Analysis

  • max time kernel
    1198s
  • max time network
    888s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/03/2024, 16:24

General

  • Target

    Installer_patched.exe

  • Size

    18.9MB

  • MD5

    2a189d9f7f70aa04cc814a207cf4ab82

  • SHA1

    087f724eff0d1100541cf5fcc29f8180731f5ed7

  • SHA256

    567b68b4686c9e40bb50a9697cf2393c0219f4873764efbb01a2a9b2d65f0bc5

  • SHA512

    5016f7f1359303dec3f469de1ad249f2b16a294fe0d6b08f3068a720518165d5809191f3158c8529ccee78fe7d1561608ec8c062dd19b0f78360dc8182274ddd

  • SSDEEP

    196608:B9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDV:BkYVI5DK2NNs6LtYdEhSpZ

Malware Config

Signatures

  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe
    "C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ael5pzgr\ael5pzgr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBDE1.tmp" "c:\Users\Admin\AppData\Local\Temp\ael5pzgr\CSC36FF8B0C10DE45C981EEEEABF437F3B4.TMP"
        3⤵
          PID:4516
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf"
        2⤵
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2796
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FFC1C7191B14C7D8D7D03E6141AD1C42 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
            4⤵
              PID:3424
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7C481EB2D82B8083E74E94CFD535A0E1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7C481EB2D82B8083E74E94CFD535A0E1 --renderer-client-id=2 --mojo-platform-channel-handle=1632 --allow-no-sandbox-job /prefetch:1
              4⤵
                PID:1120
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CEEA8B59E7BDCC6DF9881DC21BA38819 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CEEA8B59E7BDCC6DF9881DC21BA38819 --renderer-client-id=4 --mojo-platform-channel-handle=2224 --allow-no-sandbox-job /prefetch:1
                4⤵
                  PID:5092
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A9C6D026F6F1FBC448AD32FF09BEFADD --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:2776
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=77978EB30365C994E5DB384655A4E283 --mojo-platform-channel-handle=1852 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:1644
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F50F9943D5CF147DE7CBE56627F22E35 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      4⤵
                        PID:960

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  1575b144bb07242471c28136b85f3378

                  SHA1

                  7e098974c7f4163e091a9d812ebb660e861d56a7

                  SHA256

                  0e4725da3247ef01ab53b0a7ccc0ed3077ccfb9d1f6f7c5e32f574873e6add7b

                  SHA512

                  bac138462504492333b746e771611767bb8ec9fdf739207f833d60812e330f432059f304b3e4bfedf5671b33a9548fa579108b2e3a506b322615cf83845f613c

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\Local\Temp\RESBDE1.tmp

                  Filesize

                  1KB

                  MD5

                  126831cae3fdfb3f44876a01303bd4f2

                  SHA1

                  6e1760fd340c067b0784fc2fd4d90a6b710456b1

                  SHA256

                  69fcadfde357328ed301972a5d3f37d62aabaf3003870b4773caf66fea3a4aa1

                  SHA512

                  fdf5712fcb16ff9f020bacfa45fd78fee9104ce16bebb1acc38f7191a31c84dc0498db95e6008561ce9f52778da9209d6016d12423135f08ac2350484532e3eb

                • C:\Users\Admin\AppData\Local\Temp\ael5pzgr\ael5pzgr.dll

                  Filesize

                  3KB

                  MD5

                  fddfcd575d3e6372a82b3a8b7be888ff

                  SHA1

                  824f298b3d0ce154b9aa1734b395f0d466f2c6a4

                  SHA256

                  65a4a7039621124cfaf29122f730eeb23906714e8283cd38646bae79b83ddaaa

                  SHA512

                  3231e144df3c965071362c324b4955b46c1e61f1ec32bf0bf43cfaa121eeaf59e88892f1a24ce6d7c5a0e43215be8ac0a9e42874c87995f462d138b3fa23a1de

