Resubmissions

01/04/2025, 20:55

250401-zqx4qaypz4 9

28/03/2025, 18:34

250328-w7tk3s1py6 9

Analysis

  • max time kernel
    27s
  • max time network
    20s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2025, 18:34

General

  • Target

    Swift.exe

  • Size

    20.1MB

  • MD5

    532e28bfd55208ef66d609a48a65cf91

  • SHA1

    5da3a7f1a437cae4109b4c052b7de697bc58a674

  • SHA256

    3b19486b4e14b206ec8ab2602ec6a430f9fce7ef40247b1e1f4c6f004ee468b4

  • SHA512

    10c57c4bd1c18242405bb7ac89361121b6169f3444122dbef246e4605b0f793f205a9fb36f5a8d820e9c8617bddb9df65b9590acbaada19a89ac7a064a23a0f1

  • SSDEEP

    393216:V8JNpovBLKnLuJxQBqYuIavH5Cmq+Je5tmCTtu32syZ1k3hqdE7w:VMpWNW0mBqfvH5SZtlTtuGZgxqdcw

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Swift.exe
    "C:\Users\Admin\AppData\Local\Temp\Swift.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Downloads MZ/PE file
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden -NoProfile -NonInteractive -Command "$WshShell = New-Object -comObject WScript.Shell; $Shortcut = $WshShell.CreateShortcut('C:\Users\Admin\AppData\Local\Temp\Scripts.lnk'); $Shortcut.TargetPath = 'C:\Users\Admin\AppData\Roaming\Swift\Scripts'; $Shortcut.Save()"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5344
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden -NoProfile -NonInteractive -Command "$WshShell = New-Object -comObject WScript.Shell; $Shortcut = $WshShell.CreateShortcut('C:\Users\Admin\AppData\Local\Temp\Workspace.lnk'); $Shortcut.TargetPath = 'C:\Users\Admin\AppData\Roaming\Swift\Workspace'; $Shortcut.Save()"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4268
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" -WindowStyle Hidden -NoProfile -NonInteractive -Command "$WshShell = New-Object -comObject WScript.Shell; $Shortcut = $WshShell.CreateShortcut('C:\Users\Admin\AppData\Local\Temp\AutoExec.lnk'); $Shortcut.TargetPath = 'C:\Users\Admin\AppData\Roaming\Swift\AutoExec'; $Shortcut.Save()"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1184
    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=Swift.exe --webview-exe-version=0.1.0 --user-data-dir="C:\Users\Admin\AppData\Local\swift\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --disable-features=msWebOOUI,msPdfOOUI,msSmartScreenProtection --enable-features=RemoveRedirectionBitmap --lang=en-US --mojo-named-platform-channel-pipe=2060.1132.11839794491930891922
      2⤵
      • Drops file in Windows directory
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:5388
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\swift\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\swift\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=132.0.2957.140 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffc6bf0b078,0x7ffc6bf0b084,0x7ffc6bf0b090
        3⤵
          PID:3508
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=gpu-process --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\swift\EBWebView" --webview-exe-name=Swift.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1688,i,3749186237269882800,16246822346128560449,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=1684 /prefetch:2
          3⤵
            PID:756
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\swift\EBWebView" --webview-exe-name=Swift.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=1992,i,3749186237269882800,16246822346128560449,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2004 /prefetch:11
            3⤵
              PID:5508
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\swift\EBWebView" --webview-exe-name=Swift.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --always-read-main-dll --field-trial-handle=2264,i,3749186237269882800,16246822346128560449,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:13
              3⤵
                PID:3996
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\132.0.2957.140\msedgewebview2.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\swift\EBWebView" --webview-exe-name=Swift.exe --webview-exe-version=0.1.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --autoplay-policy=no-user-gesture-required --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --always-read-main-dll --field-trial-handle=3556,i,3749186237269882800,16246822346128560449,262144 --enable-features=RemoveRedirectionBitmap --disable-features=msPdfOOUI,msSmartScreenProtection,msWebOOUI --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:1
                3⤵
                  PID:3272

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              5f4c933102a824f41e258078e34165a7

              SHA1

              d2f9e997b2465d3ae7d91dad8d99b77a2332b6ee

              SHA256

              d69b7d84970cb04cd069299fd8aa9cef8394999588bead979104dc3cb743b4f2

              SHA512

              a7556b2be1a69dbc1f7ff4c1c25581a28cb885c7e1116632c535fee5facaa99067bcead8f02499980f1d999810157d0fc2f9e45c200dee7d379907ef98a6f034

