Analysis

  • max time kernel
    209s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 04:45

General

  • Target

    ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe

  • Size

    783KB

  • MD5

    e33af9e602cbb7ac3634c2608150dd18

  • SHA1

    8f6ec9bc137822bc1ddf439c35fedc3b847ce3fe

  • SHA256

    8c870eec48bc4ea1aca1f0c63c8a82aaadaf837f197708a7f0321238da8b6b75

  • SHA512

    2ae5003e64b525049535ebd5c42a9d1f6d76052cccaa623026758aabe5b1d1b5781ca91c727f3ecb9ac30b829b8ce56f11b177f220330c704915b19b37f8f418

  • SSDEEP

    12288:0E9uQlDTt8c/wtocu3HhGSrIilDhlPnRq/iI7UOvqF8dtbcZl36VBqWPH:FuqD2cYWzBGZohlE/zUD8/bgl2qW/

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe
    "C:\Users\Admin\AppData\Local\Temp\ArdamaxKeylogger_E33AF9E602CBB7AC3634C2608150DD18.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\28463\DPBJ.exe
      "C:\Windows\system32\28463\DPBJ.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2328
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\SendImport.docx"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1252
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f99758,0x7fef6f99768,0x7fef6f99778
        2⤵
          PID:2068
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:2
          2⤵
            PID:2792
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:8
            2⤵
              PID:2252
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1540 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:8
              2⤵
                PID:2012
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2324 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:1
                2⤵
                  PID:1864
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:1
                  2⤵
                    PID:1996
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1176 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:2
                    2⤵
                      PID:2324
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1332 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:1
                      2⤵
                        PID:1920
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1296,i,15273429572270535079,18347725192628798303,131072 /prefetch:8
                        2⤵
                          PID:1624
                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                        1⤵
                          PID:1676

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\438df139-c9d1-4712-854d-ff9df70a50a2.tmp

                          Filesize

                          357KB

                          MD5

                          ffb8f55aae0edde17319377b124967ba

                          SHA1

                          b1f7ada599d358e2af2344c446297dd05cee2c1d

                          SHA256

                          85c6b17f8d3be83336078151ca86444779fb7eb4372251f9a4ec82b6a6557af3

                          SHA512

                          e02922a308ade6a12ae377099d4fc44d34721b6ed1282f8e02cbfac25b4be4dd4f7a8c844659baf1c65e2dc90391c48c8252f86a6977af21c667e3b387fa2376

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                          Filesize

                          16B

                          MD5

                          aefd77f47fb84fae5ea194496b44c67a

                          SHA1

                          dcfbb6a5b8d05662c4858664f81693bb7f803b82

                          SHA256

                          4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                          SHA512

                          b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          5KB

                          MD5

                          06241d09c0be34063737a92007b2424c

                          SHA1

                          67d86c8b300a2e1e49b4df2a41184aaea36eff25

                          SHA256

                          3ee0a2a4db8b3b9316d9409233cf0bf3a78c65433bda4887c6a9bd85e9fe8459

                          SHA512

                          260c794bf1372b6630fd4c5cdd0add0b6febda00360e9bc79426f529af45e6788446133647b4849b5821867a8611cfde53928defd477942f5225b1504fbb7342

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                          Filesize

                          16B

                          MD5

                          18e723571b00fb1694a3bad6c78e4054

                          SHA1

                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                          SHA256

                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                          SHA512

                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          357KB

                          MD5

                          2c92cb0850aa63def4c6396870137d84

                          SHA1

                          28f975d335a202a43bea1abed201d81a4f9382f5

                          SHA256

                          671fc5b24c451f59fb2d16d62faadb6fe84343cc874547981044b706eee5127d

                          SHA512

                          caf82008d5917644d31971fea4549b25f9e0f2424bc3401da7122ed322358484ae5e9a0ce873ddb594d588d44148908f49f4949f04124c344623586c2f847a88

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                          Filesize

                          404B

                          MD5

                          926256611d68b40db3993adc1571692a

                          SHA1

                          6fc17bb3388b79c3b24cc7ceb29dbc2feea2c123

                          SHA256

                          67126e2fa3db01e3f01cfd0baca9b3d277edb41f392e57fe6c4ae119d8c74495

                          SHA512

                          54ec3a80cc8ec19f82e5d0bdf0bdd76b74fd03c20c3f5c848c2b438d1845e3542d37cf6c2920615468b2f6b765b731916a92583d7663de3c8f95f679469b488f

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

                          Filesize

                          19KB

                          MD5

                          5b5c68f64ad97284b8fedb5b7ac07146

                          SHA1

                          1e5f7f3219541ce8c1db348c97469b6fbd1d1d5a

                          SHA256

                          c21e932b2070d37a70df90c294567677dc696a829b317e74f089468fe4f66688

                          SHA512

                          ba512e040de2d58380f47776285a2fc956131f0869c208539a04aea7d8dbf87ea2141e2bf97b069902d21249ae5edbe85f3e1ecf02d37e19e9c2530329e22edb

