Analysis

  • max time kernel
    428s
  • max time network
    1172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/12/2023, 23:09

General

  • Target

    Setup.exe

  • Size

    968.1MB

  • MD5

    b844f8be0aee168f9b827cb5aa181bf5

  • SHA1

    c6650566b6b896123b49511e724fc48b9f61ce36

  • SHA256

    8b8e5b528101d485cda531b55f109a4801dea395ed29c995cf534dda705d3b17

  • SHA512

    41fc34f019f231cae1ae2fd982cfb884ea39f9b269d1bd376a4a941e42c4c9d1b449e531e116764e91818406ef75f5c10d6046ee5896faf17cf0199424833e01

  • SSDEEP

    25165824:8w6Cvmu9PsmEVbhcx/GJhRwzLtY4m3yFTYYpml5ReCguqu7l:8w6CvmDm1tBm3yFTYY8l5Rhguqu7l

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://1620888.com/memo.ps1

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 16 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C start /B "" "C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe
        "C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3644
        • C:\Windows\Temp\{CDF7E643-BCD1-4BAD-AC25-2C7A9976D3B2}\.cr\Nik_Collection_6_byDxO.exe
          "C:\Windows\Temp\{CDF7E643-BCD1-4BAD-AC25-2C7A9976D3B2}\.cr\Nik_Collection_6_byDxO.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe" -burn.filehandle.attached=536 -burn.filehandle.self=532
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:5044
    • C:\Windows\SysWOW64\msiexec.exe
      msiexec /i "C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\" /quiet /qn /norestart
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2804
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c powershell -ep bypass -File "C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\launchobfc.ps1"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:232
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -ep bypass -File "C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\launchobfc.ps1"
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2312
        • C:\Users\Admin\AppData\Roaming\gpg\gpg.exe
          "C:\Users\Admin\AppData\Roaming\gpg\gpg.exe" --batch --yes --pinentry-mode loopback --passphrase 5d6f38813780c677cec0853f860f19e2 --decrypt --output C:\Users\Admin\AppData\Local\Temp\524299573213\data.rar C:\Users\Admin\AppData\Local\Temp\524299573213\data.gpg
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2600
        • C:\Windows\SysWOW64\tar.exe
          "C:\Windows\system32\tar.exe" --extract --file=C:\Users\Admin\AppData\Local\Temp\524299573213\data.rar --directory=C:\Users\Admin\AppData\Local\Temp\524299573213
          4⤵
            PID:4320
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3248

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\524299573213\data.gpg

            Filesize

            83KB

            MD5

            61e21b455082fb3cb86a829168e3921c

            SHA1

            e445633115d78679142c3b3d288f2e34b98d95c7

            SHA256

            459b7678b96297be351d5a4380d6056bf34e488923bcfb7294d51686e2b279ca

            SHA512

            e7508a9978d73ad35900d75d3fc15756cd0e4224f194843619b1854ebc8fe4ed98dbc79fd86552fcb496e2cd91c0c28518edc13a13ea2fb2e42b8335c54db99a

          • C:\Users\Admin\AppData\Local\Temp\524299573213\data.rar

            Filesize

            126KB

            MD5

            002bfa04f7d3bf27347d21d7f6455c18

            SHA1

            a7c15d9ce9adf925732d344c5046a03893c77143

            SHA256

            d6e117bbbf1aceb4f7d26516d3e37d2bc2a6d64617c3453ccc33f168815b1fe8

            SHA512

            37094691a54313de9ef3f624878a17aff272a781c56f25f14a7a79edcc4639a5a5fb99fa2e69db49de5be6d619cb5cd67c03ce04f103d735eee4d3f77595f1e5

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qnhls4jn.pp1.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\INetC.dll

            Filesize

            25KB

            MD5

            40d7eca32b2f4d29db98715dd45bfac5

            SHA1

            124df3f617f562e46095776454e1c0c7bb791cc7

            SHA256

            85e03805f90f72257dd41bfdaa186237218bbb0ec410ad3b6576a88ea11dccb9

            SHA512

            5fd4f516ce23fb7e705e150d5c1c93fc7133694ba495fb73101674a528883a013a34ab258083aa7ce6072973b067a605158316a4c9159c1b4d765761f91c513d

          • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe

            Filesize

            382KB

            MD5

            8fbe5b7788a18d3f8fb37e9519c39dbe

            SHA1

            b23caadc5c166656d28c78130287995f211bfa17

            SHA256

            d2db976270a768660dcffa0aface9af049423d20ee55a71fe02058ae23250696

            SHA512

            d8300db7bf4eff2371fd347c57ba99498dc78fa0c4b87a390a2ac2d2f6db0dadf423f19e1804f46b5c36b32c0457835fa4a3ddb8f7645468f70eaf904c73b598

          • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\Nik_Collection_6_byDxO.exe

            Filesize

            402KB

            MD5

            0ef2aedf23da7e73b1351756d1757f31

            SHA1

            7d2f6e09204d35821b0366c3ee9b1fa25d121404

            SHA256

            a7f766f93f102b8229842779c18dd29cabd62550a501caa098c6274dfedb5bb9

            SHA512

            6eaa4ca6d099ef9a819a402b268700a28c8e7d2cce5a62bbefafa4cfdcd37b98c194b0aa0a7ee0359138733c491a421af36ac9e9021529179f3e246d652434a3

          • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\launchobfc.ps1

            Filesize

            42KB

            MD5

            8940078f548d88e427a8101b8c12d31c

            SHA1

            280a69956dcf98b77e19facae6a4c51b0c9d230c

            SHA256

            af168e6f661f870326af7f5c46ac34f05606e527c57215a2f262d350040f413f

            SHA512

            3f35a101c2e1884d3422eb079e3608b2fcd81bc6cad500e120673701da135c1ea3b11a9f3a38f9790638b2fc220834663535c22a6d99043bc14213f5c40fb2a9

          • C:\Users\Admin\AppData\Local\Temp\nsnA682.tmp\nsExec.dll

            Filesize

            7KB

            MD5

            b4579bc396ace8cafd9e825ff63fe244

            SHA1

            32a87ed28a510e3b3c06a451d1f3d0ba9faf8d9c

            SHA256

            01e72332362345c415a7edcb366d6a1b52be9ac6e946fb9da49785c140ba1a4b

            SHA512

            3a76e0e259a0ca12275fed922ce6e01bdfd9e33ba85973e80101b8025ef9243f5e32461a113bbcc6aa75e40894bb5d3a42d6b21045517b6b3cf12d76b4cfa36a

          • C:\Users\Admin\AppData\Roaming\gpg\gpg.exe

            Filesize

            76KB

            MD5

            c9ebceb44f791320767716603d70469a

            SHA1

            4e7c65a0c5f1a5cf1737d130db195823eb3db32c

            SHA256

            7c3cc6a6ec845ec900ee2cf59aa8651c3633da654fa4076713dcb987fd76087a

            SHA512

            6cfc25ab9ab2dfae864860e780344362530049b7bf70954907acdd7b5632f055dfa83785a48109d61cd698237db289901936c06e342a149fe0ccdcbb14714d42

          • C:\Users\Admin\AppData\Roaming\gpg\gpg.exe

            Filesize

            126KB

            MD5

            4f1ba1c6d299aba049d7027a42187348

            SHA1

            21dbe2d7b0431fba2ed6ea68b4d5d0c806212b79

            SHA256

            67f84b1810bd727bc749b24b09d29a22145d417b362d42b88d99694292751c37

            SHA512

            70b955deda8f2766b4ed3d681a8ef169a139c8eaac50ff32e88f40374133c9ac7dc3981a1f78e770cec99b887f7b3e75fd6c7319f314b0b19e6cdfd9c97e2cd6

          • C:\Users\Admin\AppData\Roaming\gpg\libassuan-0.dll

            Filesize

            137KB

            MD5

            0e83f710d3384eedb13501db2f07ed66

            SHA1

            1ceb2fa20d83e073ba6e84a54bc345c8c70e50dc

            SHA256

            71a44984a4f320ae342cb9464adbb40f19b2a5fc97c938d7b08433f72d34c081

            SHA512

            0047d614c477d8b4e72d176ced9bcbf20b1162ed167e8c50467a9f43e24fcdfe5229451908a62864c0c7299a0664013bf33fa73cfb67453014491de3c6161d79

