Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-02-2024 11:17

General

  • Target

    a9049d13128ecd6f1f151527984028a7.exe

  • Size

    3.2MB

  • MD5

    a9049d13128ecd6f1f151527984028a7

  • SHA1

    d4f4c653cb783792f1cf9a97cfadc1143e556edb

  • SHA256

    2dd292dcc5d8e599d717242cb403360120308bed82e47709f6ae231202e1b0ff

  • SHA512

    410a3e91d0d0b7d177bfd15bb3dad07d48ddbe7e125ab02e83d62abdc27e6adb0bc718180e95ccf01faf8f647b3a8b4e92059bad457b35f73e55f1fdade9b46b

  • SSDEEP

    98304:x6YoxuUBSlbkw33Iq9RE+ybwYQwf7CvLUBsKLX8:xbo5Sl4w34MahbwhRLUCKj8

Malware Config

Extracted

Family

nullmixer

C2

http://watira.xyz/

Extracted

Family

smokeloader

Botnet

pub5

Extracted

Family

vidar

Version

39.7

Botnet

706

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://conceitosseg.com/upload/

http://integrasidata.com/upload/

http://ozentekstil.com/upload/

http://finbelportal.com/upload/

http://telanganadigital.com/upload/

rc4.i32
rc4.i32

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 55 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9049d13128ecd6f1f151527984028a7.exe
    "C:\Users\Admin\AppData\Local\Temp\a9049d13128ecd6f1f151527984028a7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_1.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_1.exe
          sahiba_1.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1616
          • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_1.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_1.exe" -a
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2320
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_8.exe
        3⤵
        • Loads dropped DLL
        PID:268
        • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_8.exe
          sahiba_8.exe
          4⤵
          • Executes dropped EXE
          PID:1932
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_7.exe
        3⤵
        • Loads dropped DLL
        PID:664
        • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_7.exe
          sahiba_7.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1560
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c cmd < Compatto.rtf
            5⤵
              PID:1588
              • C:\Windows\SysWOW64\cmd.exe
                cmd
                6⤵
                • Loads dropped DLL
                PID:1740
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^jvMDwkwydQdmnxGPmMOjYlbIlopECWXOZojRKCmISYgoKPYfXOyLKoMeYraSevCxTCAdoOyWjyxqVfYxlTHNQkrRvpTHpGGccUgofIipJpnFNMuJyYIpPPDHnITYVnMGn$" Oggi.rtf
                  7⤵
                    PID:1436
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 30
                    7⤵
                    • Runs ping.exe
                    PID:2892
                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.com
                    Triste.exe.com n
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2264
                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.com
                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Triste.exe.com n
                      8⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetThreadContext
                      PID:2120
                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe
                        9⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of AdjustPrivilegeToken
                        PID:624
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_6.exe
            3⤵
            • Loads dropped DLL
            PID:528
            • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_6.exe
              sahiba_6.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              PID:2816
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_5.exe
            3⤵
            • Loads dropped DLL
            PID:1952
            • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_5.exe
              sahiba_5.exe
              4⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              PID:560
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_4.exe
            3⤵
            • Loads dropped DLL
            PID:1620
            • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_4.exe
              sahiba_4.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2324
              • C:\Users\Admin\AppData\Local\Temp\is-LJTRC.tmp\sahiba_4.tmp
                "C:\Users\Admin\AppData\Local\Temp\is-LJTRC.tmp\sahiba_4.tmp" /SL5="$401C8,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_4.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3000
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_3.exe
            3⤵
            • Loads dropped DLL
            PID:304
            • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_3.exe
              sahiba_3.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2696
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 972
                5⤵
                • Loads dropped DLL
                • Program crash
                PID:2056
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c sahiba_2.exe
            3⤵
            • Loads dropped DLL
            PID:2380
            • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_2.exe
              sahiba_2.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:2728
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 420
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:1720

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Compatto.rtf

        Filesize

        478B

        MD5

        b96b1288ce038869fb15d4353f760613

        SHA1

        5a6f01cb0546a6dd4ae1e90279aaa82bdd672b60

        SHA256

        2c1458ecd2cc31a6d798a1c6396926cb99a66481832f774dbdbc19594ff9bd40

        SHA512

        36a72a5cac8b1aaa395d9efc2fc79b4525e408c57cebaaf2f00c1ba5b51bc08ee22e5676055cdcc961197c05e41d020c8d74b0d95426095d1a5b04fb14d3b04e