                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

                          Filesize

                          2B

                          MD5

                          f3b25701fe362ec84616a93a45ce9998

                          SHA1

                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                          SHA256

                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                          SHA512

                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                        • C:\Windows\SysWOW64\28463\AKV.exe

                          Filesize

                          457KB

                          MD5

                          97eee85d1aebf93d5d9400cb4e9c771b

                          SHA1

                          26fa2bf5fce2d86b891ac0741a6999bff31397de

                          SHA256

                          30df6c8cbd255011d80fa6e959179d47c458bc4c4d9e78c4cf571aa611cd7d24

                          SHA512

                          8cecc533c07c91c67b93a7ae46102a0aae7f4d3d88d04c250231f0bcd8e1f173daf06e94b5253a66db3f2a052c51e62154554368929294178d2b3597c1cca7e6

                        • C:\Windows\SysWOW64\28463\DPBJ.001

                          Filesize

                          492B

                          MD5

                          7a0f1fa20fd40c047b07379da5290f2b

                          SHA1

                          e0fb8305de6b661a747d849edb77d95959186fca

                          SHA256

                          b0ad9e9d3d51e8434cc466bec16e2b94fc2d03bab03b48ccf57db86ae8e2c9b6

                          SHA512

                          bb5b3138b863811a8b9dcba079ac8a2828dae73943a1cc1d107d27faca509fda9f03409db7c23d5d70b48d299146de14b656314a24b854f3ae4fdb6ef6770346

                        • C:\Windows\SysWOW64\28463\DPBJ.006

                          Filesize

                          8KB

                          MD5

                          35b24c473bdcdb4411e326c6c437e8ed

                          SHA1

                          ec1055365bc2a66e52de2d66d24d742863c1ce3d

                          SHA256

                          4530fcc91e4d0697a64f5e24d70e2b327f0acab1a9013102ff04236841c5a617

                          SHA512

                          32722f1484013bbc9c1b41b3fdaf5cd244ec67facaa2232be0e90455719d664d65cae1cd670adf5c40c67f568122d910b30e3e50f7cc06b0350a6a2d34d371de

                        • C:\Windows\SysWOW64\28463\DPBJ.007

                          Filesize

                          5KB

                          MD5

                          a8e19de6669e831956049685225058a8

                          SHA1

                          6d2546d49d92b18591ad4fedbc92626686e7e979

                          SHA256

                          34856528d8b7e31caa83f350bc4dbc861120dc2da822a9eb896b773bc7e1f564

                          SHA512

                          5c407d4aa5731bd62c2a1756127f794382dc5e2b214298acfa68698c709fbbe3f2aa8dbdcbef02ed2a49f8f35969959946e9f727895bdca4500d16e84f4ef2e8

                        • C:\Windows\SysWOW64\28463\DPBJ.009

                          Filesize

                          1.5MB

                          MD5

                          f3c172423d1829d7ab93a475ef0199db

                          SHA1

                          1a88098244fac3a3b0a6f87a821b87301643ff1b

                          SHA256

                          dba1b256b164dd0ad8f655fbe1f713479765fc7faebe909978d05f4f872ca862

                          SHA512

                          db7641f978cfdd62df9a4340d9e64dfc8cb126651c0268babc53ffc2a192d6f5139b8ea0b28cdc47fc9f0bebab68a7f138de212ba3b1149724b26b7faf011f99

                        • C:\Windows\SysWOW64\28463\DPBJ.exe

                          Filesize

                          646KB

                          MD5

                          b863a9ac3bcdcde2fd7408944d5bf976

                          SHA1

                          4bd106cd9aefdf2b51f91079760855e04f73f3b0

                          SHA256

                          0fe8e3cd44a89c15dec75ff2949bac1a96e1ea7e0040f74df3230569ac9e37b0

                          SHA512

                          4b30c3b119c1e7b2747d2745b2b79c61669a33b84520b88ab54257793e3ed6e76378dea2b8ff048cb1822187ffdc20e921d658bb5b0482c23cfa7d70f4e7aa1a

                        • C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_01.jpg

                          Filesize

                          115KB

                          MD5

                          0ca4acb29c78582998d9d91919c4174a

                          SHA1

                          03f9465355e5c003ceac31fcdf42d48cb96877dc

                          SHA256

                          f11dfd0b15ca3c09bc26d67848b36468369b08abb370efc718f64e65785210c7

                          SHA512

                          24fdd8a3a04bb41f5190f089951408d000f967a1bc1d62cf93a5a8773a2af78a3466640b6900788bd1e42e81afa926e6c4723e607e6e0ca390e7f7a35e9b5a04

                        • C:\Windows\SysWOW64\28463\Nov_20_2024__04_46_43.jpg

                          Filesize

                          282KB

                          MD5

                          f424d5e4c184dd93cbb71e932f6ff9fc

                          SHA1

                          2ef2d7277e5abd06799f6d715a2dd51421a62518

                          SHA256

                          9a475727ee990352da81100dafc1022eb52ad6f3672071487cb493b3c1d68356

                          SHA512

                          f8ef94fe31e539507854c574de34ac2638f8022add8209a25729e416c0907835284d9a1c6827e8d05b240113662fdb2f20d153a66cfe1d5e1f2d769096b3e34a

