Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2024 00:29

General

  • Target

    78cc2004a61a5f5bd968bc7449a6e41d.exe

  • Size

    1.5MB

  • MD5

    78cc2004a61a5f5bd968bc7449a6e41d

  • SHA1

    5d68410afdd470c5d076b6de46c3b2eeee953be1

  • SHA256

    c82a55fdd3caeb95db17754e3ba270ec93a7eb3c9997f9f9c6f02de0e17bacec

  • SHA512

    c7cb55dcc7344b3f00f93e49eb49712bb85cb7bc4d1bc85f81b3cf1358cec9375e427fc7403c9eeb0eb715a7c4b0a08b423759d76dd12f14ab6f38c96fdf5bad

  • SSDEEP

    49152:EgSqM6bpcBJT+tFgYlGiFKtFHbo1kEJwQ/oW1vAaK:Jq7v7FdEJw8oaoJ

Malware Config

Extracted

Family

nullmixer

C2

http://marisana.xyz/

Extracted

Family

smokeloader

Botnet

pub6

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • ASPack v2.12-2.42 9 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 27 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78cc2004a61a5f5bd968bc7449a6e41d.exe
    "C:\Users\Admin\AppData\Local\Temp\78cc2004a61a5f5bd968bc7449a6e41d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_1.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1980
          • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.exe
            karotima_1.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            PID:2928
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c karotima_2.exe
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1716
          • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe
            karotima_2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            PID:2892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 372
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.exe

    Filesize

    103KB

    MD5

    c270f730431d9830c9a0664ba0bab58f

    SHA1

    9da1cf6d0b8fc5da99da78e42aa26fdcd82d1dac

    SHA256

    0872368e140020b50476776f3b7eb4d41a286bfcc3e5b74dbb382ea9bd5a0d8d

    SHA512

    9ad3debd5d2dc5d875db352d03f99a18d7a28072f9137416dd43b40ba4427f61d664aed268cac79af1720f817b87b5104385b862c432a5bcc6891f468980f23a

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.txt

    Filesize

    487KB

    MD5

    c8245a879bdb0454b792ea73f958ecb9

    SHA1

    94132abc891c489e5fb8fcb06274871f7322a0b0

    SHA256

    d7d14862b289a2f8ff2dfae7c20cf2d01dfc8d7b4757ed63f8b0e25e5deaeb5f

    SHA512

    7c6b31a34878e7279b32e2ed3ec9373bde77d6b88765b2ccdaa134af0ec0df17305b55bacbf5b83346478c0f73b67b7ae9d53d0a2b13b76c346b95c3fc9acfd4

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe

    Filesize

    242KB

    MD5

    8bc663d55161bc37c90f6e6ca0b8de68

    SHA1

    a16b10a70172f422c6d545f48a9c1a34b68c789b

    SHA256

    85dc9ce7d4f96cfe4cf586fd4d52cfa56b4325e4299b665cfbedc29004318163

    SHA512

    eee380681d8e0bccc8dc8b1c8b082e0c005bb3ce3341168004aeda5ce4dd9a693b78676e494912fb311f01ee7c096dff63aea5eb9076a915e3cb7ed9393ae83b

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.txt

    Filesize

    225KB

    MD5

    d9e45242864328672bc98a77a4dd07c7

    SHA1

    638d73bd07d39e70da6ec76ed67d41aea370b4d3

    SHA256

    a944a588be61ec87255551661820db2151742b4f320abffbe549d9ac1a73035d

    SHA512

    94bc3a384d69479e99c3e99a900d63b0bb338a55bdaf16494651081e3b55746fdffab8188f85d8d62120c08b64bb3371d9b398bb793eb97bdc9b9f3eba4d199b

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\libcurl.dll

    Filesize

    218KB

    MD5

    d09be1f47fd6b827c81a4812b4f7296f

    SHA1

    028ae3596c0790e6d7f9f2f3c8e9591527d267f7

    SHA256

    0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

    SHA512

    857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\libcurlpp.dll

    Filesize

    54KB

    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\libgcc_s_dw2-1.dll

    Filesize

    113KB

    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • C:\Users\Admin\AppData\Local\Temp\7zS8790BD66\libstdc++-6.dll

    Filesize

    436KB

    MD5

    8a1e14d5f9ae48988118a4748edb0439

    SHA1

    1095ee8db7bf3420cab82f3a8f3fa10a9a53d96e

    SHA256

    85ef26acc1be506e65ada5a8bc0688bb3853abcc329747c048ffe04c14215ed9

    SHA512

    757c443dc13dcf2094e7741340c357c6138b91a32148dcd3dc030ef6cd80e1cb174297662a8439ebe90b430c9ad5608df805a86f93a2ace0c0b69a3eb349f301

  • C:\Users\Admin\AppData\Local\Temp\Cab510F.tmp

    Filesize

    49KB

    MD5

    70b43da95addb4da1069d63baff5937d

    SHA1

    9401f5dfab2ef21144c25465d6e9e48a18c789f5

    SHA256

    d39e6e420ff4c205d3be74ac68407e6c8039f2a6f887df05cd325c3dd54bca12

    SHA512

    8ee2d515a41fd69e574d64676bd8d3c87864bde02cb020ec89e601391be423ab9fb0355e1c9d02268fa2e09ab065a072ceb4a0540ce9c726f9eeb84f9e4275c2