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Oggi.rtf

        Filesize

        872KB

        MD5

        916c4387e392f4f3c300d18dc396b739

        SHA1

        c7b480305599093ed6f88f5d8597fc5facc7cb3e

        SHA256

        d574f83fc092c037db7625e3b2dbe16a4898f9e8ec187c3a5744c699bdb5b75e

        SHA512

        9166b8ff071f067bbd31f39c2201285dc1c2096c693849006554a8ca0201b8d43b2ad0c786b5bb4bdfe897870d0609bc6011aaf8baee1456a473045ea9189584

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\libcurlpp.dll

        Filesize

        54KB

        MD5

        e6e578373c2e416289a8da55f1dc5e8e

        SHA1

        b601a229b66ec3d19c2369b36216c6f6eb1c063e

        SHA256

        43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

        SHA512

        9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\libgcc_s_dw2-1.dll

        Filesize

        113KB

        MD5

        9aec524b616618b0d3d00b27b6f51da1

        SHA1

        64264300801a353db324d11738ffed876550e1d3

        SHA256

        59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

        SHA512

        0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\libstdc++-6.dll

        Filesize

        647KB

        MD5

        5e279950775baae5fea04d2cc4526bcc

        SHA1

        8aef1e10031c3629512c43dd8b0b5d9060878453

        SHA256

        97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

        SHA512

        666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\libwinpthread-1.dll

        Filesize

        69KB

        MD5

        1e0d62c34ff2e649ebc5c372065732ee

        SHA1

        fcfaa36ba456159b26140a43e80fbd7e9d9af2de

        SHA256

        509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

        SHA512

        3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_2.txt

        Filesize

        328KB

        MD5

        907d694efe1d5b981e23b14caeec93aa

        SHA1

        230cc3171ce32035c21cad23491b9de878c363fb

        SHA256

        e84c64295246e0add141567a22a289d922d58bb02755b27af176f9d8d7e833e5

        SHA512

        5ced55c073489442fda7acb5b10552675c50dd05ad431106c8c51088b55efb2a7ccc25b78f7cae50096e53ba812fccc8d4a7eb458e29b774c4f82a3e2ab5f964

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_3.txt

        Filesize

        665KB

        MD5

        b9c23ca0513e32c2fd050217d07e0fda

        SHA1

        618784127979a0b14c641a061845fa8e8a05ae8b

        SHA256

        7a1c26893a2e3766f167353170f7fd5fc007f1443f55e8b49b0632c28065369c

        SHA512

        c6e1d4b2be539b47517747370757fbe6f75f0e0141798b347dceb1dc438e78c809d7dc22ad064cee01e04b26cab9be2e3426b00ac1f5b43ae6541d1766170ea2

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_4.exe

        Filesize

        256KB

        MD5

        18e5b12e8a3f3df27fae58e9a2d52e2a

        SHA1

        5b5bf1017bdde7f53287fa227f56b040aa6cffe5

        SHA256

        86fc8a51c74b90cbb1fde405842c1a4ba82ef606e501fb89b98c855deed650ce

        SHA512

        5588945f546ce1a8137e86420f7aeff14ac79d03561e85bd35d07ae5b6930af4d4ea3be27546b89af6fc1e0c9dd0b812e1815de8be96592c702d9ef161766040

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_4.txt

        Filesize

        749KB

        MD5

        751d4acf96a759b5973394c11101407e

        SHA1

        61afa61d575550369da62cfb5f857720a4f226e7

        SHA256

        bb271be24f3e60b032f3269aa7b6fe62b8d0c2c2a3ffd57febae6b11c0a8a1fa

        SHA512

        b9adb1753125e7cdfb889e3f6116e37883f49eab0b6136e89230a90279a2c988d3090c6b0b90e182473c4a2b4fcd88e63591e47dfc72f35f68bb6499a099b1a5