          • C:\Users\Admin\AppData\Roaming\gpg\libassuan-0.dll

            Filesize

            112KB

            MD5

            535f81b2f0012258d888812b2615c38e

            SHA1

            53416291f4f8f3661c2daf380b63b18a46d5d865

            SHA256

            92ee2648e126be3ae166a099a96075b7ffc87ac7f09e133ac3699b8188fc3b30

            SHA512

            25370dfe0c9921fa37933f4331596b2d067b11885f4446ed4707db55c710582b6983478410b3a14b1d36921b1c64604d3eb8c9aba8e7cefc2cd07702e29eec80

          • C:\Users\Admin\AppData\Roaming\gpg\libgcrypt-20.dll

            Filesize

            82KB

            MD5

            6072f6dda5e39ee439551404506d7758

            SHA1

            4939e6af0399de841b7cf3826fcec4102df5e7a6

            SHA256

            64dbac7c67070496fdf38dd250e2bc835705d925e58dadc3b800e8ad54e9145a

            SHA512

            363fbcf78072a12f29bc915f9099e6a05f9495760924af97af0035612eb39a52c40a8fada174c4a9657a38bdfb6c2b145e3d47acd13e7382d1ba18308c0da81a

          • C:\Users\Admin\AppData\Roaming\gpg\libgcrypt-20.dll

            Filesize

            242KB

            MD5

            2715dd6a18d326902448ade2d2792137

            SHA1

            d2235be2bc9e23f60f3a74ed2c679acd1d906b12

            SHA256

            878abc24621811d907e41cf36ba3b22fdcb462b2c99f05354ad9c140496ca396

            SHA512

            90e6c6cd099c26bcc2a860a4a9c1ec167c6850eefcb690034fc4b4223e3896dd0ed69cb48ba6d9b5a06feb6afb8ac959f9e23f27e6a9e62e68370567e6ea01e4

          • C:\Users\Admin\AppData\Roaming\gpg\libgpg-error-0.dll

            Filesize

            115KB

            MD5

            d12db7981fea6dcb64fa2d88ad4f629f

            SHA1

            dbc62d0685e52b010f0fdda693c987599656850c

            SHA256

            b266a192f68b2b6e282b2b38d1dde502cfc4a31091045a83ecf57f774f8796bf

            SHA512

            4f5397dbda6d2c3cc1a8f895dfbfc0bd89f934e39c01ea1a83f467d77f07deda7db4f449f47cf948a89f920e9169d2875504e2ef589f8574e914865de81ab189

          • C:\Users\Admin\AppData\Roaming\gpg\libgpg-error-0.dll

            Filesize

            116KB

            MD5

            b6fe849c4710281d3bdfcb16c9b651c0

            SHA1

            2e7ef6c9e0a86352318dd84db655a0e3199df55b

            SHA256

            bd32b5163c34530875eb5114f6560f072a4b1d808a937cd1e53069d1adce8f61

            SHA512

            66a85adcb016569259069f3cef4ce5dd70c0260db9850d638f2e85527450d330c827f59ba5a20b24a115547a4cb2007d9ca2aa7cb7fe8d2938d3fa76120dbaad

          • C:\Users\Admin\AppData\Roaming\gpg\libnpth-0.dll

            Filesize

            40KB

            MD5

            b7b148054a2818699d93f96139b4d0d0

            SHA1

            0a5187b37bd84c19a7d2d84f328fa0adbc75123c

            SHA256

            25fb8e6bb4ebd62bfa478691261ea2e9486020ef52084dad0fc5ea417338d915

            SHA512

            4f9938a2fb9f6c81cf0dc5d98ecda955e101b5fd52cc43fd58f0072f5ed914c0ef966cd0666c3bcc32f70d52847a5caedea40de86db28c94c8ebd35b366552c1

