Analysis

  • max time kernel
    92s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-02-2024 21:29

General

  • Target

    nmap-7.93-setup.exe

  • Size

    27.8MB

  • MD5

    f9e753cccea0ffae6871dc65f67d3f89

  • SHA1

    ab2de49f90330cc3b305457a9a0f897f296e95f4

  • SHA256

    f1160a33fb79c764cdc4c023fa700054ae2945ed91880e37348a17c010ca716f

  • SHA512

    0c6f6c14ecf8ef028e6a556f58e720321a7808b0a1f602e019f6b21d9cef970424185c27e7647368d2fca256d47844310d76d626209d406a961d048063410d1d

  • SSDEEP

    786432:eCw4jIIk4AN6o6JWCRCLz4NFMqt9+26UgRY5YYnDEWW:e/T4hJZRCgMkg+5HEv

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 TTPs 8 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Drops file in System32 directory 42 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 38 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nmap-7.93-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\nmap-7.93-setup.exe"
    1⤵
    • Drops file in Program Files directory
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\nsc6544.tmp\npcap-1.71.exe
      "C:\Users\Admin\AppData\Local\Temp\nsc6544.tmp\npcap-1.71.exe" /loopback_support=no
      2⤵
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\NPFInstall.exe
        "C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\NPFInstall.exe" -n -check_dll
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3684
      • C:\Windows\SysWOW64\certutil.exe
        certutil -addstore -f "Root" "C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\roots.p7b"
        3⤵
        • Manipulates Digital Signatures
        PID:2336
      • C:\Windows\SysWOW64\certutil.exe
        certutil -addstore -f "TrustedPublisher" "C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\signing.p7b"
        3⤵
        • Manipulates Digital Signatures
        PID:4932
      • C:\Program Files\Npcap\NPFInstall.exe
        "C:\Program Files\Npcap\NPFInstall.exe" -n -c
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\SYSTEM32\pnputil.exe
          pnputil.exe -e
          4⤵
            PID:2324
        • C:\Program Files\Npcap\NPFInstall.exe
          "C:\Program Files\Npcap\NPFInstall.exe" -n -iw
          3⤵
          • Executes dropped EXE
          PID:3980
        • C:\Program Files\Npcap\NPFInstall.exe
          "C:\Program Files\Npcap\NPFInstall.exe" -n -i2
          3⤵
          • Drops file in Drivers directory
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:3532
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "Microsoft.PowerShell.Management\Start-Service -Name npcap -PassThru | Microsoft.PowerShell.Management\Stop-Service -PassThru | Microsoft.PowerShell.Management\Start-Service"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -WindowStyle Hidden -NonInteractive -Command "ScheduledTasks\Register-ScheduledTask -Force -TaskName 'npcapwatchdog' -Description 'Ensure Npcap service is configured to start at boot' -Action (ScheduledTasks\New-ScheduledTaskAction -Execute 'C:\Program Files\Npcap\CheckStatus.bat') -Principal (ScheduledTasks\New-ScheduledTaskPrincipal -UserId 'SYSTEM' -LogonType ServiceAccount) -Trigger (ScheduledTasks\New-ScheduledTaskTrigger -AtStartup) -Settings (ScheduledTasks\New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Compatibility Win8)"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 2212
            4⤵
            • Program crash
            PID:3020
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{892f3281-5914-1848-aef3-1ce6fe9b8af3}\NPCAP.inf" "9" "405306be3" "00000000000000E8" "WinSta0\Default" "0000000000000148" "208" "C:\Program Files\Npcap"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4568 -ip 4568
      1⤵
        PID:2496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\PROGRA~1\Npcap\npcap.cat

        Filesize

        12KB

        MD5

        be2a59b225dace6a52b98f17678786c0

        SHA1

        abec30ea6b668f9ccff77209d54b971ce6a22711

        SHA256

        43d10d470320041e663a82439d79cfac78de99addd98e02c4d60171710d032b2

        SHA512

        9a9acfe84f822b7f20148725a4abaa51118759f5688d4a3841c4a9e73b59801128adf4df54a14078408fb14ad0acea068a2bdd1cf0f9ffc6c44e6e38721f79d6

