Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2024 15:27

General

  • Target

    DDOS TOOL/DDOS TOOL.exe

  • Size

    5.3MB

  • MD5

    4356e6504e19b8a4014dbfacbc89493f

  • SHA1

    a4078eabcc6760e184259d694b7251b89569453a

  • SHA256

    e3a9ffb17c734d02950cdfcd38592549181d9f95220b8aaae69d6091480a8d42

  • SHA512

    83949b7422c6e2efcf6888e5c324ee8d536716f571156bdb4672e989aa68a1be5b7e6f0b5024e7c47af3f16ef0667045fda050f5dbc1272a491febdd249b7fe3

  • SSDEEP

    98304:9fIGp26lE8kKlr8iRqJxf+n/FHkLUfzv3QtRiBNyZWa8QEHE:9lEWrct+ntHkQfzPlpaz

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

147.185.221.20:49236

Mutex

6a8a3b6e5450a823d542e748a454aa4c

Attributes
  • reg_key

    6a8a3b6e5450a823d542e748a454aa4c

  • splitter

    |'|'|

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1260642913709199370/cN_Wnccw0kdFSTwqONW2fMDnifHoEhjQp9n_8tPGu3gI5coO14fm3gGZ1Q04Hstg1nAO

Extracted

Family

xworm

Version

5.0

C2

testarosa.duckdns.org:7110

Mutex

5ZpeoOe6AtQfr6wU

Attributes
  • Install_directory

    %AppData%

  • install_file

    Ondrive.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 4 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DDOS TOOL\DDOS TOOL.exe
    "C:\Users\Admin\AppData\Local\Temp\DDOS TOOL\DDOS TOOL.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Users\Admin\AppData\Roaming\Server.exe
        "C:\Users\Admin\AppData\Roaming\Server.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2352
        • C:\Users\Admin\AppData\Local\Temp\server.exe
          "C:\Users\Admin\AppData\Local\Temp\server.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2092
          • C:\Windows\SysWOW64\netsh.exe
            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
            5⤵
            • Modifies Windows Firewall
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2892
      • C:\Users\Admin\AppData\Roaming\conhost.exe
        "C:\Users\Admin\AppData\Roaming\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2036
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'conhost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2052
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2936
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Ondrive.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2200
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Ondrive" /tr "C:\Users\Admin\AppData\Roaming\Ondrive.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2480
    • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe
      "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2324
      • C:\Windows\system32\attrib.exe
        "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe"
        3⤵
        • Views/modifies file attributes
        PID:3020
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\HYDRA.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2924
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1716
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
          PID:2656
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
            PID:2344
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
            3⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            PID:2668
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic" path win32_VideoController get name
            3⤵
            • Detects videocard installed
            PID:2948
          • C:\Windows\system32\cmd.exe
            "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\HYDRA.exe" && pause
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            PID:2748
            • C:\Windows\system32\PING.EXE
              ping localhost
              4⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3056
        • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
          "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe
            "C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c title DDoS Tool by HʎDRΔ
              4⤵
                PID:1332
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                4⤵
                  PID:1788
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  4⤵
                    PID:864
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {01718509-4F87-4336-AE0C-45E55A434E1B} S-1-5-21-3450744190-3404161390-554719085-1000:PDIZKVQX\Admin:Interactive:[1]
              1⤵
                PID:2392
                • C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1836
                • C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1336
                • C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  C:\Users\Admin\AppData\Roaming\Ondrive.exe
                  2⤵
                  • Executes dropped EXE
                  PID:2384

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\DDoS_Tool.exe

                Filesize

                5.2MB

                MD5

                0b119327f1046d6917d7018312ac8e32

                SHA1

                3562ca03b61381ba727d8dac8da7bd24647eb9fc

                SHA256

                8adadd0edb3da0a3bebce706c8f8acd4a07c77abdf7e66c712fb61189a5c81ed

                SHA512

                dc087ba8e9603533bc780906b34f350728bda86c980e47fa9eaa1bf77baf4c4df75af514135665f99f99e4d475ed512a415ed756b30bae39e29813ca49ae3391

              • C:\Users\Admin\AppData\Local\Temp\HYDRA.exe

                Filesize

                227KB

                MD5

                224f803df5b876b23c002f19f74aafac

                SHA1

                6b265b9921fed98a4d3b9a8e72f26914ed154de8

                SHA256

                f8d8aa95aa4205ac48cf654af602563bef92848b92129b07c5f402816d3d04dc

                SHA512

                2df0cd2db55fce534ac6b65afacc121c21b5c105d24d2c6c036b5225e86e97833b2281f205b1435e2c1800ddeeb0f597d0a0fdf83887421259043402487c43b2

