Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 15:41

General

  • Target

    setup_installer.exe

  • Size

    1.9MB

  • MD5

    bcd82f6defede426e64ca33056f80635

  • SHA1

    21016511704cf6454e56aa36de55c8f630658168

  • SHA256

    4c979260a100193bf14d3eb349affcaf52cf60b7208575ea04cc024c10a168dd

  • SHA512

    86e5bc91308d726ac0c2075674e4550eb4b98cbcd2db5d38294707adb8a33d201c6615a36663e0531ee9573333301bb50077cea11738c1e5a98d885a84271fb1

  • SSDEEP

    49152:xcBWEwJ84vLRaBtIl9mVJlZkqFBgKWTO762mRDO4tz:xkCvLUBsgNkC/WTl2mRDOcz

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

40

Botnet

706

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:964
    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 02e5560d6466.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5036
        • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\02e5560d6466.exe
          02e5560d6466.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: EnumeratesProcesses
          PID:2496
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 3d8ebf6fc1e71737.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1140
        • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\3d8ebf6fc1e71737.exe
          3d8ebf6fc1e71737.exe
          4⤵
          • Executes dropped EXE
          PID:3904
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 824
            5⤵
            • Program crash
            PID:2524
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 832
            5⤵
            • Program crash
            PID:2968
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 832
            5⤵
            • Program crash
            PID:4540
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 916
            5⤵
            • Program crash
            PID:1168
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1040
            5⤵
            • Program crash
            PID:4996
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1040
            5⤵
            • Program crash
            PID:4556
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1100
            5⤵
            • Program crash
            PID:5020
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1576
            5⤵
            • Program crash
            PID:212
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c db071188abeb475.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\db071188abeb475.exe
          db071188abeb475.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3648
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c94ffb5d331eb3.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 560
        3⤵
        • Program crash
        PID:4280
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 7f67b7bd4.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4312
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 446e50fbdfb2.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3800
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c d38e3c323fbd6c1.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4044
  • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\7f67b7bd4.exe
    7f67b7bd4.exe
    1⤵
    • Executes dropped EXE
    PID:1580
  • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\c94ffb5d331eb3.exe
    c94ffb5d331eb3.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1444
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4468 -ip 4468
    1⤵
      PID:4732
    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\446e50fbdfb2.exe
      446e50fbdfb2.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\446e50fbdfb2.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\446e50fbdfb2.exe" -a
        2⤵
        • Executes dropped EXE
        PID:2300
    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\d38e3c323fbd6c1.exe
      d38e3c323fbd6c1.exe
      1⤵
      • Executes dropped EXE
      PID:4404
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3904 -ip 3904
      1⤵
        PID:2072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3904 -ip 3904
        1⤵
          PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3904 -ip 3904
          1⤵
            PID:1008
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3904 -ip 3904
            1⤵
              PID:3536
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3904 -ip 3904
              1⤵
                PID:1672
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3904 -ip 3904
                1⤵
                  PID:4144
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3904 -ip 3904
                  1⤵
                    PID:4948
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3904 -ip 3904
                    1⤵
                      PID:116

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\02e5560d6466.exe

                      Filesize

                      177KB

                      MD5

                      90943d82566e56216ca9a90d907a834d

                      SHA1

                      97795463ddff0d5e40e21903fbf8368c203d7efd

                      SHA256

                      1c79d0f64c5a1a2ad6dba77b6a735e7e9be229533b347f20b7448b28a309ada7

                      SHA512

                      a74cad08f2a8716350875eb0603cd4b3d37eda2d13727c6e21972c1d2e698a2a0ec25fb46d5e0a05b1b0d6d69d51a6eb1da605612521ee45007ee67f3d983224

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\02e5560d6466.exe

                      Filesize

                      82KB

                      MD5

                      1a0a498a9c148c7ea551a1dc716d31e9

                      SHA1

                      c257f677eb8654f1e27192dd2cb2214dd792649a

                      SHA256

                      b9b62da8a372e187eb05c5eb6b49ecad1ebd4e3a090a7cb17b93dbf5432158f2

                      SHA512

                      7b3ec81ecc4808db0c9d4a96b37e609dfb16700deef43d21993266c2e6284c5e290162aefbf5ecd5e209d40d7e882a3361d6a0188800da0eba00eb4f51c0f3bc

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\3d8ebf6fc1e71737.exe

                      Filesize

                      543KB

                      MD5

                      0afad9ff556dea967ba3972823dc5053

                      SHA1

                      ad5aa87d13102a4ce76d30f52f6414593107d420

                      SHA256

                      ff630dc798021ce5f290190815154404b1751bb6daf738adc2f5a7584c007850

                      SHA512

                      e5cd97c14024c53ff0d6f3a97b7764ee7a47caa8f872520957979bbfbeb795f759fef29f02d2ead5b9217275bd0336013a9b39b2303b89253ff2db6ea12d9f41