      • C:\PROGRA~1\Npcap\npcap.sys

        Filesize

        75KB

        MD5

        08a2def8efc2619ddabe13a041703aea

        SHA1

        f9fd929c77d5a47766623abaa7490bcd98b3ad97

        SHA256

        a2039b552dfacd4edc2b8ed42bbe32cb0a481240fce18f78aeb1a68dbb747d39

        SHA512

        0afb5d2dd6747b37162494f4f90387160c5b90c58a71703d2ddd07256e848ee1f3e4237b660d511262255e54038ab11699808526a3574450c9407eb1e830dfac

      • C:\Program Files\Npcap\NPCAP.inf

        Filesize

        8KB

        MD5

        ff536154cf4932322ca818eda6712e49

        SHA1

        873bb1d640cdc9c41596f46fbc37b48a5d6b03cd

        SHA256

        4c1b4785d35a4828b98b7acacf8b18b0a4e4d0c9da683cd9294f6a6ae6cf7bf2

        SHA512

        164d9c7eca15fa83aa2645fd4eefbf2a562b49615978b72f6c9c1b072cbdd1bffdc3295d95b69d2cf26dba67f25d6fe82ddbfa6decda07fa855bfa3c2311d7b4

      • C:\Program Files\Npcap\NPCAP_wfp.inf

        Filesize

        2KB

        MD5

        4b72b37d904cbf298fb8351cc80a048e

        SHA1

        f77357bd263f88acdb1b5cad300e7b116a1c2ee7

        SHA256

        953b89b39c78dafb27a05f27bc8faa97c70f2a6ec3bc2f81070a46b85d305f08

        SHA512

        e63d013ca9badc2d40634c6bdc1629adbade70a65753f317c7e7ac09078ad299105ad6e37fb18a8a6a0b0d994a2ea01c32a55cbc9a19b53466cd49603ee81181

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        191B

        MD5

        8d3124a94753f3ef23da883ff59fee55

        SHA1

        137c953ce796fa5eee492b3640afed1dbe65ed7b

        SHA256

        2d840f2015593d4c9a9e4ba96fc4ed15ef1bd8cbf18524670dd8b0a17de21fbc

        SHA512

        8b3ca55e8a97f7c4e29c616d3cbc996ae16ccfdbfd507bceb04d2a3496a06ac89c174b2680e56aff59cb4d7376b250e8ea62b6fe044b2aa733214b855816da0e

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        393B

        MD5

        629634c9a3b22de3654266fe003529af

        SHA1

        45cfc4b5e67b690ad330a4f9abb8ff7d3d7e754f

        SHA256

        8295b8f74412adc78ba07d740c13f34f0201417bb76479b76d2ab4d48c3d6e7a

        SHA512

        ec5d5e2aeecf7a20f3f10e1a439d731b1c657532e7a26b4d4097009fe8e6755a2d28759ecdfee774316c528edb2dc0bb334378dd74f8ce9443eca43f6bae728d

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        790B

        MD5

        147535a3d0d3008ad4de2f1abe3b76bb

        SHA1

        5afa0ddccb10a3d1bea5248b41bc622861ab55e0

        SHA256

        2502eb3fa18dae1d99f7e919e4bf1975b83d663aa02afb51c502d8660bfeaee9

        SHA512

        25987857ed12fc65ebad23264d546e3df1691f80e9e9b0642fa6514a8ca0bfc4b51a9f1e70582bbaf4f3cbff258c7fd6dcea9389f773c73f1522972c3f2b4a7d

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        1KB

        MD5

        be4c00df8e5da6149730a9e6d2e815f1

        SHA1

        501562c31e633c6daa053f317eb1032e92a659a4

        SHA256

        bdce37c5eeb7397747e02b62c0ccddb47daa48938b9d9ed7b50974a21108d032

        SHA512

        7ead733668b9ab2dfb1031ec997ff76b0aa66ead1d552e3a94b56efefb0b5ba0f82efbaa80112bed8d8a260b1e9527d9b0a02bc4bacb133f7ecd7348237e5538