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              82a765416b0afd146416505bb48e9f62

              SHA1

              5f3e134c69db37fbcad2ddbc9d651e51b0203e8a

              SHA256

              c2df083b53745c4e526f87aa74b94364dd839509e7b2e6bbd2fb59b75db68d7e

              SHA512

              a9c2c882b9a5013c0200c4429355578238185adc6aae06a23301a2f5778f10099c327267564a79eebfbae6dac3520387513dd93c5d880b5d46690332f999107e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              371ac0b948586f6551359d1e5cc7ce6a

              SHA1

              e2e3b8930edaec9752d2a87f9ce512a3dd320eeb

              SHA256

              a187893f567559aa34c3a11386eb2553d56ede8e3ebec1394cdb44550bc3c7ae

              SHA512

              4c4c8c8dccef9569ea5c0decacbff5540487001edf779fe35ece83801e0f26f07e6f36faa8d576f0efa75fdd28593b632a39091a0d128503187320fe661bec6a

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fmuosw1g.1ii.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\amdxx64.dll

              Filesize

              22.5MB

              MD5

              c568dbc5fd90067a6712055023a18568

              SHA1

              1546683eb7ed167b54b9e4fb0a8ae72374f688e8

              SHA256

              ed927320654bccb0164b7c1e8835975ec9f680d607cfea982c7a0a103684d188

              SHA512

              72da4af29fd9aeda9851fc0a0a4ffc8a5b35f260074f2203381a760c94e4b836fe28b11186a6d3cca4d01de65893c0063edfcf355268b689330915ab66339816

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Crashpad\settings.dat

              Filesize

              280B

              MD5

              84b66ea2f1bd0afe2d054bb3cdbbd39d

              SHA1

              c2000b4c572e216be15402b13a0c02360c8b8212

              SHA256

              ab77fa0977595c9320c949cd51c4bc8adf1d9ce2c464bcb3fabf82ddf377bccc

              SHA512

              420bb112b42ca918dd62adfeb3f9bb14de8266e0fcc6dbb24a050d2b2dd4eb78c38dd633030f59078d4dbc9e989f39574391c6d3aa69a755039143c697b707be

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Crashpad\settings.dat

              Filesize

              280B

              MD5

              661e276ea07efabe4b5e1dbaf0a0e9f2

              SHA1

              ab5d7c25f497b94103486eb42796de6fbc80883a

              SHA256

              f51b71b408365a76cb0c692806daaeadb7d0b771dbcae99eae10302c14a4e104

              SHA512

              0c1dfbc63cd2e48e951a06fc9fe826561b3802aabe191bc6f80b63b3ecd58b91aa69d35ac9b2a1bea60a3acfa78ca395957d03e770fe9efaf909466f764be2ad

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Crashpad\throttle_store.dat

              Filesize

              20B

              MD5

              9e4e94633b73f4a7680240a0ffd6cd2c

              SHA1

              e68e02453ce22736169a56fdb59043d33668368f

              SHA256

              41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

              SHA512

              193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\DawnWebGPUCache\data_0

              Filesize

              8KB

              MD5

              cf89d16bb9107c631daabf0c0ee58efb

              SHA1

              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

              SHA256

              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

              SHA512

              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\DawnWebGPUCache\data_1

              Filesize

              264KB

              MD5

              d0d388f3865d0523e451d6ba0be34cc4

              SHA1

              8571c6a52aacc2747c048e3419e5657b74612995

              SHA256

              902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

              SHA512

              376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\DawnWebGPUCache\data_2

              Filesize

              8KB

              MD5

              0962291d6d367570bee5454721c17e11

              SHA1

              59d10a893ef321a706a9255176761366115bedcb

              SHA256

              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

              SHA512

              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\DawnWebGPUCache\data_3

              Filesize

              8KB

              MD5

              41876349cb12d6db992f1309f22df3f0

              SHA1

              5cf26b3420fc0302cd0a71e8d029739b8765be27

              SHA256

              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

              SHA512

              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\Extension Rules\MANIFEST-000001

              Filesize

              41B

              MD5

              5af87dfd673ba2115e2fcf5cfdb727ab

              SHA1

              d5b5bbf396dc291274584ef71f444f420b6056f1

              SHA256

              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

              SHA512

              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\Network\SCT Auditing Pending Reports

              Filesize

              2B

              MD5

              d751713988987e9331980363e24189ce

              SHA1

              97d170e1550eee4afc0af065b78cda302a97674c

              SHA256

              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

              SHA512

              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Default\Site Characteristics Database\CURRENT