              • C:\Users\Admin\AppData\Local\Temp\Server.exe

                Filesize

                71KB

                MD5

                f9b08bd21b40a938122b479095b7c70c

                SHA1

                eb925e3927b83c20d8d24bdab2e587c10d6ac8cd

                SHA256

                c96cde2e96021c266a202286d644ceb28543d6347e21006d72b29b8a72c505e8

                SHA512

                fcc5784936b7f85a550883c472b99b5edfa7e5c6fd3872fd806b81c2ce1f195ca34342b230a89456066885579fe55aea46d91074ac08af192fbd04ea158473ee

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\VCRUNTIME140.dll

                Filesize

                87KB

                MD5

                0e675d4a7a5b7ccd69013386793f68eb

                SHA1

                6e5821ddd8fea6681bda4448816f39984a33596b

                SHA256

                bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

                SHA512

                cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\_ctypes.pyd

                Filesize

                129KB

                MD5

                2f21f50d2252e3083555a724ca57b71e

                SHA1

                49ec351d569a466284b8cc55ee9aeaf3fbf20099

                SHA256

                09887f07f4316057d3c87e3a907c2235dc6547e54ed4f5f9125f99e547d58bce

                SHA512

                e71ff1e63105f51a4516498cd09f8156d7208758c5dc9a74e7654844e5cefc6e84f8fe98a1f1bd7a459a98965fbe913cb5edb552fffa1e33dfda709f918dddeb

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\_socket.pyd

                Filesize

                74KB

                MD5

                d7e7a7592338ce88e131f858a84deec6

                SHA1

                3add8cd9fbbf7f5fa40d8a972d9ac18282dcf357

                SHA256

                4ba5d0e236711bdcb29ce9c3138406f7321bd00587b6b362b4ace94379cf52d5

                SHA512

                96649296e8ccdc06d6787902185e21020a700436fc7007b2aa6464d0af7f9eb66a4485b3d46461106ac5f1d35403183daa1925e842e7df6f2db9e3e833b18fb4

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\base_library.zip

                Filesize

                766KB

                MD5

                c7f6b1e71737274de654099f1a483896

                SHA1

                6cf5965a8efb64443dc654c6b9953eacb314daca

                SHA256

                d982c24bbc242b3cc0094ee3685fba79297f3893d354293d4c33ccfd431dfb1d

                SHA512

                3b196ecb376f02b900b581d98d347d22d89d34b502a46770493663e48f9d7eee4b42acb16181b441026ae1634638faa14e4ebd814e05ccaf2b965aa2a5b5179c

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\libcrypto-1_1-x64.dll

                Filesize

                2.4MB

                MD5

                022a61849adab67e3a59bcf4d0f1c40b

                SHA1

                fca2e1e8c30767c88f7ab5b42fe2bd9abb644672

                SHA256

                2a57183839c3e9cc4618fb1994c40e47672a8b6daffaa76c5f89cf2542b02c2f

                SHA512

                94ac596181f0887af7bf02a7ce31327ad443bb7fe2d668217953e0f0c782d19296a80de965008118708afd9bda14fd8c78f49785ebf7abcc37d166b692e88246

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\python37.dll

                Filesize

                3.7MB

                MD5

                62125a78b9be5ac58c3b55413f085028

                SHA1

                46c643f70dd3b3e82ab4a5d1bc979946039e35b2

                SHA256

                17c29e6188b022f795092d72a1fb58630a7c723d70ac5bc3990b20cd2eb2a51f

                SHA512

                e63f4aa8fc5cd1569ae401e283bc8e1445859131eb0db76581b941f1085670c549cbc3fedf911a21c1237b0f3f66f62b10c60e88b923fa058f7fafee18dd0fa4

              • C:\Users\Admin\AppData\Local\Temp\_MEI27802\select.pyd

                Filesize

                26KB

                MD5

                c30e5eccf9c62b0b0bc57ed591e16cc0

                SHA1

                24aece32d4f215516ee092ab72471d1e15c3ba24

                SHA256

                56d1a971762a1a56a73bdf64727e416ffa9395b8af4efcd218f5203d744e1268

                SHA512

                3e5c58428d4c166a3d6d3e153b46c4a57cca2e402001932ec90052c4689b7f5ba4c5f122d1a66d282b2a0a0c9916dc5a5b5e5f6dfc952cdb62332ac29cb7b36a

