Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 19:25

General

  • Target

    Corona-virus-Map.com.exe

  • Size

    3.3MB

  • MD5

    73da2c02c6f8bfd4662dc84820dcd983

  • SHA1

    949b69bf87515ad8945ce9a79f68f8b788c0ae39

  • SHA256

    2b35aa9c70ef66197abfb9bc409952897f9f70818633ab43da85b3825b256307

  • SHA512

    43daa65bc057abc5e07b909eb71361c8488863c7c8a4a271b426b06cb8c16d3f7db8e66051627a50d392ff088cd619e00a7ac075454dccf901a4271251c9c6e3

  • SSDEEP

    98304:r2cPK8o4ZhHpmaFDh62Z4BDksIslSOkXvR:iCKCZho6k2IDks/b8Z

Malware Config

Extracted

Family

azorult

C2

http://coronavirusstatus.space/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Azorult family
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 26 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 19 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 2 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 2 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Corona-virus-Map.com.exe
    "C:\Users\Admin\AppData\Local\Temp\Corona-virus-Map.com.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe
      "C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.sfx.exe
          Corona.sfx.exe -p3D2oetdNuZUqQHPJmcMDDHYoqkyNVsFk9r -dC:\Windows\System32
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2420
            • C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe
              "C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1316
            • C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe
              "C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • NTFS ADS
              • Suspicious use of WriteProcessMemory
              PID:2068
              • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
                C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • NTFS ADS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:744
                • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe
                  C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe a -y -mx9 -ssw "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\ENU_687FE9702D433A0E9D41.7z" "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\*"
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • System Time Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2472
                • C:\Windows\SysWOW64\attrib.exe
                  attrib +s +h "C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml"
                  8⤵
                  • Sets file to hidden
                  • System Location Discovery: System Language Discovery
                  • System Time Discovery
                  • Views/modifies file attributes
                  PID:2068
    • C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe
      "C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2992
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {6B70834D-16A1-4723-9FA3-D5D57DAF9856} S-1-5-21-1163522206-1469769407-485553996-1000:PJCSDMRP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
      C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1712
    • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
      C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dedfb92ba7ce9c0ebecb93052f065a4

    SHA1

    0623968742d65aa2e8d759eb7b508fa041618948

    SHA256

    d434e8146b781882c70456441b7ac11267e4f6c7043767f809ce855d1a06446d

    SHA512

    a906ab81be72023ddfae91c97975208e10a72712301eb557a71d4efeaf2ceb2b3600d58a9847e22f8340a8139dbf071b4b123c07abca1f7ef5e6c65e73c26fb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d74a1d238bf771b81c6e990049486b2d

    SHA1

    bfd5f06bf156086c54d2e2d52204484c2d32a2ba

    SHA256

    565cbfc735203a6e776ad0a14501e8bb3c5090a9f95af674c1cbb1597b3881f7

    SHA512

    3c27249d5924da3872c66cac7401b4cadf428d856f97beac0f4d16db2de22dcace08baf2a92168c45e481c546c1805254b37e38b974cfe096d313ea6ab8e3bd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49d8b120a9bb7dea4405b7b3a39f21ab

    SHA1

    8f9dbf977385f1443adf55eb3c42ee946bbdec72

    SHA256

    c7ffd6be2fbe5afa7f880721051358badb72ebc9d5aebee22518a3670222ec66

    SHA512

    064f18327dfab5b20d1befb3e3a5219a40aefd5e603e1ac622e81a86fd2ace2ffe2b5416e39254e151f760012f59bfa94818550c6f028d4d2582d3ff72fe8cb6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\app-a3ca87c4b608dae825ebd35a4953334c[1].css

    Filesize

    116KB

    MD5

    a3ca87c4b608dae825ebd35a4953334c

    SHA1

    19fcb0dfc36711cf8d2c82c994f9134801c9202d

    SHA256

    126fe4dc5bf421f7cd942077791d097458914d879c8703dd654ca01da227d687

    SHA512

    36ae6fb1551fd200918ca043bc0757f5e380689ca6504d0bb087850e646b266a84ec8a3a53da1b35cb5deb72c2ad7df5a1329ee0ac03d99e9bf6e436bc0bba77

  • C:\Users\Admin\AppData\Local\Temp\CabAB6E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Corona.bat

    Filesize

    84B

    MD5

    e9dcbecca02b600ce135f7d58b8cd830

    SHA1

    e8956408efe58fa5934f7f742f6fcaf429964034

    SHA256

    0cd1e499799e4d98f1cb76df08ff7a7f441216ff713dfa97cb6691c68c962cf8

    SHA512

    80001c7a0bac929436d4637ca981ed8c128172920f0e5fbdc99151ae04fad507e4db395253cb2d10b2d2e3b684708e143eddc2c339af3e7ccde2bb02068535ec