          • C:\Users\Admin\AppData\Roaming\gpg\libsqlite3-0.dll

            Filesize

            70KB

            MD5

            90f87071387393e297e53c32872a5cab

            SHA1

            b262579be1a7646eb8b3069a79c8a73e6e4487d3

            SHA256

            b5465e53742910bc51f02474427d87689b3f957281ca029ba9f9e2c113c8b48c

            SHA512

            303751f759a5d8485dfb0c66a02987163be339e6fa6f23247ca1690f599ff4bd64868b42853d0e9eaca56431c7f2c747901e634ef8fe7b7471d3418eec950723

          • C:\Users\Admin\AppData\Roaming\gpg\libsqlite3-0.dll

            Filesize

            155KB

            MD5

            0078baab571c0bad437a85be98d2a900

            SHA1

            3035e6bda0555e5c714b8706d6af777431e0d3ba

            SHA256

            7bf4f69cbe49a2b9b3a5f6087544d25c544211b8391595e90094f7f624b70b44

            SHA512

            ae3a30c3796ab9dee1052d7c422d2bfba1eba98a89d8ff522540a169cf8acf8d55166032e7706c626f4ad00f76787595799f741f77b50ba4e400082ac5547d0b

          • C:\Users\Admin\AppData\Roaming\gpg\zlib1.dll

            Filesize

            141KB

            MD5

            8f4cdaed2399204619310cd76fd11056

            SHA1

            0f06ef5acde4f1e99a12cfc8489c1163dba910d1

            SHA256

            df14c4dcb9793a1298c3ef531299479c8bea32a9e8124355e6d3ba6b15416213

            SHA512

            3d1e0453f10bece7b65fee3806bce9e36e2c526daa72d66774ed47684a591a978a80894b1643709e76db0adcf6f2dca189aa6413786a9b70c742ceaeec5b80dc

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\BootstrapperCore.config

            Filesize

            783B

            MD5

            c043d481385f83386854384432962e57

            SHA1

            b177e706d8a0f303fb9542513a20733226011923

            SHA256

            7b1c8aa14b7ec8ca52a2b7b92ce740a8dba8882b1e8754efb20ab3c475908425

            SHA512

            c7290321b6bd86a06ddee9781f4db0b0673c39ae84af232f794d01aab842a06227d9fa2cd67d858755c6ab3643ca46cf8353fa66230401758c650557bd28750d

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\BootstrapperCore.dll

            Filesize

            87KB

            MD5

            b0d10a2a622a322788780e7a3cbb85f3

            SHA1

            04d90b16fa7b47a545c1133d5c0ca9e490f54633

            SHA256

            f2c2b3ce2df70a3206f3111391ffc7b791b32505fa97aef22c0c2dbf6f3b0426

            SHA512

            62b0aa09234067e67969c5f785736d92cd7907f1f680a07f6b44a1caf43bfeb2df96f29034016f3345c4580c6c9bc1b04bea932d06e53621da4fcf7b8c0a489f

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\InstallerUI.dll

            Filesize

            309KB

            MD5

            704c6c1814a59d933cbf0fa29ff24be4

            SHA1

            ba6bddaeeaa510f7eff2ea3d75df639eb13a7dc6

            SHA256

            f6e6044412f7f6586b82f6700d53ece6b5c157ce8ce96670ce8d15eed30bd68c

            SHA512

            287985e5d140f6c7fa8a562ef2e534bbfb0455f49742fdde05dc93951ba7fc03756d0d4fd7d63514d0c75bbbc15b6eac96a05392404d7b99928069e26d57184d

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\InstallerUI.dll

            Filesize

            377KB

            MD5

            1b17d4ac8f27ebc51a89501c1ebbb377

            SHA1

            3ece425c7eb8ef67b1550bfcf4dafd5f3d8fc639

            SHA256

            4b58dad2a4c8ef2a769ccbe9a46c8e7b38b96774f9787afbc21978a49653622d

            SHA512

            f59c573ea7c523cd202cbe129779b37439a0c5f8bcbbc339b60173257d80a91224a8aca0e728abc1fb41e7fcb24d4f51028c5e7a0b4af00dfaf063bc45374f80

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\en-US\InstallerUI.resources.dll