                • C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf

                  Filesize

                  1.2MB

                  MD5

                  68f8dd08d18ffcab6ce7cd36b2afb628

                  SHA1

                  56ff35449bbc305f220b3341242834e03de03e1a

                  SHA256

                  45a0e460d69c8bc0af5d2ec0c04e54dcc6c1ec2fd2d09a20f72f8a7adc46569c

                  SHA512

                  529dd745877bc71a5ecd7f424ebb48576cb6893b12ad4e93c31a1618549f02b79804b63aea55727234645c97112271a82e236ab9e8f0f1aba98e2feae56f41ca

                • \??\c:\Users\Admin\AppData\Local\Temp\ael5pzgr\CSC36FF8B0C10DE45C981EEEEABF437F3B4.TMP

                  Filesize

                  652B

                  MD5

                  2d986d4b8a9e9d572adef2235f4e264b

                  SHA1

                  1f5301fc51c776d63061ccbd82eba123f20a126a

                  SHA256

                  fd2587e4d5285e1c96b7de7f788e03f2aca7901cec00ef23ac6e089eb66c0d43

                  SHA512

                  474852a86c25c7f0743a8cb46d0ebfef71dc03536e63d9dcacb78d6d52c44ba68975dd99387aaa419032eef90e7ed28e660b2da307f504ed04a9add28459ab2e

                • \??\c:\Users\Admin\AppData\Local\Temp\ael5pzgr\ael5pzgr.0.cs

                  Filesize

                  244B

                  MD5

                  b999975748af32dd007ff48814430b26

                  SHA1

                  46b54a3e3be2d3497127d67b96b3f6a55d26447d

                  SHA256

                  ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69

                  SHA512

                  f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e

                • \??\c:\Users\Admin\AppData\Local\Temp\ael5pzgr\ael5pzgr.cmdline

                  Filesize

                  369B

                  MD5

                  cbc723c7d103c10dbed8062f2dc0fc06

                  SHA1

                  0a0c59e48d7e23fc45402924bdd1acc3184940ec

                  SHA256

                  aa16824cfad60e584d0687155b1f2ebc6416ebc3742946f66eee8f491b9af52e

                  SHA512

                  5d749cee980b6e0ad8ccc5a0ed48fe25ee71884757bdccc19b201c43885e701645b5c2beaad6d01e5dd735b801ee403d72881a65b1af4c5fbf1a0fda6d605af1

                • \Users\Admin\AppData\Local\Temp\0b881921-3d0c-4e45-bfb6-1e275b7d6fb1\AgileDotNetRT64.dll

                  Filesize

                  2.9MB

                  MD5

                  9bb6ed08af544d3738e60200d2804180

                  SHA1

                  5a40b484ca56b1ce59add4ec283e21d60070be02

                  SHA256

                  86d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7

                  SHA512

                  63e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5

                • memory/1636-29-0x000000002FF70000-0x000000002FF78000-memory.dmp

                  Filesize

                  32KB

                • memory/1636-2-0x000000002FF80000-0x000000002FF90000-memory.dmp

                  Filesize

                  64KB

                • memory/1636-0-0x00007FFDC1130000-0x00007FFDC1B1C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1636-15-0x000000002FE00000-0x000000002FE22000-memory.dmp

                  Filesize

                  136KB

                • memory/1636-9-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-33-0x00000000322B0000-0x0000000032386000-memory.dmp

                  Filesize

                  856KB

                • memory/1636-14-0x00007FFDC0F00000-0x00007FFDC102C000-memory.dmp

                  Filesize

                  1.2MB

                • memory/1636-35-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-11-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-16-0x0000000030510000-0x0000000030586000-memory.dmp

                  Filesize

                  472KB

                • memory/1636-83-0x00007FFDC1130000-0x00007FFDC1B1C000-memory.dmp

                  Filesize

                  9.9MB

                • memory/1636-122-0x000000002FF80000-0x000000002FF90000-memory.dmp

                  Filesize

                  64KB

                • memory/1636-1-0x0000000000AF0000-0x0000000001AF0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/1636-169-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-176-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-308-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1636-374-0x00007FFDAB170000-0x00007FFDAB922000-memory.dmp

                  Filesize

                  7.7MB