  • C:\Users\Admin\AppData\Local\Temp\TarABAF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona-virus-Map.com.exe

    Filesize

    451KB

    MD5

    07b819b4d602635365e361b96749ac3e

    SHA1

    7664716cc5097a97415c4d22ccb558dfcb139020

    SHA256

    203c7e843936469ecf0f5dec989d690b0c770f803e46062ad0a9885a1105a2b8

    SHA512

    83e67fe87870b1b8b53fd909e7272d4b4995e00c7d446b19f4a29a59b3d29ce5c73da3446290e71d36c73e922c473a18ced25706c2bd69ef82c2cf841d938555

  • C:\Users\Admin\AppData\Roaming\Z11062600\Corona.exe

    Filesize

    2.2MB

    MD5

    1beba1640f5573cbac5552ae02c38f33

    SHA1

    6878e9825fad4696e48aca151e656a4581e3dc16

    SHA256

    0b3e7faa3ad28853bb2b2ef188b310a67663a96544076cd71c32ac088f9af74d

    SHA512

    b7404b3f0a0e1fcc020557b27821a63c19ffe006407051645abaf32b3881e89661f729e4c2c94e068ea16fbfc97f7a6c3be9387bd8d745e8eec9d288b3f8a381

  • C:\Users\Admin\AppData\Roaming\Z58538177\Build.exe

    Filesize

    1.3MB

    MD5

    f6a5e02f46d761d3890debd8f2084d37

    SHA1

    d64ff51020046fb13aec3ed608ba499295caf80d

    SHA256

    126569286f8a4caeeaba372c0bdba93a9b0639beaad9c250b8223f8ecc1e8040

    SHA512

    a3563460ce90c04da9e498081d68a9e3dc0ef25dccd21330e60f0617455aa4f839ba127d69e8043111fcb3912a44ef10eb53b0baaabad7bdf6f691f5842bff31

  • C:\Users\Admin\AppData\Roaming\Z58538177\bin.exe

    Filesize

    114KB

    MD5

    c4852ee6589252c601bc2922a35dd7da

    SHA1

    4c8a7c3dabf12748201c496525a37ec65577cbbb

    SHA256

    fda64c0ac9be3d10c28035d12ac0f63d85bb0733e78fe634a51474c83d0a0df8

    SHA512

    d144cb9bd81118d853e831f4890c4f32b9c5d59fd5188fca4056670263c6315481d406fc8ec31347db0b0d226a57f3fcc003f5d73591ed5f04c4f6c9a67a65dd

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\Information.txt

    Filesize

    3KB

    MD5

    0ab2b514c718aae130c43a1d404faddf

    SHA1

    0d699f15947be3c263ea26eb9d23368909d67aac

    SHA256

    20d676b5376a97918cb9086bcae1a009996669f22041dd8ca7cf0ad6cec1f565

    SHA512

    dfcc130c5e3db415407df1548a80b937e2f43078af995cbbfdc2410fcb2ebcde9804bdf5f5e345533a6d8b36762ba53206cb8228992e0f05c1aa7aac26437471

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\1\Screen.jpg

    Filesize

    35KB

    MD5

    c2c0e49e929badb5c1785a3f619db705

    SHA1

    a6c74cd05f31dee97f461825c62004e79084da25

    SHA256

    0fd37cb054058342638987ca175dc57e81c47aa826e3ca36a7d4c5394b15ef38

    SHA512

    eb994bd9ed6209c3d983042d518fa99a7b8fdfff388febc4acee4ca0bc719a7dd9554c00728edbb7b351edb96e32bc986b7eb8b06e30fe902d5800389845606e

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe.2

    Filesize

    197KB

    MD5

    b6633a59ee4762b8cdaae77fd1b34748

    SHA1

    de3dc7bf57b39b0274b6667a491156727cb13abc

    SHA256

    783e3808d022dc6528bb451a2b613114a1c797fec9d4c0e03af60800cff69571

    SHA512

    74b745a50ce6d189bc40026a760108a0d972d0eb688fc3032ec73b508d0287ab10998b38fd49f88623ce15a095c618259d44e25c2ccf2fafb89f1f8c4e9229ec

