Analysis

  • max time kernel
    1196s
  • max time network
    1181s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2024, 16:24

General

  • Target

    Installer_patched.exe

  • Size

    18.9MB

  • MD5

    2a189d9f7f70aa04cc814a207cf4ab82

  • SHA1

    087f724eff0d1100541cf5fcc29f8180731f5ed7

  • SHA256

    567b68b4686c9e40bb50a9697cf2393c0219f4873764efbb01a2a9b2d65f0bc5

  • SHA512

    5016f7f1359303dec3f469de1ad249f2b16a294fe0d6b08f3068a720518165d5809191f3158c8529ccee78fe7d1561608ec8c062dd19b0f78360dc8182274ddd

  • SSDEEP

    196608:B9GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDV:BkYVI5DK2NNs6LtYdEhSpZ

Malware Config

Signatures

  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 13 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe
    "C:\Users\Admin\AppData\Local\Temp\Installer_patched.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\j5ki0zyl\j5ki0zyl.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:656
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7223.tmp" "c:\Users\Admin\AppData\Local\Temp\j5ki0zyl\CSC5AFC1D50958473690C49DC9E016159.TMP"
        3⤵
          PID:4340
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf"
        2⤵
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=10776B2F97B29D6B844990E8F99C7434 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
            4⤵
              PID:896
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=64E7E6EC3E28C835DFC5699A086CFD8E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=64E7E6EC3E28C835DFC5699A086CFD8E --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:1
              4⤵
                PID:436
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F670DCAC628AA2122F4C9FED8D628ECF --mojo-platform-channel-handle=2184 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                4⤵
                  PID:2568
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2FAAF3BC56393863E0DB4CAAB6480FE2 --mojo-platform-channel-handle=1916 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:3104
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5BA1F77A843EF19CFF453A19A6CD8133 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:2860
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F404A4321BE43E48F25F2B869013E3B6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F404A4321BE43E48F25F2B869013E3B6 --renderer-client-id=7 --mojo-platform-channel-handle=2476 --allow-no-sandbox-job /prefetch:1
                      4⤵
                        PID:3504

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  10b76be8493350a1918eaf0082809aac

                  SHA1

                  005abf7a0575ac42262b357f8a5626e7c73ed099

                  SHA256

                  6517445a244010501d014f38f6895c25cdce2ebf267187e9f6fb3a3fd7cbad7a

                  SHA512

                  df2f61d747aecbcdb9069bda5a4636af7d4e54a4dd5fb55e1e112b21edbfdb9357723741dacf27edc6b92363dce18f666ea338ded101567cccb88086384d549f

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\Local\Temp\0b881921-3d0c-4e45-bfb6-1e275b7d6fb1\AgileDotNetRT64.dll

                  Filesize

                  2.9MB

                  MD5

                  9bb6ed08af544d3738e60200d2804180

                  SHA1

                  5a40b484ca56b1ce59add4ec283e21d60070be02

                  SHA256

                  86d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7

                  SHA512

                  63e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5

                • C:\Users\Admin\AppData\Local\Temp\RES7223.tmp

                  Filesize

                  1KB

                  MD5

                  bf66c6b2e706a665a2a8a97b2d34c39a

                  SHA1

                  5af0a780dbfc43ef7f1e7c881ebaddee04fa42ed

                  SHA256

                  5f56191d1036e12170bdaf606243ac1c47849cfda1240e53440765349c1acdec

                  SHA512

                  5bfd059b2de6a80112b84fd0372fece3957a761cf43b27bdb59e4bab4e038365bbfddcb149e7979f5fb67d16153608b8b3bda20bead5c28344fb21c3c037e473

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s03yh5yc.i5b.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\j5ki0zyl\j5ki0zyl.dll

                  Filesize

                  3KB

                  MD5

                  850d229f656c9cfb3cf480b2d9670391

                  SHA1

                  923b8b17b14698047a1a720d3d0731f423debc27

                  SHA256

                  c102ec5360a74762f0c0bd44937b1a91a48adbb54158f5dc29fb2debf3a7e447

                  SHA512

                  c0a8030c62201626f6f3336b22e99259ef0098d2377a3597b0b700103a0b1e607a8a95b86257f8f56a4b24f56dfc1a6ec6ef4bc39b0add30580acd7209cd1046