            Filesize

            11KB

            MD5

            b0db3c969b35f84bf483e6a447fc6f76

            SHA1

            ba99547ad6479b9ad62a5d84443d2853fa0a3f3a

            SHA256

            0ab8533abad408ddfb37f7dde7a960a9b26171b9a4870017086f3b93efd605b1

            SHA512

            1df1528b6e0cba075014db056aa79e8a969e31ff959ea3426b03077b74f54e2520e97d667687f25ca9dfb349054a3234c17cb1e58343c916a8471d2a20529133

          • C:\Windows\Temp\{099DADC5-C8C2-436D-B392-BC7A30E08E2A}\.ba\mbahost.dll

            Filesize

            119KB

            MD5

            c59832217903ce88793a6c40888e3cae

            SHA1

            6d9facabf41dcf53281897764d467696780623b8

            SHA256

            9dfa1bc5d2ab4c652304976978749141b8c312784b05cb577f338a0aa91330db

            SHA512

            1b1f4cb2e3fa57cb481e28a967b19a6fefa74f3c77a3f3214a6b09e11ceb20ae428d036929f000710b4eb24a2c57d5d7dfe39661d5a1f48ee69a02d83381d1a9

          • C:\Windows\Temp\{CDF7E643-BCD1-4BAD-AC25-2C7A9976D3B2}\.cr\Nik_Collection_6_byDxO.exe

            Filesize

            428KB

            MD5

            8278d7ba942bff8aa5c2eaaa73e33eba

            SHA1

            08e7a74e47aa6015a3d49e22829c9c9bdf2a867f

            SHA256

            adac24c10332fe765123935c40a7df3e7ee05cb378928ffc5bc3c3852d6debeb

            SHA512

            13aab2fe7e9164d30747a075454b18aa196bc8b1aeba353e308f414e2cf351b668b8a410b8c5bc3be10461075c98675a8badb38c597b9b0401dec313a726f30e

          • C:\Windows\Temp\{CDF7E643-BCD1-4BAD-AC25-2C7A9976D3B2}\.cr\Nik_Collection_6_byDxO.exe

            Filesize

            476KB

            MD5

            d4b077076b196e86319c1ed43ad089d3

            SHA1

            f08b341863388a7aeb51dd885e0046d2eeaf66e9

            SHA256

            8145d04b2d7713936efdaeda89be03f512e0efe98c9e382330a0d0d86b3b6e47

            SHA512

            25e8e716e3baf3b269f11ce1fd6a145e68629bad30995c3d39550ad35b3fd495f054ef6c2c005871aee4c8b38c0d7f677ad018fca605092b32505181958f2668