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\446e50fbdfb2.exe

                      Filesize

                      56KB

                      MD5

                      c0d18a829910babf695b4fdaea21a047

                      SHA1

                      236a19746fe1a1063ebe077c8a0553566f92ef0f

                      SHA256

                      78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                      SHA512

                      cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\7f67b7bd4.exe

                      Filesize

                      241KB

                      MD5

                      5866ab1fae31526ed81bfbdf95220190

                      SHA1

                      75a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f

                      SHA256

                      9e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e

                      SHA512

                      8d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\c94ffb5d331eb3.exe

                      Filesize

                      8KB

                      MD5

                      bf78562d81291113d7664f8b10b38019

                      SHA1

                      7c1e6b7a9abcf1f96eb79ffdc7ea1831ad7f7889

                      SHA256

                      aa18f5ee23ba9686522956203b349217aebdc2c921471db1a89d4bc16d699251

                      SHA512

                      c94ac906daf9ca91983c58d353984b1b84334d7fa57581b32fd029b0db582ca00ef67f5ef0a1fc0fd624aa30d220503e5f1b70617a303712b2f5886ab5672f36

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\d38e3c323fbd6c1.exe

                      Filesize

                      630KB

                      MD5

                      c465c7eb89a23837379e37046ec398e6

                      SHA1

                      00f6f8b48667dfe44d354953158c6915efd6d260

                      SHA256

                      430ed661f3be61265c7b657a641032b28c5a38495e6b37149b93428b9efa48a9

                      SHA512

                      9281e662c5612c104804c12ff79b0d953eb60d2d52103656bb9f9d0d523d12280a624f8199bae414c40481839e663dd399f5fbeed1489f70a81657324b536b97

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\d38e3c323fbd6c1.exe

                      Filesize

                      254KB

                      MD5

                      cc195c0383c4f95c56083b50da62e60b

                      SHA1

                      4e3851fb690bb9ed1481354d390b89101423f212

                      SHA256

                      0383cb7d405d07adc575e53ff54621a60e75046224b1e3ded81d71a562d870ce

                      SHA512

                      bd1d6c2c9c26e7e5be1bca1cf7ebc819a05ecd7ce8ce965f22575c4034f501931f23b1580500a7dbc5df231ac4af58362cab3a18fd0c601ffb6081ae54775828

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\db071188abeb475.exe

                      Filesize

                      165KB

                      MD5

                      5f6f8e5a5e6ba53f8f785b575573451d

                      SHA1

                      97b99adefc3ecca6be60c882b563853091f586ef

                      SHA256

                      6f8a7657b62f79b148d6b930641ef70eb0d8bc909377439819a0db601ca1c0d8

                      SHA512

                      ff6491641fc985bd03421e8565b36322017da9a647015bcc399b3ca73c675749d3e22eee5e437283b22b6a05240f6bd1bf8eddc0ef3be233fd8c40fe82fead05

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libcurl.dll

                      Filesize

                      218KB

                      MD5

                      d09be1f47fd6b827c81a4812b4f7296f

                      SHA1

                      028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                      SHA256

                      0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                      SHA512

                      857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libcurlpp.dll

                      Filesize

                      54KB

                      MD5

                      e6e578373c2e416289a8da55f1dc5e8e

                      SHA1

                      b601a229b66ec3d19c2369b36216c6f6eb1c063e

                      SHA256

                      43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                      SHA512

                      9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libgcc_s_dw2-1.dll

                      Filesize

                      113KB

                      MD5

                      9aec524b616618b0d3d00b27b6f51da1

                      SHA1

                      64264300801a353db324d11738ffed876550e1d3

                      SHA256

                      59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                      SHA512

                      0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libstdc++-6.dll

                      Filesize

                      550KB

                      MD5

                      e5c5e26148f776745f9d0ea70a25ad05

                      SHA1

                      a830543b134df14d276e7148a977287c2b2b8fb1

                      SHA256

                      e599fe2d3a57b520c428fd8ac9eb1ed4acfe95c47159155d0ec0445edec3c1d4

                      SHA512

                      b334629879ae0ca83c25a9efeb3cbc88877e961ab8b92e68951b86c915ae7700d82e390feb87f83a366675c6b445ac9d3afe3bda58ed92db1ffd2f4565a76552

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libstdc++-6.dll

                      Filesize

                      623KB

                      MD5

                      96fcc42593b76a567706fab7a98eceb5

                      SHA1

                      e431642af71e5caca88d0c3b4d1d7219d9ea1924

                      SHA256

                      2ab7ce5e82fe6057706ff2d9b67b907ada628b3908b2952b6410257fd0d2387d

                      SHA512

                      60aadbf512bac8bc3a55e613f49bcae1518997d7cbdd746f2c4ce8dcace1dcfaff2b8e42d86290c44c80a74a21c3b2ee48d00f045250488bf9c343928006cc44

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\libwinpthread-1.dll

                      Filesize

                      69KB

                      MD5

                      1e0d62c34ff2e649ebc5c372065732ee

                      SHA1

                      fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                      SHA256