                • C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf

                  Filesize

                  8.8MB

                  MD5

                  aa81bdaeac18676979c6c846ce2f43aa

                  SHA1

                  bda40a47ba5c5d0154c698961926fee1cb40554c

                  SHA256

                  013f4de04da240f2cf2dd3960a2c77d1cc305bafe1e05812d9e4218a56acc03b

                  SHA512

                  da549bbd27aa0ab8311dcbef0e1fb94ed1f2ecc17dc2d046e2230e43f23bb3aeed594087ed9b206af3b2540437aa293ffb47b4d9d43470e205429121a0b18254

                • \??\c:\Users\Admin\AppData\Local\Temp\j5ki0zyl\CSC5AFC1D50958473690C49DC9E016159.TMP

                  Filesize

                  652B

                  MD5

                  9597ff62394ca47db73c726a2fd71866

                  SHA1

                  4803706121d1d7b244ce199b6986a6f4f3be62c6

                  SHA256

                  c6ffd1da73e4841facb5720e037d23e1517702cd43faa51f589af4fa54ec4070

                  SHA512

                  d2ccfc0888a9461591cbf4b11aea9b6ba20e44b0778dd3c3a5ae7595425669969b06e2347993a22e4a0bf4d76b811ca962d8799e77ff7152ae9c4678d67f937d

                • \??\c:\Users\Admin\AppData\Local\Temp\j5ki0zyl\j5ki0zyl.0.cs

                  Filesize

                  244B

                  MD5

                  b999975748af32dd007ff48814430b26

                  SHA1

                  46b54a3e3be2d3497127d67b96b3f6a55d26447d

                  SHA256

                  ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69

                  SHA512

                  f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e

                • \??\c:\Users\Admin\AppData\Local\Temp\j5ki0zyl\j5ki0zyl.cmdline

                  Filesize

                  369B

                  MD5

                  f22652f19ebaf6be515b42df328c81ff

                  SHA1

                  aae202ab50094188cab04ac4de332ddb46e59260

                  SHA256

                  b6b18f90316d2e3803eda224695cf04d5db196f0879f83ea707f34ee831bf9ea

                  SHA512

                  cf445af5a17a13b652e4c367c47b1bc4763e757d3f1eabbfb2c4c5a732b25c54bb69c29066d5f4bf1910c20de2be81cc8702de018d043e3142d6d11f79576a74

                • memory/2712-71-0x0000000007A30000-0x0000000007A51000-memory.dmp

                  Filesize

                  132KB

                • memory/2828-23-0x00000000303D0000-0x00000000303F2000-memory.dmp

                  Filesize

                  136KB

                • memory/2828-170-0x0000000015FC0000-0x0000000015FD0000-memory.dmp

                  Filesize

                  64KB

                • memory/2828-0-0x00007FF9E11D0000-0x00007FF9E1C92000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2828-40-0x0000000032470000-0x0000000032546000-memory.dmp

                  Filesize

                  856KB

                • memory/2828-14-0x00007FF9DFA80000-0x00007FF9DFBCF000-memory.dmp

                  Filesize

                  1.3MB

                • memory/2828-69-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-11-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-9-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-2-0x0000000015FC0000-0x0000000015FD0000-memory.dmp

                  Filesize

                  64KB

                • memory/2828-1-0x0000000000FF0000-0x0000000001FF0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/2828-169-0x00007FF9E11D0000-0x00007FF9E1C92000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2828-36-0x0000000030490000-0x0000000030498000-memory.dmp

                  Filesize

                  32KB

                • memory/2828-176-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-183-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-243-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-249-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-255-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-315-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-321-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-339-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2828-345-0x00007FF9D9470000-0x00007FF9D9C22000-memory.dmp

                  Filesize

                  7.7MB