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        1KB

        MD5

        baf595d4c2494aacfec9f3820ce3c6e2

        SHA1

        ba17d91b2da3bd6e5b8fd7ba00cb69f3b528166c

        SHA256

        8795a039b7d9ff33df1f65f5f540b942c805199ef1ffd412045446c1546b58dd

        SHA512

        32d5200b55c0abfc28a6184acfd87eae78307b116673f307b83d67180f23a6b124f28464384f0d51f8330a88e10e55239bd319117d3118c7bd6de6123471a9bd

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        2KB

        MD5

        736e7594c68a15841941090b13cfe234

        SHA1

        692634ee0c6234ae40428c1bb914434742977e1d

        SHA256

        f8f04e6aa13192110c13792077c184f342896a118fb036a784c57c2b2bd80c31

        SHA512

        1eff7ab9a6f74d853935f5b881e771dad98913f9066f63b2cf55d67470f27d297ce315ce547cfb72be03a5aa908e33b41047fb6b85dd282f916687c439fbefa3

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        3KB

        MD5

        a95be85b996c5e941a502fb143acf186

        SHA1

        eba8ec3aa9e6c8cfcaa7c230ec6524dcee1cf573

        SHA256

        3fa2e08bd8cfe23b43bfb130c8c8e7d5f6e8c3401c5529783328ddddea28fde9

        SHA512

        66bbe7790f37a25a09e10d56a34ea21dee4ab0f263fc79be09f5345aaa8e542406d450bb9a611f09106afa0b1d34ae93f1085d0e8a23b89fa5ca4f2ef4d3728a

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        3KB

        MD5

        71d7f347e2942bf867d539ce05645157

        SHA1

        910f584ab9427bc133deff0233b309807ead6c20

        SHA256

        41d8ae15cb40ffd9e8296db82d56543b172b8a1f15a2967dd88553b41160c8df

        SHA512

        8817f35d0e5c9fdebf15914809d34fdc4c7ef0f06f04daf626d608bfbd0ddfd6ae8645f91b16b0240c9c91c4a005de5ac8e6a71c65e42238fe9a0556ffb1d4d5

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        4KB

        MD5

        a4c46fc18a3204dd7cf472928ced3cb6

        SHA1

        b8a9bca0cf297cdbdae2cef4295ce8c2120545d6

        SHA256

        4bfceb4e5e1085a980530161ca016ece8ef87fe2546c768d2aa901f721649979

        SHA512

        9dc8c08fcb621af67857a20775ecc94ea50bad21d1d91bd046c53660cb28f9228b146fca750c3eb9f13823d4a6320661d906f137f570c115a0490916ae4e3d22

      • C:\Program Files\Npcap\NPFInstall.log

        Filesize

        4KB

        MD5

        6bd5cb2008041679091f0008454853e4

        SHA1

        4705b4d99fb949c0f513436af58ca4318a0c13b3

        SHA256

        f8187a54a17e49389553759e1a3c713bc66e9adbd40e009db228a13aad90ca7d

        SHA512

        c426439de70866cb7da499a6c048298e1302f9bd8ae576da6f709e370fcb52c5100c84dac11e60cc6f2c61214df89ecceca3c203b6305c2cfe4a1830a4c6ce58

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

        Filesize

        1KB

        MD5

        def65711d78669d7f8e69313be4acf2e

        SHA1

        6522ebf1de09eeb981e270bd95114bc69a49cda6

        SHA256

        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

        SHA512

        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        17KB

        MD5

        072396748bb06d974cd77463a90a105f

        SHA1

        87078cd4aebe2d871bf69884ccec6bf7a52a80ee

        SHA256

        57c60c45b2dd7c045090da21b31346daca0557a27544d7ba4026f5aaa647b836

        SHA512

        dad804fdd9a7d574fd6f60e99aae92d2c39f8e5ecd742d27469227e77c636ecc9ae0f7f12c0f927e43ccb083dcd2aba8e2a151409a0f2008d85cd107239b220e

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_n1rbxbpu.h04.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\nsc6544.tmp\InstallOptions.dll