                        • C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_12.jpg

                          Filesize

                          60KB

                          MD5

                          bcc74f0311dde6550cb132a45e2ac0a9

                          SHA1

                          685dbb9d99f1d5f06e46b78f6e9e0cf6013fc73b

                          SHA256

                          77f32b75dd4e8a064ce0bc6226081af20f4500891012a0c93ea2be66d88642d7

                          SHA512

                          d015548eaae12401727945caa4fb5b9c99be105362eb15866d5de509fbb7d1c77ab6c48674e536977d44e7c9b3dfd7f7169ed768bc4f8594ebddaa3343724485

                        • C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_23.jpg

                          Filesize

                          72KB

                          MD5

                          3ed6d7125e1d99d3bcbea1b00b977015

                          SHA1

                          d5d693656a75bb70f52ac98d237af593b6a00581

                          SHA256

                          9e8a5cc6faab223b1909584c3265f6d386412518750c65f11243297facb6184d

                          SHA512

                          b25f296c000d5ce4965adec4e3671a491b478f70e750f98a5d2effc6100eed82244eb869796f287492a5c7fdd9249952c730fc4934166cba3571d759e608bf24

                        • C:\Windows\SysWOW64\28463\Nov_20_2024__04_47_28.jpg

                          Filesize

                          72KB

                          MD5

                          314d7c2341118fa7cc4d9ab76f91de84

                          SHA1

                          04ee0a56d844d9fd2a9c4480f16f3fbae961f4a8

                          SHA256

                          09d2d82704586b793d6bdbf500557aaf832e17d9874c890e80315a157c99e115

                          SHA512

                          b2e86340afaafb45ef2379429ea31f5b67d14507ff9069b6e549e9917d64f9229b7466d4615f160d940c57bcc19557bd98edfe0a8e1cfede937c05a24cb297a8

                        • C:\Windows\SysWOW64\28463\key.bin

                          Filesize

                          106B

                          MD5

                          639d75ab6799987dff4f0cf79fa70c76

                          SHA1

                          be2678476d07f78bb81e8813c9ee2bfff7cc7efb

                          SHA256

                          fc42ab050ffdfed8c8c7aac6d7e4a7cad4696218433f7ca327bcfdf9f318ac98

                          SHA512

                          4b511d0330d7204af948ce7b15615d745e8d4ea0a73bbece4e00fb23ba2635dd99e4fa54a76236d6f74bdbcdba57d32fd4c36b608d52628e72d11d5ed6f8cde2

                        • \Users\Admin\AppData\Local\Temp\@BA79.tmp

                          Filesize

                          4KB

                          MD5

                          d73d89b1ea433724795b3d2b524f596c

                          SHA1

                          213514f48ece9f074266b122ee2d06e842871c8c

                          SHA256

                          8aef975a94c800d0e3e4929999d05861868a7129b766315c02a48a122e3455d6

                          SHA512

                          8b73be757ad3e0f2b29c0b130918e8f257375f9f3bf7b9609bac24b17369de2812341651547546af238936d70f38f050d6984afd16d47b467bcbba4992e42f41

                        • memory/1300-200-0x000000005FFF0000-0x0000000060000000-memory.dmp

                          Filesize

                          64KB

                        • memory/1300-149-0x000000005FFF0000-0x0000000060000000-memory.dmp

                          Filesize

                          64KB

                        • memory/2328-21-0x0000000000590000-0x0000000000591000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-23-0x00000000005A0000-0x00000000005A1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-48-0x0000000000370000-0x00000000003CA000-memory.dmp

                          Filesize

                          360KB

                        • memory/2328-143-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-45-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-29-0x0000000000230000-0x0000000000231000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-30-0x0000000000310000-0x0000000000311000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-31-0x00000000030D0000-0x00000000030D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-32-0x0000000000500000-0x0000000000501000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-33-0x0000000003110000-0x0000000003111000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-332-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-20-0x0000000000540000-0x0000000000541000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-22-0x0000000000580000-0x0000000000581000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-50-0x0000000003100000-0x0000000003101000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-24-0x0000000000560000-0x0000000000561000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-461-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-25-0x0000000000520000-0x0000000000521000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-26-0x00000000030C0000-0x00000000030C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-27-0x00000000030B0000-0x00000000030B3000-memory.dmp

                          Filesize

                          12KB

                        • memory/2328-28-0x0000000003100000-0x0000000003101000-memory.dmp

                          Filesize

                          4KB

                        • memory/2328-18-0x0000000000370000-0x00000000003CA000-memory.dmp

                          Filesize

                          360KB

                        • memory/2328-687-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-17-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-944-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-1028-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB

                        • memory/2328-1270-0x0000000000400000-0x00000000004DF000-memory.dmp

                          Filesize

                          892KB