Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 10:12

General

  • Target

    99281465e23f346ffec5c0dd3964a053.exe

  • Size

    2.4MB

  • MD5

    99281465e23f346ffec5c0dd3964a053

  • SHA1

    d40d5f1f00f9ac49762f6d40a1f7e0102f9e2590

  • SHA256

    450b8f11dfa06aee1def7d2b49c29d670406b765e9900efe7d1e8bb1ffff486f

  • SHA512

    70aed0a5252c06afc4bb559a85d52b8836490dbfcb98b0066ac38c5ff68ddb22e9bfe5d4489716693fe7b4a129f493ef5c736db1ee607e76b0f2374c1420a016

  • SSDEEP

    49152:9g//MbAdFB0t7G6GE9DruSaMR/Emz+Q5Zv894VOrB4+L12hKynFoFZvBrWwb1:y3Jz6D9GjUzBE4wiYo4pZvJ1

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

redline

Botnet

pab3

C2

185.215.113.15:61506

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

cryptbot

C2

lysuht78.top

morisc07.top

Attributes
  • payload_url

    http://damysa10.top/download.php?file=lv.exe

Extracted

Family

vidar

Version

40

Botnet

706

C2

https://lenak513.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://aucmoney.com/upload/

http://thegymmum.com/upload/

http://atvcampingtrips.com/upload/

http://kuapakualaman.com/upload/

http://renatazarazua.com/upload/

http://nasufmutlu.com/upload/

rc4.i32
rc4.i32

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\99281465e23f346ffec5c0dd3964a053.exe
    "C:\Users\Admin\AppData\Local\Temp\99281465e23f346ffec5c0dd3964a053.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
            PID:2516
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2136
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Mon03727877c5134.exe
            4⤵
            • Loads dropped DLL
            PID:1716
            • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03727877c5134.exe
              Mon03727877c5134.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2980
              • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03727877c5134.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03727877c5134.exe" -a
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:624
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Mon034208bb682c9a.exe
            4⤵
            • Loads dropped DLL
            PID:2128
            • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon034208bb682c9a.exe
              Mon034208bb682c9a.exe
              5⤵
                PID:1136
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon039408d622242f.exe
              4⤵
              • Loads dropped DLL
              PID:2756
              • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon039408d622242f.exe
                Mon039408d622242f.exe
                5⤵
                • Executes dropped EXE
                PID:2924
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon03bcfa6aac.exe
              4⤵
              • Loads dropped DLL
              PID:2920
              • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03bcfa6aac.exe
                Mon03bcfa6aac.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:3064
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon038dbdaf9a6ac148.exe
              4⤵
              • Loads dropped DLL
              PID:2904
              • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon038dbdaf9a6ac148.exe
                Mon038dbdaf9a6ac148.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1708
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 956
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Program crash
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  PID:1136
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon036765ec49c3.exe
              4⤵
              • Loads dropped DLL
              PID:2936
              • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon036765ec49c3.exe
                Mon036765ec49c3.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:672
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon0335c84809e4.exe
              4⤵
              • Loads dropped DLL
              PID:2948
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Mon03a0dae10d.exe
              4⤵
              • Loads dropped DLL
              PID:2960
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 428
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:2068
      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03a0dae10d.exe
        Mon03a0dae10d.exe
        1⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon0335c84809e4.exe
        Mon0335c84809e4.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of FindShellTrayWindow
        PID:2744

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Credential Access

      Unsecured Credentials

      2
      T1552

      Credentials In Files

      2
      T1552.001

      Discovery

      Query Registry

      4
      T1012

      System Information Discovery

      3
      T1082

      Peripheral Device Discovery

      1
      T1120

      Collection

      Data from Local System

      2
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon0335c84809e4.exe
        Filesize

        558KB

        MD5

        110b3f8d1cebc76a3c0170cbe218fc38

        SHA1

        f05973114d0f3d7918f70c003ce48b476d9aa1a9

        SHA256

        2cb645cb092bfd2dc3847c07e85a6d3129f3fb680f656a850e53bc3ddb571540

        SHA512

        fbffe2ccbedece36856fb7a7323d987fb79f257f92ec734a322af9da6909a3b7aeaf2714fedcdafb2bea53fd4cc0593c9733b73ca2470c5f88d7a0b96e026e70

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon034208bb682c9a.exe
        Filesize

        178KB

        MD5

        aba11960d853e755f03445ef57f5aa75

        SHA1

        a3abfd93f7098be145c44316c9964eedb8b856e1

        SHA256

        31ef5a8dcb3acc8d5ec74b1aecf9508f650a71710d7cfb79b6fff3a9324382b9

        SHA512

        f83e5ed2fc8237dc50c0dada6f449025f5ea593a4edd101a33115cc8a3817c5db554fc2ad2f29a1228fbfb192e812a31a7425102bc60ffa411f72a06d38b1812