          • memory/2312-153-0x0000000006A70000-0x0000000006A92000-memory.dmp

            Filesize

            136KB

          • memory/2312-176-0x00000000071B0000-0x00000000071CA000-memory.dmp

            Filesize

            104KB

          • memory/2312-133-0x0000000004670000-0x0000000004680000-memory.dmp

            Filesize

            64KB

          • memory/2312-145-0x00000000055C0000-0x0000000005626000-memory.dmp

            Filesize

            408KB

          • memory/2312-210-0x0000000071A40000-0x00000000721F0000-memory.dmp

            Filesize

            7.7MB

          • memory/2312-143-0x0000000004670000-0x0000000004680000-memory.dmp

            Filesize

            64KB

          • memory/2312-146-0x0000000005690000-0x00000000059E4000-memory.dmp

            Filesize

            3.3MB

          • memory/2312-131-0x0000000071A40000-0x00000000721F0000-memory.dmp

            Filesize

            7.7MB

          • memory/2312-147-0x0000000005A90000-0x0000000005AAE000-memory.dmp

            Filesize

            120KB

          • memory/2312-132-0x00000000053E0000-0x0000000005446000-memory.dmp

            Filesize

            408KB

          • memory/2312-148-0x0000000005B30000-0x0000000005B7C000-memory.dmp

            Filesize

            304KB

          • memory/2312-130-0x0000000004B00000-0x0000000004B22000-memory.dmp

            Filesize

            136KB

          • memory/2312-151-0x0000000005FE0000-0x0000000005FFA000-memory.dmp

            Filesize

            104KB

          • memory/2312-150-0x0000000007270000-0x00000000078EA000-memory.dmp

            Filesize

            6.5MB

          • memory/2312-129-0x0000000004CB0000-0x00000000052D8000-memory.dmp

            Filesize

            6.2MB

          • memory/2312-152-0x0000000006AE0000-0x0000000006B76000-memory.dmp

            Filesize

            600KB

          • memory/2312-154-0x0000000007EA0000-0x0000000008444000-memory.dmp

            Filesize

            5.6MB

          • memory/2312-159-0x000000006A550000-0x000000006A8A4000-memory.dmp

            Filesize

            3.3MB

          • memory/2312-127-0x00000000044C0000-0x00000000044F6000-memory.dmp

            Filesize

            216KB

          • memory/2312-171-0x0000000006EC0000-0x0000000006F63000-memory.dmp

            Filesize

            652KB

          • memory/2312-172-0x0000000006FC0000-0x0000000006FCA000-memory.dmp

            Filesize

            40KB

          • memory/2312-170-0x0000000006E50000-0x0000000006E6E000-memory.dmp

            Filesize

            120KB

          • memory/2312-158-0x000000006A500000-0x000000006A54C000-memory.dmp

            Filesize

            304KB

          • memory/2312-157-0x0000000006E70000-0x0000000006EA2000-memory.dmp

            Filesize

            200KB

          • memory/2312-173-0x0000000007110000-0x0000000007121000-memory.dmp

            Filesize

            68KB

          • memory/2312-156-0x000000007F1D0000-0x000000007F1E0000-memory.dmp

            Filesize

            64KB

          • memory/2312-175-0x0000000007170000-0x0000000007184000-memory.dmp

            Filesize

            80KB

          • memory/2312-174-0x0000000007160000-0x000000000716E000-memory.dmp

            Filesize

            56KB

          • memory/2312-177-0x00000000071A0000-0x00000000071A8000-memory.dmp

            Filesize

            32KB

          • memory/2600-206-0x0000000063080000-0x00000000630A9000-memory.dmp

            Filesize

            164KB

          • memory/2600-200-0x0000000000400000-0x000000000054C000-memory.dmp

            Filesize

            1.3MB

          • memory/2600-201-0x00000000655C0000-0x0000000065709000-memory.dmp

            Filesize

            1.3MB

          • memory/2600-202-0x0000000065A80000-0x0000000065AAA000-memory.dmp

            Filesize

            168KB

          • memory/2600-203-0x000000006B480000-0x000000006B4C1000-memory.dmp

            Filesize

            260KB

          • memory/2600-204-0x000000006A800000-0x000000006A80F000-memory.dmp

            Filesize

            60KB

          • memory/2600-205-0x0000000066580000-0x00000000666AA000-memory.dmp

            Filesize

            1.2MB

          • memory/5044-122-0x000000000BA40000-0x000000000BA48000-memory.dmp

            Filesize

            32KB

          • memory/5044-178-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-118-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-120-0x000000000B220000-0x000000000B258000-memory.dmp

            Filesize

            224KB

          • memory/5044-144-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-128-0x0000000071A40000-0x00000000721F0000-memory.dmp

            Filesize

            7.7MB

          • memory/5044-165-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-180-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-179-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-121-0x000000000B200000-0x000000000B20E000-memory.dmp

            Filesize

            56KB

          • memory/5044-155-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-119-0x000000000B8D0000-0x000000000B8D8000-memory.dmp

            Filesize

            32KB

          • memory/5044-116-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-115-0x00000000047D0000-0x00000000047DA000-memory.dmp

            Filesize

            40KB

          • memory/5044-110-0x0000000006DC0000-0x0000000006FC8000-memory.dmp

            Filesize

            2.0MB

          • memory/5044-104-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-102-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-97-0x00000000038E0000-0x00000000038F8000-memory.dmp

            Filesize

            96KB

          • memory/5044-101-0x00000000047E0000-0x00000000047F0000-memory.dmp

            Filesize

            64KB

          • memory/5044-100-0x0000000071A40000-0x00000000721F0000-memory.dmp

            Filesize

            7.7MB