        Filesize

        22KB

        MD5

        17c877fec39fc8ce03b7f012ef25211f

        SHA1

        61adfa25cbd51375f0355aa9b895e1dc28389e19

        SHA256

        dbb0173bb09d64ca716b3fd9efb0222ecc7c13c11978d29f2b61cf550bcd7aba

        SHA512

        45c44c91bf72d058fcba93e7d96b45fcc3dc06855b86eca0f463aa4eeafc7e68493e33663c68fd3fdceed51dd0e76d3493c47da68a3efdc25af9e78c2643d29d

      • C:\Users\Admin\AppData\Local\Temp\nsc6544.tmp\npcap-1.71.exe

        Filesize

        1.1MB

        MD5

        40cfea6d5a3ff15caf6dd4ae88a012b2

        SHA1

        287b229cecf54ea110a8b8422dcda20922bdf65e

        SHA256

        5ccb61296c48e3f8cd20db738784bd7bf0daf8fce630f89892678b6dda4e533c

        SHA512

        6ac4955286a4927ce43f7e85783631c9a801605c89a18ba95dde34d90eecbf4825b09e116890c8aca8defff767ad14843303dd557a67636bed1f1709b5399024

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\InstallOptions.dll

        Filesize

        22KB

        MD5

        170c17ac80215d0a377b42557252ae10

        SHA1

        4cbab6cc189d02170dd3ba7c25aa492031679411

        SHA256

        61ea114d9d0cd1e884535095aa3527a6c28df55a4ecee733c8c398f50b84cc3d

        SHA512

        0fd65cad0fcaa98083c2021de3d6429e79978658809c62ae9e4ed630c016915ced36aa52f2f692986c3b600c92325e79fd6d757634e8e02d5e582ff03679163f

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\NPFInstall.exe

        Filesize

        300KB

        MD5

        36f0e125cb870ac28cdff861a684f844

        SHA1

        2e2cdeff8b14ef9146dddb9a659bcc6532c72421

        SHA256

        0560d98683343995d5f2dd5f2607f7298bd81be7746efa0d212481fbfa76788e

        SHA512

        144e014e1047ec0bcf96821207bb4138873557a1ff47843f34ee1c33b6ff1d8365de6177a14c5f8088d0a2087142b7a1f56bf7f7aba67bdd83bbb88f3a36507b

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\System.dll

        Filesize

        19KB

        MD5

        f020a8d9ede1fb2af3651ad6e0ac9cb1

        SHA1

        341f9345d669432b2a51d107cbd101e8b82e37b1

        SHA256

        7efe73a8d32ed1b01727ad4579e9eec49c9309f2cb7bf03c8afa80d70242d1c0

        SHA512

        408fa5a797d3ff4b917bb4107771687004ba507a33cb5944b1cc3155e0372cb3e04a147f73852b9134f138ff709af3b0fb493cd8fa816c59e9f3d9b5649c68c4

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\nsExec.dll

        Filesize

        14KB

        MD5

        f9e61a25016dcb49867477c1e71a704e

        SHA1

        c01dc1fa7475e4812d158d6c00533410c597b5d9

        SHA256

        274e53dc8c5ddc273a6f5683b71b882ef8917029e2eaf6c8dbee0c62d999225d

        SHA512

        b4a6289ef9e761e29dd5362fecb1707c97d7cb3e160f4180036a96f2f904b2c64a075b5bf0fea4a3bb94dea97f3cfa0d057d3d6865c68da65fdcb9c3070c33d8

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\options.ini

        Filesize

        2KB

        MD5

        5c12cb2bec2ac5638afa58c50594efbf

        SHA1

        f7838c285482781b4b3470a917511e46b2f529a3

        SHA256

        6be0dbd9dae055bf41c260fa807241f5bd64e270978bc1c56ee133a8ace9ea97

        SHA512

        e2a67b32fce1aab31850a999842603197fa6a64deab28b1d090f18b2bb5bb3c01bae93fc97ba0edc0e1d45fb74878d55dfeef3d051d301bd079b4314003f7b70