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon036765ec49c3.exe
        Filesize

        631KB

        MD5

        94f06bfbb349287c89ccc92ac575123f

        SHA1

        34e36e640492423d55b80bd5ac3ddb77b6b9e87c

        SHA256

        d05cb3a734aaa9d090be20fbaeddf8069a829fa78c44dd8378a2350c1510e1fc

        SHA512

        c8a5362f9a35737ac04b6e0c48371aa60e64adf1157e16191691ac4dccb8dbaac261b516ebb89fc84ba741616ea1ca888a4a180ef2cf89ca04ebdc7768ea0fbb

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03727877c5134.exe
        Filesize

        56KB

        MD5

        c0d18a829910babf695b4fdaea21a047

        SHA1

        236a19746fe1a1063ebe077c8a0553566f92ef0f

        SHA256

        78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

        SHA512

        cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon038dbdaf9a6ac148.exe
        Filesize

        545KB

        MD5

        709c2ff21185c8fe650056769d080e41

        SHA1

        b9181473e226994f153a64681f2083f52292ca2b

        SHA256

        648b336e38d56000fc9765323103ad4b770d0609d04491213f3642da8621917b

        SHA512

        38235ecbba174a1789e658f1ba684d371bda2a3c7b5c2ae0972720251393fd28220d6555858c87701402d0a40adf4c2df583d6c14bbbdf0dfd10bd22f9799b74

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon039408d622242f.exe
        Filesize

        241KB

        MD5

        5866ab1fae31526ed81bfbdf95220190

        SHA1

        75a5e08b3b9ad2dff35dfbbb3ffe8d983c2be25f

        SHA256

        9e1a149370efe9814bf2cbd87acfcfa410d1769efd86a9722da4373d6716d22e

        SHA512

        8d99ab09e84e4ef309da34be94946cbfcffeb1c0ca49e2452deb738d801e551062ebb134f1b99a9baf03003a8e720d525521ce09aeac341d3cba3fcfbc618fb5

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03a0dae10d.exe
        Filesize

        132KB

        MD5

        655e97d4e1039c23a8e266832a0c6bbf

        SHA1

        954769686dbc15c3a218a55cff16d366fe63aecb

        SHA256

        ca9e19b7ca203d5f4f075e9464822cff1f4924ac64f7f7296d4df48b2112c9df

        SHA512

        53d36dd54b2d084178e0e92a3675643c9a3c5cfcb0bdb31d75b5f7f0c8e8ebc065bff4617278e491f126c985d26244da81f3aba5550f6a9f865411d32e8d1b7d

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\Mon03bcfa6aac.exe
        Filesize

        279KB

        MD5

        af23965c3e2673940b70f436bb45f766

        SHA1

        ccc8b03ea8c568f1b333458cff3f156898fc29f7

        SHA256

        e6271d738fc78602abc8916fb4742638b2b4c4205882f6db24eb361694c67503

        SHA512

        f0202e3ed32b9e69785bb50551b5143fe69298dead3c9a3d539cc6c6768f70f8263f074f912d1de5decb122bc365b7645428c0d10040f6f15a41f3a5ac0a4611

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\libcurl.dll
        Filesize

        218KB

        MD5

        d09be1f47fd6b827c81a4812b4f7296f

        SHA1

        028ae3596c0790e6d7f9f2f3c8e9591527d267f7

        SHA256

        0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

        SHA512

        857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\libcurlpp.dll
        Filesize

        54KB

        MD5

        e6e578373c2e416289a8da55f1dc5e8e

        SHA1

        b601a229b66ec3d19c2369b36216c6f6eb1c063e

        SHA256

        43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

        SHA512

        9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\libstdc++-6.dll
        Filesize

        647KB

        MD5

        5e279950775baae5fea04d2cc4526bcc

        SHA1

        8aef1e10031c3629512c43dd8b0b5d9060878453

        SHA256

        97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

        SHA512

        666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

      • C:\Users\Admin\AppData\Local\Temp\7zS4F6E3066\libwinpthread-1.dll
        Filesize

        69KB

        MD5

        1e0d62c34ff2e649ebc5c372065732ee

        SHA1

        fcfaa36ba456159b26140a43e80fbd7e9d9af2de

        SHA256

        509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

        SHA512

        3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

      • C:\Users\Admin\AppData\Local\Temp\Cab759F.tmp
        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\HQyTDnkn\Gi8z7UCZuS0b.zip
        Filesize

