a67db0f

                                  SHA1

                                  4f2768bbd4ebb45e5749e2e95b312def054dfeef

                                  SHA256

                                  ccc94677d68d7589580c8046bc9eb81e9f089d217b630211d6bf197422db5206

                                  SHA512

                                  d81b7d5215d8bad1cd9ea170cd2c38683ed022e8d2e0b2e920cadcb5cb596b3a08cf1d7353350d616465b68eb15bafc63cdcf7965129289d03ec3e62a986f9c7

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  419fa7b870fd3940dfb3b48239e25015

                                  SHA1

                                  6f97086589a4ba9f1d3bcbb80e364bb4b1356ab9

                                  SHA256

                                  61c269717b5fed55edcba7a07de9b0538c1f4f58a358a76950ed5b272da661ce

                                  SHA512

                                  1b5bcee857bdccd0ff7d722026d14a2126a73dae6f319056ff39ba2c2658c54d9f0631de73eaadc8349dc4b84f1a26956ea53bd5f111e8c65dd99a384cabc0d3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  333bd56dbf0865a6e9059643792c65be

                                  SHA1

                                  5928362a5f73c1d1ab8ff29d75d0ed8913cf3ecf

                                  SHA256

                                  fedc119c12cbb63b70cf2735394e9a1c98a23a56b3c3673a7404354f64e37853

                                  SHA512

                                  6eb39c12c57353d7de3f12554122911f630828e9b3db98bca5a3bb9532eda997bdddbb9502db6e37eda35ea84d46f9523b0dc128ac95822111730ffb23f6b418

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  c298b518de6eb9cd4f2b257dcf2e2a11

                                  SHA1

                                  8c30d2b6aa730b90cd6d09c93ddd1d141b55a2ed

                                  SHA256

                                  0106de37c5c7829488897245017e7e2771d32bc1a94d4cc43b9165138ef27b4d

                                  SHA512

                                  06acb75b90c2c407f1cc136b2543818a0fc8d9a0efde4f24fe566cf30fd57c44d28138d79862845f0f27f49a70553b328291879352e9da1022bf5f7c15dd49ee

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  164afc6be648c8eb9e861178aab5ca0d

                                  SHA1

                                  2367613080292f2e4291a843793a81cf305a70d6

                                  SHA256

                                  ee8cda92f9ba88f002659091dece1b1251b8d27cab348da66250958088666688

                                  SHA512

                                  c2f71ff1193be76c74d3ee30f0f3fc86cda069860ee0dbc5ccb4c8ace1b19e0bb22683bf6a52ae6ba14cf0dd1ab7bb96cc32c88a8d291603c79c2edb7ff3e276

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  3c618fbb5836b17f75bbbe2c4a5f5326

                                  SHA1

                                  931f3509ef742f6149b4c4eea14e293159e1f8ae

                                  SHA256

                                  403e021b9a320d317648dd1b349ec8fb92493874e59057f0b2aa3e1e33224dd2

                                  SHA512

                                  07229587feae9a55592cf99e746fc5d6646647c03b027cb91feb179f30a1768d3745260aeb2aa1ebd4b0b11594b518ef5435db133837d8ee5864669576690882

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  16KB

                                  MD5

                                  4617e0d81d8d8919a8562ab0f5a82810

                                  SHA1

                                  fdd1a89b0fad772b3570dbc580e6a93cd1df0922

                                  SHA256

                                  74a143230c727225a5c392c2dc87d9ac7177c2bdac6d7dbb77426137312daa8b

                                  SHA512

                                  e94523022bbb1d0100893facdb5e551d474a7828230825dc6dfc40cec77bd015f188337773ac758293682ceaa83a584f1a2aea291d138d45490ca2a7524083c8

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  285KB

                                  MD5

                                  abb4bfcc850efbebced8b23166dc4502

                                  SHA1

                                  ad20ced47617e198d7576cd396e6ecc0d4108052

                                  SHA256

                                  ceb9371eb716f37fb8c5732d43dba8d31b79244f7366231634397978a9a0af63

                                  SHA512

                                  78158b3ae3b975bf4a87a50c5b05e5d95af8b778ec7b7b75f8d88c4b48cb988c88065dec2571fa3a57d70b0dfe1de378933860d8b5c7f073b0fbd5e0d1ba5e99

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  285KB

                                  MD5

                                  0d75aaf3548bb738e163765949fafdb2

                                  SHA1

                                  70e44e9121919dfc1b55f753b2a6a1329462ffd5

                                  SHA256

                                  3cdbf17965c50d1f55248d650de4c93bcfa6df6e04641b2718255df999d9380a

                                  SHA512

                                  73ca0de24636234957277684f37ecd72defcdd55caa431606243e43edd785d2b7fd351a49d99ec2c5452247b59f4568a615de6d76c1cbe11eda448ec802efa49

                                • memory/3168-10-0x0000000008A70000-0x0000000008AAC000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/3168-16-0x000000000AD40000-0x000000000B26C000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/3168-9-0x0000000008A10000-0x0000000008A22000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3168-8-0x0000000008AC0000-0x0000000008BCA000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/3168-14-0x0000000009AA0000-0x0000000009ABE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/3168-13-0x0000000009B00000-0x0000000009B76000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/3168-12-0x0000000009810000-0x0000000009876000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3168-11-0x0000000008BD0000-0x0000000008C1C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3168-0-0x0000000000400000-0x00000000004A6000-memory.dmp

                                  Filesize

                                  664KB

                                • memory/3168-18-0x0000000074B90000-0x0000000075341000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3168-15-0x000000000AB70000-0x000000000AD32000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/3168-7-0x0000000008F70000-0x0000000009588000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/3168-6-0x0000000005920000-0x000000000592A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3168-5-0x0000000074B90000-0x0000000075341000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3168-4-0x0000000005980000-0x0000000005A12000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/3168-3-0x0000000005F30000-0x00000000064D6000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3168-2-0x0000000074B9E000-0x0000000074B9F000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4008-1-0x00000000014B0000-0x00000000014B1000-memory.dmp

                                  Filesize

                                  4KB