              Filesize

              16B

              MD5

              46295cac801e5d4857d09837238a6394

              SHA1

              44e0fa1b517dbf802b18faf0785eeea6ac51594b

              SHA256

              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

              SHA512

              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Local State

              Filesize

              1KB

              MD5

              62aca5f6fefb1810c03abf264f39d91a

              SHA1

              ca25859aa2757d46a26072fb1250e35f9444bd71

              SHA256

              456c354ebd3d45b16283e4be572b70699742005fd04c8c9ba6258e6b522b70d7

              SHA512

              36426533d4d596af20a8716607c40a694b2cd6987e170f071ea7d99a480e66801a4ba14c4483725fd87a0b26bf2f117dfbb5990af5ecbcb5fa0386aec1395aef

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Local State

              Filesize

              2KB

              MD5

              b64dd6934b709a9170837d12c0d6f5c0

              SHA1

              38f596e9b4d431cf4af70b3f59c0813db9358317

              SHA256

              acef942f19f1610dc6e751f0c8974888b6f5fca044d0b1a3579f1dc7dc1e06be

              SHA512

              918b8b0f28a2a8461497683070b7861e70282c13318e4ce0f56ba0efc6202e383b69e418b7d6850931f4dcd123a80133e1c22dc66da82aa20610434ef4868876

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Local State

              Filesize

              16KB

              MD5

              7ba6902408777a7b47ece1c6678e0957

              SHA1

              1a865fd33a4f4c60b56e20d7607d1ba8b75672c9

              SHA256

              087bac96dbca115129ebfa6c7a6054a04df6a574bb435b5e7532212d562a8372

              SHA512

              6077fa1479d55c8c7799ccf7b1cbb042b76f01cbd1575eb91d074a20e551af1f7ecd112298667d50efa1395be6a1819a9e8822f923c8fd35be5a0d3ba62754bb

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Local State

              Filesize

              3KB

              MD5

              ff4074f50ffac12a67654e8ab5fd6593

              SHA1

              2491d17bdf17b8d521cf6c357b939e70708703a2

              SHA256

              1756ba6425fa82a34aad01610f527dc37e1b73ddcc94f73ae9a4bfee05d23b7e

              SHA512

              d12681018203746f7a785896c870e31009b583125f95c143e85dc20a1af35d1fe8e43397b6f9b84f2fa1545894becfbe3b245020e34b7a9ecfde0a9c696d6774

            • C:\Users\Admin\AppData\Local\swift\EBWebView\Local State~RFe57b2b6.TMP

              Filesize

              1KB

              MD5

              456724ecfb7cb83bab9dbf1eb62238b1

              SHA1

              1642eb307eae7c95b1d78e4030a8f57450163820

              SHA256

              9014374db6ef0bdde35a5032bdcbf531756739d3e477a3c51cf19dd9e99ea636

              SHA512

              613abc8a649e0f2afa4c07657640ea4b2e415e0acb94fc31a563ec64d0d144dc64864b4a74682713f0c1bba7b9ead20d6a5ee210feeaa4028e35b3fc36845734

            • memory/756-71-0x00007FFC8BB60000-0x00007FFC8BB61000-memory.dmp

              Filesize

              4KB

            • memory/756-241-0x0000025362980000-0x00000253629A9000-memory.dmp

              Filesize

              164KB

            • memory/2060-1-0x00007FFC8C8A7000-0x00007FFC8C8A9000-memory.dmp

              Filesize

              8KB

            • memory/2060-0-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-229-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-260-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-5-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-4-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-3-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-2-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/2060-216-0x0000000140000000-0x00000001437AD000-memory.dmp

              Filesize

              55.7MB

            • memory/3272-184-0x00007FFC8BB60000-0x00007FFC8BB61000-memory.dmp

              Filesize

              4KB

            • memory/5344-7-0x00007FFC8C800000-0x00007FFC8CA09000-memory.dmp

              Filesize

              2.0MB

            • memory/5344-6-0x00007FFC8C800000-0x00007FFC8CA09000-memory.dmp

              Filesize

              2.0MB

            • memory/5344-8-0x00007FFC8C800000-0x00007FFC8CA09000-memory.dmp

              Filesize

              2.0MB

            • memory/5344-14-0x0000017FD2350000-0x0000017FD2372000-memory.dmp

              Filesize

              136KB

            • memory/5344-21-0x00007FFC8C800000-0x00007FFC8CA09000-memory.dmp

              Filesize

              2.0MB