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_5.txt

        Filesize

        170KB

        MD5

        fa595cebce68c02fd46ada1fe8c737b4

        SHA1

        8b6a06173339d171ea2011f128b274b7649bd439

        SHA256

        17232aff76e3b361355b110d77cc1e2942f2b004485706f38995db15808f7d4a

        SHA512

        36cb2d5edce78419134939a8293bee2bd6ab34a2ae14f77eac2b815dd3cfc7834f88d573af63d0a8a7167dce69e7f8f5237fe73029e66deb571d22471dbc40fb

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_6.txt

        Filesize

        704KB

        MD5

        e67d047957bd557e07590ffeb6da1db8

        SHA1

        414808c8b0f808b2cd9d6e40d7b683801c8126a5

        SHA256

        3834682e98665ed7088f7f252b69cb43fa0a752b7f18726aed5768c10fa160b5

        SHA512

        90e24d486b75fd8a2dde39394a4135d7ae6bbc7094d6914106cdc80dfed20b9fb1f24f7ea14488612046e5469266bd522ce442903bd1a1181763fdd8634f47f3

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_7.txt

        Filesize

        882KB

        MD5

        fb9c80b52aee624e19d016c13d56ade0

        SHA1

        9d9361947d673cca9155d12d56d6f23d20f164a2

        SHA256

        4363307739b80f6e418170a049b1a4c52e0405161f18588a8330a849ac4a9a62

        SHA512

        c358cef29d681aca0fb4d3d0de64dbc712cded98a1b70f5f93c654c02e3f399b2ac23419801f6fbb6ab6210c1854a14eb5a6b1ce3cbea927118decaf30a93210

      • C:\Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_8.txt

        Filesize

        244KB

        MD5

        05e20a3e440fae1e6993fdd573c5f677

        SHA1

        03ee590e617b537e62103933bd07be65f13eaeb0

        SHA256

        071ae7407b4e6aa0c9689a8519ff9fc93933a4f05c1992f1e12f04d60643963b

        SHA512

        7e7be5d280fe7d03b03068118198f5b6ba0953145987eb0a7ccc4e48e1233407be9035780297fd46e7f53224b1a1c6f25090c75a46544770b7ba039d7b0e74cd

      • C:\Users\Admin\AppData\Local\Temp\Cab6B05.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar6B75.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\libcurl.dll

        Filesize

        218KB

        MD5

        d09be1f47fd6b827c81a4812b4f7296f

        SHA1

        028ae3596c0790e6d7f9f2f3c8e9591527d267f7

        SHA256

        0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

        SHA512

        857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_1.exe

        Filesize

        56KB

        MD5

        c0d18a829910babf695b4fdaea21a047

        SHA1

        236a19746fe1a1063ebe077c8a0553566f92ef0f

        SHA256

        78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

        SHA512

        cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_4.exe

        Filesize

        320KB

        MD5

        d5ea655b43d935165b217566a486dba1

        SHA1

        c9e3d6520c913064756e84306ca8051423c81473

        SHA256

        707051eece470cb1e39ce4fcfa5623cbcf8f8a7c38439fa06bb125ac8c600e7d

        SHA512

        f30c9a9cfccfbad4e833204eefc0ff37a16508c13648c00b36802b93a393998607578738f9c9533347e6734f1f8e207cc41d914a3a25daf9aceb7ebaf44af5d1

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_6.exe

        Filesize

        1.1MB

        MD5

        9db9ef06359cce014baef96fa69b5a7c

        SHA1

        614c739b69be9a3914a9ca9548245ed2c97ceb63

        SHA256

        50df788859ce3024e9018f60f7c04aa43c191de7b1578fdbebc7478898d5cd8d

        SHA512

        9d80f7b815d56a10179c164580672a2947e130321c21037747d10859e5540fa55daa1b495e48e6b41c7df51ef9567743912a2d4b1ffa9a843f3fc34d2803e583

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\sahiba_7.exe

        Filesize

        64KB

        MD5

        7622cfe344eefa5ee9461dbdcf31a963

        SHA1

        cb45f78a84c1dd0fb128d90cc41fca47d075f1ff

        SHA256

        47fda8705b38cdbdca0c5392959754eac5eae04dc7f668273b8b8760a1c6e76c

        SHA512

        788335ecc1d62d7e589985266ccec3993442f67c2fb9001bca5961bcdc137c59626696a837693429ba2221324b45980ebe5520fcdcc18e89ee9e0676f9dcfe80