                      509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                      SHA512

                      3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\setup_install.exe

                      Filesize

                      3.1MB

                      MD5

                      5b6b088be9314d3b292523baf8812d5d

                      SHA1

                      273237747e8616b41d6564977ece9cfecaf5dda5

                      SHA256

                      1a656a932f7de1c75dd4f04d4d3f0b137dfd3510b671bf3ef46405c91e92b463

                      SHA512

                      b5a7de666de1685791182b8cbad93140190f17e84f31abac832f690c41c6bda214aa6eda9fe3f4e28ca00d95b370c1b1b4d5409c902ec0ae120fa20f23b64b04

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\setup_install.exe

                      Filesize

                      1.1MB

                      MD5

                      0fb0981196c3ea5ec0aae21c74dcfe2b

                      SHA1

                      1660a9fccef3fb1aa386a9baec803e69b40756cb

                      SHA256

                      80a8f95a34c6cddb833b84df1bea3ddf1298a3738a3b84ef02812d7d5e2f3dec

                      SHA512

                      e38c7ba8417944d4da07edc6aa6bfd6322899b82d1438a354e245074436236ed804ca8a1f76f98a1afa2c931a7726085680466fec7b18a3a1ef6ab983fa5b821

                    • C:\Users\Admin\AppData\Local\Temp\7zS4C36E947\setup_install.exe

                      Filesize

                      1.4MB

                      MD5

                      847a4356737535e674bb3338c96e31cd

                      SHA1

                      899062b67de0986c01b245edf1e06dde129c41fb

                      SHA256

                      e6219a2d8b26bfd307ff8206405a19c4488a4b1224114d6398de476abcd7fb2d

                      SHA512

                      53a6e8607b4abed8e2ff3082ad2f4d4e859512c3373e5f5398e558479d77961aa27374d621c7f279f51d33e8ef0981c51e2a7ca000861514cca87335300116db

                    • memory/1444-80-0x0000000000AB0000-0x0000000000AB8000-memory.dmp

                      Filesize

                      32KB

                    • memory/1444-84-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1444-93-0x00007FF8F7270000-0x00007FF8F7D31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1444-106-0x000000001B7A0000-0x000000001B7B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1444-107-0x00007FF8F7270000-0x00007FF8F7D31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/2496-88-0x0000000002EF0000-0x0000000002FF0000-memory.dmp

                      Filesize

                      1024KB

                    • memory/2496-92-0x0000000000400000-0x0000000002C62000-memory.dmp

                      Filesize

                      40.4MB

                    • memory/2496-89-0x0000000002DC0000-0x0000000002DC9000-memory.dmp

                      Filesize

                      36KB

                    • memory/3648-87-0x0000000000E50000-0x0000000000E72000-memory.dmp

                      Filesize

                      136KB

                    • memory/3648-102-0x0000000002700000-0x0000000002710000-memory.dmp

                      Filesize

                      64KB

                    • memory/3648-103-0x00007FF8F7270000-0x00007FF8F7D31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3648-79-0x0000000000670000-0x00000000006A0000-memory.dmp

                      Filesize

                      192KB

                    • memory/3648-82-0x00007FF8F7270000-0x00007FF8F7D31000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/3648-83-0x0000000000E40000-0x0000000000E46000-memory.dmp

                      Filesize

                      24KB

                    • memory/3648-90-0x0000000000E70000-0x0000000000E76000-memory.dmp

                      Filesize

                      24KB

                    • memory/3904-98-0x0000000000400000-0x0000000002CBE000-memory.dmp

                      Filesize

                      40.7MB

                    • memory/3904-85-0x0000000002EB0000-0x0000000002FB0000-memory.dmp

                      Filesize

                      1024KB

                    • memory/3904-86-0x00000000048C0000-0x000000000495D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4468-41-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-95-0x0000000064940000-0x0000000064959000-memory.dmp

                      Filesize

                      100KB

                    • memory/4468-43-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB

                    • memory/4468-39-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-38-0x0000000064940000-0x0000000064959000-memory.dmp

                      Filesize

                      100KB

                    • memory/4468-40-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-37-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-35-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/4468-94-0x0000000000400000-0x00000000006E2000-memory.dmp

                      Filesize

                      2.9MB

                    • memory/4468-42-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB

                    • memory/4468-96-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB

                    • memory/4468-100-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-99-0x000000006EB40000-0x000000006EB63000-memory.dmp

                      Filesize

                      140KB

                    • memory/4468-36-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                      Filesize

                      1.5MB

                    • memory/4468-34-0x0000000001090000-0x000000000111F000-memory.dmp

                      Filesize

                      572KB

                    • memory/4468-33-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/4468-97-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/4468-32-0x000000006B440000-0x000000006B4CF000-memory.dmp

                      Filesize

                      572KB

                    • memory/4468-30-0x000000006B280000-0x000000006B2A6000-memory.dmp

                      Filesize

                      152KB