  • C:\Users\Admin\AppData\Local\Temp\Tar520B.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Roaming\gbbcrgd

    Filesize

    328KB

    MD5

    6f7f47269f92b58955a6714ddba7fcd4

    SHA1

    e92a5ec35e1900af4849fe54da71abc939b58ab3

    SHA256

    2c7607aeadea3ed5a9c4f6c0f25b097d5219b2ed16697cd5bd06407906098569

    SHA512

    a04a2919ad8a21d994460c73ccd36e1694c101078126e9add60dced76b87efae2eb7f7c71f997779645fbef78c9aff8475943cc8b81e8c2830c90a695c9d4152

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.exe

    Filesize

    127KB

    MD5

    ab924152e34d1b588c5f487314c1112a

    SHA1

    0a27eac79255591d90146a741c8f9b5cd8c1400e

    SHA256

    b05f5283a512a979c4823c34a2b985369d16dd4dcaaac3e4c381257192f55cef

    SHA512

    145c92455a2a3034b89eedfb9d37a5c80332b78344d19987c46ba0edff451c04d9dbdd3441fedcb0be191970fb0b54fe6a0990ca14f06d1e314d424a41317b80

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.exe

    Filesize

    181KB

    MD5

    936602b57714ba1881cf338d75ba774a

    SHA1

    4215923fc84830c21dd1108c09747cfd179b25db

    SHA256

    5cab87cf5b0bc589930e8b0882561d388d83e1ee0e9e7180522819c5f46c4f89

    SHA512

    0f4a1cd61a1905c151113faf07a69de5d2aa5b386e94351ff5d7826a306ed72f6a6bd88bafa11095e2ee5bc62eea257bd5896fdcf34b22a23aa525ef0ed59586

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_1.exe

    Filesize

    136KB

    MD5

    25ea0de97585d764cc1918b500067db6

    SHA1

    eea66587ba7e8f597a9ca4a951b4c63c40e45c89

    SHA256

    f961672f648e151e4588b4cbfecd98aeb1f846c1ae718d420d0068c81a61fc89

    SHA512

    290d7c2be860ef4e00124bbdcca9ce7d57f02d30e66a18a5858fe6caba27ef32a4c4d8051d7db3cb37a4578625e5b15cead817cbeb29991b82eedada8b0a815f

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe

    Filesize

    286KB

    MD5

    04dc0835fcbc436c4b95b0a80ad7c703

    SHA1

    697dbdf11703bf9477a063c423eefc514e2b86d8

    SHA256

    03f1cf94fd1a92b6d024d72531b9e04f31a844d7cd10b95a54cbfea68e661ae1

    SHA512

    13abc418cf65dad058d84abb5f6dd8b19769245d6a5fe08757911eb14ec72f7e80b670c4b042cce9ec781be9c9643dab02260bc5b305554e966d08f3a92b83a1

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe

    Filesize

    235KB

    MD5

    83ca4cf7b4020da1311dd9be36f64a9b

    SHA1

    19694250e22d19b6a44139a91dc501bae623edde

    SHA256

    6e66d597457675b91e89d4285260389bcfcfefe95dbc5a1b2866362ae11c093b

    SHA512

    c39b2ec25ffe60fd539ea432d8aa57a071a8ae07a6d8ddb82a9cd82bc8304df5d6a36fcdcf4545d2356f28bdff93915db9b37da449b1653e549f4a9ada2442ac

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe

    Filesize

    109KB

    MD5

    64615ff3e1fb44441f51f11d1a9275b6

    SHA1

    c688864272e5c563a4c8891b47ed64667d2ad86f

    SHA256

    0e19b76eb77c6ecd4c0ae4c184b54925afebc475b92d328fbf15a1cca8709b44

    SHA512

    d20ae1fc1c947dc3fb92680474796ce1b98eec4d78c6c6d6f2521623dcc085866f5d07c9eefa5998b25dae03fcff70d688bbad4f7a4f55ca6e16bfb1747b8072

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\karotima_2.exe

    Filesize

    204KB

    MD5

    29c088c8c83937a6f06fc72863fbc167

    SHA1

    2cb5fd29b8ca04a60e3f465bd0464195f810b381

    SHA256

    432ac9b2e2b88d8de469309a9c455b7717cd8630b1afe2222fc3094c64f3951c

    SHA512

    b97d215d118497b9636341101dfefac4fd666927ab2fcba00e5f05010e93eeae9bf97ab4ee6fd30ace2f78b324d92daf7ba63d50661624e1d5da23bb67962513

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\libstdc++-6.dll

    Filesize

    385KB

    MD5

    323a42fe8e4f1c92abaf7c3f21fa4e6b

    SHA1

    a2d7e013dc24a8cd746b2d0053386f3f0f6a941a

    SHA256

    c777532396166c062e8b918a96b8c2e968f8fb5ee4c9be06041df448f9dbe328

    SHA512

    9ac22c6cb89646ba2194a92a7125be8840b5ed8267ea82e408956c4039bd8f2daa68df69e232a2a78e2f10583b914d6ee60d2ac749fff2998082229715237cd8