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\options.ini

        Filesize

        2KB

        MD5

        3c0fe580cacffcc32576b876310684ed

        SHA1

        5d7bec3eba1e4cb8247fdf469b0dff9fcf42b55f

        SHA256

        b260c658556d10fd33d726456a65bcf13b1c6d7d7f6b6a4889c85cb735e0f426

        SHA512

        928633cecc94e78b287b1b8ae4889044eb88373d1f61f6fa6b9f952f157835f05367ec41990acda8ba696322cbfbfc5911227615ca00ea044aa913df7dadafb2

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\roots.p7b

        Filesize

        1KB

        MD5

        397a5848d3696fc6ba0823088fea83db

        SHA1

        9189985f027de80d4882ab5e01604c59d6fc1f16

        SHA256

        ad3bca6f2b0ec032c7f1fe1adb186bd73be6a332c868bf16c9765087fff1c1ca

        SHA512

        66129a206990753967cd98c14a0a3e0e2a73bc4cd10cf84a5a05da7bf20719376989d64c6c7880a3e4754fc74653dd49f2ffeffd55fc4ee5966f65beb857118c

      • C:\Users\Admin\AppData\Local\Temp\nslD41B.tmp\signing.p7b

        Filesize

        7KB

        MD5

        dd4bc901ef817319791337fb345932e8

        SHA1

        f8a3454a09d90a09273935020c1418fdb7b7eb7c

        SHA256

        8e681692403c0f7c0b24160f4642daa1eb080ce5ec754b6f47cc56b43e731b71

        SHA512

        0a67cc346f9752e1c868b7dc60b25704255ab1e6ea745850c069212f2724eba62ffaaa48309d5eba6ae0235223518610fb4b60fc422e4babba4f33d331c71db5

      • memory/2260-1274-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/2260-1292-0x0000000006150000-0x00000000061E6000-memory.dmp

        Filesize

        600KB

      • memory/2260-1277-0x0000000005380000-0x00000000053A2000-memory.dmp

        Filesize

        136KB

      • memory/2260-1278-0x00000000054A0000-0x0000000005506000-memory.dmp

        Filesize

        408KB

      • memory/2260-1284-0x00000000055C0000-0x0000000005626000-memory.dmp

        Filesize

        408KB

      • memory/2260-1276-0x00000000046D0000-0x00000000046E0000-memory.dmp

        Filesize

        64KB

      • memory/2260-1289-0x0000000005780000-0x0000000005AD4000-memory.dmp

        Filesize

        3.3MB

      • memory/2260-1290-0x0000000005BF0000-0x0000000005C0E000-memory.dmp

        Filesize

        120KB

      • memory/2260-1291-0x0000000005C30000-0x0000000005C7C000-memory.dmp

        Filesize

        304KB

      • memory/2260-1275-0x0000000004D10000-0x0000000005338000-memory.dmp

        Filesize

        6.2MB

      • memory/2260-1293-0x0000000005FF0000-0x000000000600A000-memory.dmp

        Filesize

        104KB

      • memory/2260-1294-0x0000000006060000-0x0000000006082000-memory.dmp

        Filesize

        136KB

      • memory/2260-1295-0x00000000071C0000-0x0000000007764000-memory.dmp

        Filesize

        5.6MB

      • memory/2260-1298-0x0000000073360000-0x0000000073B10000-memory.dmp

        Filesize

        7.7MB

      • memory/2260-1273-0x0000000073360000-0x0000000073B10000-memory.dmp

        Filesize

        7.7MB

      • memory/2260-1272-0x0000000004630000-0x0000000004666000-memory.dmp

        Filesize

        216KB

      • memory/4568-1305-0x00000000032C0000-0x00000000032D0000-memory.dmp

        Filesize

        64KB

      • memory/4568-1306-0x00000000032C0000-0x00000000032D0000-memory.dmp

        Filesize

        64KB

      • memory/4568-1304-0x0000000073360000-0x0000000073B10000-memory.dmp

        Filesize

        7.7MB

      • memory/4568-1317-0x0000000073360000-0x0000000073B10000-memory.dmp

        Filesize

        7.7MB