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                55665a32a1e753be1585bdc4591bb669

                SHA1

                37e1fa5d18202f462dfa31a73c99b821f75a95c7

                SHA256

                412aa7876c7a641c10d69db6a70bdebe2f069c51f1d7e226c419bfc70c1e0c97

                SHA512

                a2bf41be36e4344d6e00c76ed5d63c4820563fcc31553ecdd999d770e10570e9175c7ce597f4b38a747b45d7018706c86b733b307052cf48d1a08d6aad95d724

              • C:\Users\Admin\AppData\Roaming\Server.exe

                Filesize

                23KB

                MD5

                32fe01ccb93b0233503d0aaaa451f7b2

                SHA1

                58e5a63142150e8fb175dbb4dedea2ce405d7db0

                SHA256

                6988ee719a54c93a89303dcff277c62ae4890274cc45f074bc7effde315fbf43

                SHA512

                76945f23a49d594e325d80ffc0570341044ac0b97bd889c92f90bc56d3cdff5c1b29178be4f157c8c1bb9ce7cc311765309f2e6f7b08b24e7acf983ea67635a6

              • C:\Users\Admin\AppData\Roaming\conhost.exe

                Filesize

                37KB

                MD5

                b37dd1a1f0507baf993471ae1b7a314c

                SHA1

                9aff9d71492ffff8d51f8e8d67f5770755899882

                SHA256

                e58e8918a443c0061add029f8f211f6551a130202195cc2b9b529ea72553e0bc

                SHA512

                ac76d5b10540eb292341f30c7abfd81f03be65f6655c814aba6ac6a0ecf4f0f2c34c3b8e63ceef8c4579f98b7459e51b9fdd30d601c6d1930860ab7c154da460

              • \Users\Admin\AppData\Local\Temp\_MEI27802\_hashlib.pyd

                Filesize

                38KB

                MD5

                c3b19ad5381b9832e313a448de7c5210

                SHA1

                51777d53e1ea5592efede1ed349418345b55f367

                SHA256

                bdf4a536f783958357d2e0055debdc3cf7790ee28beb286452eec0354a346bdc

                SHA512

                7f8d3b79a58612e850d18e8952d14793e974483c688b5daee217baaa83120fd50d1e036ca4a1b59d748b22951744377257d2a8f094a4b4de1f79fecd4bf06afb

              • memory/696-8-0x0000000000F20000-0x0000000000F38000-memory.dmp

                Filesize

                96KB

              • memory/696-26-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

                Filesize

                9.9MB

              • memory/696-139-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

                Filesize

                9.9MB

              • memory/1336-145-0x0000000001030000-0x0000000001040000-memory.dmp

                Filesize

                64KB

              • memory/1820-0-0x000007FEF58E3000-0x000007FEF58E4000-memory.dmp

                Filesize

                4KB

              • memory/1820-4-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

                Filesize

                9.9MB

              • memory/1820-33-0x000007FEF58E0000-0x000007FEF62CC000-memory.dmp

                Filesize

                9.9MB

              • memory/1820-1-0x0000000000910000-0x0000000000E6C000-memory.dmp

                Filesize

                5.4MB

              • memory/1836-143-0x0000000000C80000-0x0000000000C90000-memory.dmp

                Filesize

                64KB

              • memory/1916-20-0x0000000000AE0000-0x0000000000B20000-memory.dmp

                Filesize

                256KB

              • memory/2036-72-0x0000000002870000-0x0000000002878000-memory.dmp

                Filesize

                32KB

              • memory/2036-71-0x000000001B490000-0x000000001B772000-memory.dmp

                Filesize

                2.9MB

              • memory/2052-79-0x0000000001E70000-0x0000000001E78000-memory.dmp

                Filesize

                32KB

              • memory/2052-78-0x000000001B660000-0x000000001B942000-memory.dmp

                Filesize

                2.9MB

              • memory/2768-32-0x00000000008C0000-0x00000000008D0000-memory.dmp

                Filesize

                64KB

              • memory/2924-90-0x000000001B830000-0x000000001BB12000-memory.dmp

                Filesize

                2.9MB