        37KB

        MD5

        99fc0e319e7ca046b1d327e39cf84e93

        SHA1

        6cb11694f5ade7cae0cdaa18798585474e46c119

        SHA256

        1666174977550b6ce47e360fc7a320db0f34d88ba97094adf56e1e582e04e4af

        SHA512

        57801fd65a95e9379eca3bb56bb0ceee78a7f948f91748bcca36a3ff65d247cdce03de7814991628f310dcf16246497930e94d5aeeffee86dbd8e213e3a4fb98

      • C:\Users\Admin\AppData\Local\Temp\HQyTDnkn\_Files\_Information.txt
        Filesize

        8KB

        MD5

        716232663af4afa1e9b6d7e3c892e835

        SHA1

        a271bb8c191ee773fa8cf1dc4372b14b77e78492

        SHA256

        8952b48f8f894f02f61b55370ef9bca2fb41b9df9df03372da508fad67b9d52d

        SHA512

        76fe7954cc0bd2c813895453e2585e92868dcceb0eb4eccfe278d679a0a40d1ae88359143a1b0731808d5bc6211b3c59518139cb83a35265290c29736f51d66a

      • C:\Users\Admin\AppData\Local\Temp\HQyTDnkn\_Files\_Screen_Desktop.jpeg
        Filesize

        44KB

        MD5

        0ee4ec21e124e6fd276af25c93ce311b

        SHA1

        b1c2a0d51ad81f647f9495181c448911d100fd51

        SHA256

        6d0cb719267d04a0eef939aad421119eb1360bc618e764076d78efbbb740a024

        SHA512

        1a43e867a6967a36c43097ede13603812945ec6ea6b4313cda9b128df25a7508b06a54a21e4160c7897ec2664a81539c5af66a4ccb2d8369b9323777f250eb21

      • C:\Users\Admin\AppData\Local\Temp\HQyTDnkn\files_\system_info.txt
        Filesize

        8KB

        MD5

        6e92a4524f163cb723adeb3814a8c4d2

        SHA1

        1358b350acaec5f4663247a44af8201d12d5a7d3

        SHA256

        c546bdf9d4d17838114c94a7e23c60e93b6739348cca8d42326444a5827babd2

        SHA512

        540a21bda4769465ec0c5c65e35b0a49a34793469108ef663ac0ad0ab923bde63be73377af0ea1d657c3c88d534302dcda511990026c728cb9e33a5d5d10daf2

      • C:\Users\Admin\AppData\Local\Temp\Tar7709.tmp
        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • \Users\Admin\AppData\Local\Temp\7zS4F6E3066\libgcc_s_dw2-1.dll
        Filesize

        113KB

        MD5

        9aec524b616618b0d3d00b27b6f51da1

        SHA1

        64264300801a353db324d11738ffed876550e1d3

        SHA256

        59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

        SHA512

        0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

      • \Users\Admin\AppData\Local\Temp\7zS4F6E3066\setup_install.exe
        Filesize

        2.1MB

        MD5

        b1af590a68401b7c43748dd26416cd2e

        SHA1

        387e48ff46a375b6f25c2f1b01ababdb3ad4f4a6

        SHA256

        8743c81d9008c5c62cc420ff1d8e212a061ca96a1d722beee45cfd2800c45139

        SHA512

        5e6570c11f9b168166b95d7811df8d186cf4dff859473556e46715768dcf08ce41ada6b72f8ed655f57c5c842aef72fd42479a42a895ae414f8b7411dbe72783

      • \Users\Admin\AppData\Local\Temp\setup_installer.exe
        Filesize

        2.4MB

        MD5

        a8149197e0b87186f49ea0654f2e001d

        SHA1

        b3ae3f94bf3ce63dcd97aba465694d6233bcff35

        SHA256

        820285daf1ef245e93262a0a5e87c515c9233b0d9d95b2fe56b53f93031ae765

        SHA512

        e314edd8a5331a558164bdde272fc67251c5db7f9dd22eb648a6036c4737e4701ae9a86f00f9944f8089b6a5c93f37f6f719a26f09cc334366bd7a44fe89b81e

      • memory/1136-134-0x0000000000240000-0x0000000000249000-memory.dmp
        Filesize

        36KB

      • memory/1136-261-0x0000000000400000-0x0000000002CBA000-memory.dmp
        Filesize

        40.7MB

      • memory/1136-135-0x0000000000400000-0x0000000002CBA000-memory.dmp
        Filesize

        40.7MB

      • memory/1136-150-0x0000000003120000-0x0000000003220000-memory.dmp
        Filesize

        1024KB

      • memory/1272-259-0x0000000002990000-0x00000000029A6000-memory.dmp
        Filesize

        88KB

      • memory/1708-141-0x0000000000400000-0x0000000002D15000-memory.dmp
        Filesize

        41.1MB

      • memory/1708-140-0x0000000000300000-0x0000000000400000-memory.dmp
        Filesize