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\libwinpthread-1.dll

    Filesize

    69KB

    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe

    Filesize

    61KB

    MD5

    02c741ea7bd4c39b002c1a79c15f2083

    SHA1

    b8526af8d8838b7a3dd347c82b84a5dfd662b58a

    SHA256

    bc834f3b1519bc273a501f01e46e32cf226ded7f27a52e3cbd20ee072a89457c

    SHA512

    cdbf872c27e8b118ce61a16bf4bed46c130beea847580b0158ceb8dde14c9bd7d7dcdafc2e361fd6de8dd772c132292e7a1b3e2e8154907e774d81361f7d38dd

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe

    Filesize

    64KB

    MD5

    bac1ff68af2b02f38471219ba81e071b

    SHA1

    faa50cd327a34666649b2c7080a4116518fb3ce2

    SHA256

    bdbf8bff08c44eb268a86f965de51f41639436bfef284215524a87e38d97ba58

    SHA512

    76d9399f02b1acf0ec4168dd16b08726f27ccb8d163cee46b5aa990d2e56a7a133a6145d878ec2bc8e92b0edde261f01181e0841a4eb47aba801569782c71978

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe

    Filesize

    152KB

    MD5

    287b8c0210308570e4f02fc2d51fc400

    SHA1

    416037f41db20c3342d6d06de53cccfc24af49c4

    SHA256

    4f87cc94ab456e71526d986a1e0b7d503702f696b6315f0839d97a13fa8fdc9b

    SHA512

    5a31976c1a7d9381b9d182b3bbd3f8759f28f9deb63b9f420f2b1f4373dddb58e42aec17a4d2a50761dd381cf25f401919475568fb83089806d6a8d87485a508

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe

    Filesize

    10KB

    MD5

    2024909f91df0afd82c881040f04f6bc

    SHA1

    8e839301cc53a0061d74e8da0b73a47616e29b60

    SHA256

    06d44c6765298fa642d59c54086c1085b1570908c13f9446bcfc777285642d95

    SHA512

    21dacf127b0778a867b8b8aa998eb6d92e7f9d43a9ed96b919fd6d3477f07b99b00af28c68872031a8d88c129eb96cc398bb8635dacdd9f4eb9ccbd7aa086ef8

  • \Users\Admin\AppData\Local\Temp\7zS8790BD66\setup_install.exe

    Filesize

    287KB

    MD5

    525ac099d70602763bd7f9f9e8518b07

    SHA1

    e963393e9ec19249adea507cd54c731a16227980

    SHA256

    cc78e389c7a8fed598e312f2e150ffb8a99d9bffdfa4982bd59ae6ce7693efbf

    SHA512

    fc4cd5120656fd80f66e689786cbcce1d9259e0bb7b37f653b5e130463f128f38c024b0e84f8561bad48d7b066dd965a9a94a7bbcb0dbecb2bc3468902293d67

  • \Users\Admin\AppData\Local\Temp\CC4F.tmp

    Filesize

    166KB

    MD5

    0f366ac2b6c35a6fc0bc6a80106f9be2

    SHA1

    fa198c83ae04a71fab5795ca07bf5804bd893f30

    SHA256

    39138dfde38ca670750a41752283b037fec0105eb70dfcbd40c3519368dea93c

    SHA512

    34022b9e868eddbbc317d72ec00bf7833a1eb6d31818e1a93272fe95c982e53b6a6ce66b904269610472a73884ca3fd5884081392479e05d565833e41b26ce7c

  • \Users\Admin\AppData\Local\Temp\setup_installer.exe

    Filesize

    1.5MB

    MD5

    c0e6ffa5d96ec511f8fc16576f576d7f

    SHA1

    cf96fcb912c1d7cea6e9840aefcfe2d0f5ad1846

    SHA256

    f93e49425c33932d4adda4e5ff0818a0970280a22883824d806e4cf4f511a82f

    SHA512

    f43d0c695f8be14a6f4758fc7a91e88564e2ce1ac58f964cd4b4528e8bd8541ce6e9e3172b8ee17de3305ac6132e9a67fa6f74532933fc48e13cae62d1bdff23

  • memory/1204-133-0x0000000002A40000-0x0000000002A55000-memory.dmp

    Filesize

    84KB

  • memory/2092-59-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2092-60-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-68-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2092-76-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-75-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-73-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-72-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2092-70-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-67-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2092-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-61-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-142-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2092-139-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2092-74-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-143-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-57-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2092-48-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-45-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2092-39-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2092-140-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2092-141-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2092-138-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2424-31-0x0000000002570000-0x000000000268E000-memory.dmp

    Filesize

    1.1MB

  • memory/2892-124-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2892-137-0x0000000000240000-0x0000000000249000-memory.dmp

    Filesize

    36KB

  • memory/2892-134-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2892-126-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2892-123-0x0000000000560000-0x0000000000660000-memory.dmp

    Filesize

    1024KB