      • \Users\Admin\AppData\Local\Temp\7zS4C8CB156\setup_install.exe

        Filesize

        287KB

        MD5

        9ca6369afc4059a6c124b3d9180e13e2

        SHA1

        c2ed4d8d7f851cfa727dd7f2f2e25c64422d1e6e

        SHA256

        5ee2010c056d60ac5ddab375d640554b25f71b04c68e575ed8cfacc9937aa531

        SHA512

        821dbfd4bc08e3ca2341cce1c482821720bf1b6289f140e37df8d46d3ca908c2e9dfddcc64a7d9c702bcf7d5db0d38a963bde3be9bf580ee2f8dd57f2fcc2ffa

      • memory/560-182-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

        Filesize

        9.9MB

      • memory/560-208-0x000000001AE90000-0x000000001AF10000-memory.dmp

        Filesize

        512KB

      • memory/560-181-0x00000000002D0000-0x00000000002F4000-memory.dmp

        Filesize

        144KB

      • memory/560-152-0x00000000002F0000-0x0000000000322000-memory.dmp

        Filesize

        200KB

      • memory/560-179-0x00000000002C0000-0x00000000002C6000-memory.dmp

        Filesize

        24KB

      • memory/560-368-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp

        Filesize

        9.9MB

      • memory/560-196-0x00000000004A0000-0x00000000004A6000-memory.dmp

        Filesize

        24KB

      • memory/624-405-0x00000000000D0000-0x00000000000D8000-memory.dmp

        Filesize

        32KB

      • memory/624-400-0x00000000000D0000-0x00000000000D8000-memory.dmp

        Filesize

        32KB

      • memory/624-404-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/624-408-0x00000000000D0000-0x00000000000D8000-memory.dmp

        Filesize

        32KB

      • memory/624-407-0x00000000000D0000-0x00000000000D8000-memory.dmp

        Filesize

        32KB

      • memory/1308-360-0x0000000002640000-0x0000000002655000-memory.dmp

        Filesize

        84KB

      • memory/2244-39-0x0000000002740000-0x000000000285E000-memory.dmp

        Filesize

        1.1MB

      • memory/2244-31-0x0000000002730000-0x000000000284E000-memory.dmp

        Filesize

        1.1MB

      • memory/2324-207-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2324-195-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2324-123-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2556-74-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-374-0x000000006EB40000-0x000000006EB63000-memory.dmp

        Filesize

        140KB

      • memory/2556-59-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2556-60-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2556-61-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2556-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-70-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2556-77-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-76-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-75-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2556-48-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2556-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2556-73-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2556-71-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-376-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2556-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-361-0x0000000000400000-0x000000000051E000-memory.dmp

        Filesize

        1.1MB

      • memory/2556-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2556-367-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2556-365-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2556-371-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2696-200-0x0000000000400000-0x00000000004C3000-memory.dmp

        Filesize

        780KB

      • memory/2696-389-0x0000000000400000-0x00000000004C3000-memory.dmp

        Filesize

        780KB

      • memory/2696-198-0x0000000000330000-0x00000000003CD000-memory.dmp

        Filesize

        628KB

      • memory/2696-197-0x0000000000560000-0x0000000000660000-memory.dmp

        Filesize

        1024KB

      • memory/2696-409-0x0000000000560000-0x0000000000660000-memory.dmp

        Filesize

        1024KB

      • memory/2696-410-0x0000000000330000-0x00000000003CD000-memory.dmp

        Filesize

        628KB

      • memory/2728-366-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2728-194-0x0000000000400000-0x000000000046D000-memory.dmp

        Filesize

        436KB

      • memory/2728-184-0x0000000000240000-0x0000000000249000-memory.dmp

        Filesize

        36KB

      • memory/2728-183-0x0000000000570000-0x0000000000670000-memory.dmp

        Filesize

        1024KB

      • memory/3000-206-0x0000000000400000-0x0000000000516000-memory.dmp

        Filesize

        1.1MB