        1024KB

      • memory/1708-123-0x00000000030B0000-0x000000000314D000-memory.dmp
        Filesize

        628KB

      • memory/1708-540-0x00000000030B0000-0x000000000314D000-memory.dmp
        Filesize

        628KB

      • memory/1708-551-0x0000000000300000-0x0000000000400000-memory.dmp
        Filesize

        1024KB

      • memory/2080-126-0x00000000001D0000-0x00000000001F6000-memory.dmp
        Filesize

        152KB

      • memory/2080-156-0x000000001B160000-0x000000001B1E0000-memory.dmp
        Filesize

        512KB

      • memory/2080-523-0x000007FEF54A0000-0x000007FEF5E8C000-memory.dmp
        Filesize

        9.9MB

      • memory/2080-130-0x0000000000760000-0x000000000077E000-memory.dmp
        Filesize

        120KB

      • memory/2080-131-0x000007FEF54A0000-0x000007FEF5E8C000-memory.dmp
        Filesize

        9.9MB

      • memory/2136-534-0x0000000071420000-0x00000000719CB000-memory.dmp
        Filesize

        5.7MB

      • memory/2136-139-0x0000000071420000-0x00000000719CB000-memory.dmp
        Filesize

        5.7MB

      • memory/2136-272-0x0000000002970000-0x00000000029B0000-memory.dmp
        Filesize

        256KB

      • memory/2572-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-267-0x000000006EB40000-0x000000006EB63000-memory.dmp
        Filesize

        140KB

      • memory/2572-57-0x000000006B280000-0x000000006B2A6000-memory.dmp
        Filesize

        152KB

      • memory/2572-60-0x000000006B440000-0x000000006B4CF000-memory.dmp
        Filesize

        572KB

      • memory/2572-67-0x000000006B440000-0x000000006B4CF000-memory.dmp
        Filesize

        572KB

      • memory/2572-69-0x000000006B440000-0x000000006B4CF000-memory.dmp
        Filesize

        572KB

      • memory/2572-68-0x0000000064940000-0x0000000064959000-memory.dmp
        Filesize

        100KB

      • memory/2572-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-70-0x000000006B440000-0x000000006B4CF000-memory.dmp
        Filesize

        572KB

      • memory/2572-78-0x000000006B280000-0x000000006B2A6000-memory.dmp
        Filesize

        152KB

      • memory/2572-77-0x000000006B280000-0x000000006B2A6000-memory.dmp
        Filesize

        152KB

      • memory/2572-76-0x000000006B280000-0x000000006B2A6000-memory.dmp
        Filesize

        152KB

      • memory/2572-263-0x0000000000400000-0x000000000051B000-memory.dmp
        Filesize

        1.1MB

      • memory/2572-264-0x0000000064940000-0x0000000064959000-memory.dmp
        Filesize

        100KB

      • memory/2572-265-0x000000006B280000-0x000000006B2A6000-memory.dmp
        Filesize

        152KB

      • memory/2572-266-0x000000006B440000-0x000000006B4CF000-memory.dmp
        Filesize

        572KB

      • memory/2572-75-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-268-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-73-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2572-74-0x000000006FE40000-0x000000006FFC6000-memory.dmp
        Filesize

        1.5MB

      • memory/2744-526-0x0000000000400000-0x0000000002D19000-memory.dmp
        Filesize

        41.1MB

      • memory/2744-136-0x0000000002DA0000-0x0000000002EA0000-memory.dmp
        Filesize

        1024KB

      • memory/2744-137-0x00000000032C0000-0x0000000003360000-memory.dmp
        Filesize

        640KB

      • memory/2744-541-0x0000000002DA0000-0x0000000002EA0000-memory.dmp
        Filesize

        1024KB

      • memory/2744-138-0x0000000000400000-0x0000000002D19000-memory.dmp
        Filesize

        41.1MB

      • memory/3064-121-0x0000000000260000-0x000000000028F000-memory.dmp
        Filesize

        188KB

      • memory/3064-132-0x0000000004720000-0x0000000004740000-memory.dmp
        Filesize

        128KB

      • memory/3064-539-0x0000000002E80000-0x0000000002F80000-memory.dmp
        Filesize

        1024KB

      • memory/3064-129-0x0000000004660000-0x0000000004682000-memory.dmp
        Filesize

        136KB

      • memory/3064-269-0x00000000071D0000-0x0000000007210000-memory.dmp
        Filesize

        256KB

      • memory/3064-117-0x0000000002E80000-0x0000000002F80000-memory.dmp
        Filesize

        1024KB

      • memory/3064-133-0x0000000000400000-0x0000000002CD3000-memory.dmp
        Filesize

        40.8MB

      • memory/3064-556-0x00000000071D0000-0x0000000007210000-memory.dmp
        Filesize

        256KB