  • C:\Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.sqlite3.module.dll.2

    Filesize

    360KB

    MD5

    7f3768254c9ab2f4880007342597b6ae

    SHA1

    ab9004da7f23121810c4bbfd6f4e46fc82b10d5c

    SHA256

    90d33735206157b89919679ec9b08ec6357f615ac0868f57c5a7984785a68b6d

    SHA512

    52aa660d3f622963fbe7b2af3337d8da872a009ccfc313ff955eea77ba5ab3ff3662eb38e6f3f6e0c138fdc265fd27facec60fc25f847d8239dd78d647813ecf

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Corona.sfx.exe

    Filesize

    2.0MB

    MD5

    3cb9fc1ee05f49438455ba1aea3bca4e

    SHA1

    401431f0781b416f3e237e993b1a283b3a37613e

    SHA256

    148520c746aee00d7330e8c639a0bcd576c9a431acb197e36f27529f5e897fb4

    SHA512

    8456cac4acb3e4d6538c1ef1a9abfdd7e15c6f0dc3a61b2fe24992e2faf256da0fd8ae170add9c363711ff3f85371fe263ccebd72c3524d9147db9261d4dfdd6

  • \Users\Admin\AppData\Local\Temp\RarSFX1\Corona.exe

    Filesize

    2.2MB

    MD5

    27ad5971933d514c3a0e90fe2a0f0389

    SHA1

    b11ea20d95aaea2fde9bee0d7ac5eac0b81a839c

    SHA256

    13c0165703482dd521e1c1185838a6a12ed5e980e7951a130444cf2feed1102e

    SHA512

    d0e9c8fa9ae48abe7bbc9648d8cccff88d58f4392315b20aaca10720e9e2c164641c2b127b26fdba490f677615b4af49c3fbeb4ce60029f2c73bb74888e2eef5

  • \Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.module.exe

    Filesize

    197KB

    MD5

    946285055913d457fda78a4484266e96

    SHA1

    668661955bf3c20b9dc8cdaa7ec6e8dbbbd63285

    SHA256

    23ca34a7d22fdb7d36014928c089c982cdfb903e9143aea60d38f228c9594beb

    SHA512

    30a490b774d5736215b340d3a192825dc1dfbb7c8d9974c8ab2a09eff2429ed7cf99969ec6d651c8056549798da092ffa600681288dbd7c6f60515acd3630d95

  • \Users\Admin\AppData\Roaming\amd64_netfx4-system.runti..dowsruntime.ui.xaml\Windows.Globalization.Fontgroups.sqlite3.module.dll

    Filesize

    360KB

    MD5

    8c127ce55bfbb55eb9a843c693c9f240

    SHA1

    75c462c935a7ff2c90030c684440d61d48bb1858

    SHA256

    4f93f3543139febb91e0c95dc9351008e9147a484732ee5962c7df64f6868028

    SHA512

    d3578bd7ef01f9e25983c24eb9bb33f25c37d650cc79b823c3ec19f196d4a00deb506c1e1f774f15e5664d5263b02570fec11b322022b90a0ff1b10943188a02

  • memory/744-375-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-124-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-137-0x0000000061E00000-0x0000000061ED2000-memory.dmp

    Filesize

    840KB

  • memory/744-385-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-364-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-384-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-383-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-365-0x0000000004190000-0x000000000420D000-memory.dmp

    Filesize

    500KB

  • memory/744-379-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-366-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-378-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-377-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-376-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-353-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-362-0x0000000061E00000-0x0000000061ED2000-memory.dmp

    Filesize

    840KB

  • memory/744-363-0x0000000061E00000-0x0000000061ED2000-memory.dmp

    Filesize

    840KB

  • memory/744-288-0x0000000004190000-0x000000000420D000-memory.dmp

    Filesize

    500KB

  • memory/744-140-0x0000000061E00000-0x0000000061ED2000-memory.dmp

    Filesize

    840KB

  • memory/744-374-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-367-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-368-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/744-369-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/1276-381-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/1276-382-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/1316-142-0x0000000000400000-0x0000000000421000-memory.dmp

    Filesize

    132KB

  • memory/1712-372-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/2068-119-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/2068-125-0x0000000001040000-0x000000000131D000-memory.dmp

    Filesize

    2.9MB

  • memory/2420-117-0x0000000002DC0000-0x000000000309D000-memory.dmp

    Filesize

    2.9MB

  • memory/2420-287-0x0000000002DC0000-0x000000000309D000-memory.dmp

    Filesize

    2.9MB

  • memory/2472-294-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2472-290-0x0000000000400000-0x000000000047D000-memory.dmp

    Filesize

    500KB

  • memory/2992-57-0x0000000000930000-0x00000000009A6000-memory.dmp

    Filesize

    472KB

  • memory/2992-332-0x000000000BBD0000-0x000000000C376000-memory.dmp

    Filesize

    7.6MB