Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 16:33

General

  • Target

    f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe

  • Size

    3.6MB

  • MD5

    f6336737452a7a106dde9be8ba468a0c

  • SHA1

    19b4f742ad0beb3bd2306b8e8b1d989e52a01365

  • SHA256

    76c9ba959cb30c682c744ec265b3ae18fa5f92250cdc153139fb83835ca17356

  • SHA512

    8df61530106e314cc78f82907ae89896b3281721bfe440565219c5fcebf01a90ef0bfeb55d6c7069ee68a9a1711dbca28fb9060d1ffc6026f706a2744ed539de

  • SSDEEP

    98304:ysevup9c1bf8FmhU3sXZi1ZsarTqLpRgj+uMeCm6:yI9wBhJYZsATqYCuBC

Malware Config

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

redline

Botnet

pub2

C2

185.92.73.84:80

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 47 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS49869D06\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
            PID:2496
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1632
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed12ff8f9303069a13.exe
            4⤵
            • Loads dropped DLL
            PID:2124
            • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12ff8f9303069a13.exe
              Wed12ff8f9303069a13.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2756
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12ff8f9303069a13.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12ff8f9303069a13.exe" -a
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2272
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed1258b9cb39.exe
            4⤵
            • Loads dropped DLL
            PID:2264
            • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed1258b9cb39.exe
              Wed1258b9cb39.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:1036
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Wed122efa49d386.exe
            4⤵
              PID:1652
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed122efa49d386.exe
                Wed122efa49d386.exe
                5⤵
                • Executes dropped EXE
                PID:2760
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed122efa49d386.exe
                "C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed122efa49d386.exe"
                5⤵
                • Executes dropped EXE
                PID:2076
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12b86e03fc.exe
              4⤵
              • Loads dropped DLL
              PID:2796
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12b86e03fc.exe
                Wed12b86e03fc.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies system certificate store
                PID:2952
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 944
                  6⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2536
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed120d4de2378.exe
              4⤵
              • Loads dropped DLL
              PID:2820
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed120d4de2378.exe
                Wed120d4de2378.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1504
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed127454568dab5787.exe
              4⤵
              • Loads dropped DLL
              PID:2844
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed127454568dab5787.exe
                Wed127454568dab5787.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2552
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12f234a21660d.exe
              4⤵
              • Loads dropped DLL
              PID:2920
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12f234a21660d.exe
                Wed12f234a21660d.exe
                5⤵
                • Executes dropped EXE
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:2944
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c Wed12691e8dbf.exe
              4⤵
              • Loads dropped DLL
              PID:2996
              • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12691e8dbf.exe
                Wed12691e8dbf.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2428
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 424
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:328

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\7zS49869D06\Wed122efa49d386.exe

        Filesize

        900KB

        MD5

        0a0d22f1c9179a67d04166de0db02dbb

        SHA1

        106e55bd898b5574f9bd33dac9f3c0b95cecd90d

        SHA256

        a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac

        SHA512

        8abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b

      • C:\Users\Admin\AppData\Local\Temp\Tar284F.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed120d4de2378.exe

        Filesize

        300KB

        MD5

        953d93e24956822e11d1ff9e433731d4

        SHA1

        3f45bcca182046fa8957821089d804200227985d

        SHA256

        f4eb31de9302b29f94e951cd77159b29ad6f36dc48dff1df573d13be632a0c16

        SHA512

        c3791ebb2a90a82c4b937b58daa979a6e33d14606a5e89f398d56c8093d6582c76287576486c9292f0af00f7c7823147ef9d3993f47bb582b6f91c6fd9461137

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed1258b9cb39.exe

        Filesize

        267KB

        MD5

        0d09277405cb84cd4e0b465759b9b73f

        SHA1

        b98be57eeee56ad576656b554d22069422e20f89

        SHA256

        5e3ee0b5954c435e10c41a144ffb9e17e02898fd3a2b074943ad7d202e4ae4f3

        SHA512

        8a6bbcf38db54e585cdf6a0179392b37d4b69352f650e017eb264109b6b337bed1ecd1135e7fe3013e76421bba1886441ec4e1df22e8c10799a27f6e0b8f20d9

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12691e8dbf.exe

        Filesize

        8KB

        MD5

        d640812863d65d90669e5b9194649f83

        SHA1

        dc2ec2d486ffeb8008c9dd9cfb91a100a3127b48

        SHA256

        2906cff26bce67c4a6c12d1f1d1691ab0f8ce7f98b8c5876c9385887fa7f021e

        SHA512

        f3078d3c2a63eff17eba10513c216be9a760b79a9dc7c06de7a47715c4c368275269d33b3bdb04b27c696796ee612f753a0c309b296c7fd63138bff8bb87e09d

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed127454568dab5787.exe

        Filesize

        1.7MB

        MD5

        05a0baf55450d99cb0fa0ee652e2cd0c

        SHA1

        e7334de04c18c241a091c3327cdcd56e85cc6baf

        SHA256

        4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c

        SHA512

        b6d1fc00d7b076068b0879fa4d29b68d3054b5fca24edd5852077bf34d37c43e79cb74fda9c45014610b317d57d70369a3e197784c04bc3c6eac5e1ea9a64fff

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12b86e03fc.exe

        Filesize

        604KB

        MD5

        1e90790e7d177d29fc32f926a419c534

        SHA1

        25142c6b5243f09542d28ce75f42f8b1e337bf18

        SHA256

        859b840ac0113845859e79c66583996665f246ccc6f3ebfe419e2e07e8f515cc

        SHA512

        667f4c651debd720b8f4c534fd4690a9cc2ddbce98d7577285f6e42b88e71ba209433ad0dcb3dc7d34b79df7a59ad6d1e7c8602365b5501d85a235c3d84d4f6d

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12f234a21660d.exe

        Filesize

        180KB

        MD5

        b4fc051f0e24474bbdc858ddd81b4572

        SHA1

        1b7650afe1b152e1a6eca0e9490d3b53c9b273d7

        SHA256

        d9ad89bed347d1477d54cf99a56cadbb71da8487d3f251769f129fa0d1d85d9a

        SHA512

        5f9b9981b30bd91dc01cb52655885c0797949f959454560632f5969d8cf7e9743720893bbf4a82b6aea9cf34b30bbc90f324f1524a182c07a1dc37855c4d2818

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\Wed12ff8f9303069a13.exe

        Filesize

        56KB

        MD5

        c0d18a829910babf695b4fdaea21a047

        SHA1

        236a19746fe1a1063ebe077c8a0553566f92ef0f

        SHA256

        78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

        SHA512

        cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\libcurl.dll

        Filesize

        218KB

        MD5

        d09be1f47fd6b827c81a4812b4f7296f

        SHA1

        028ae3596c0790e6d7f9f2f3c8e9591527d267f7

        SHA256

        0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

        SHA512

        857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\libcurlpp.dll

        Filesize

        54KB

        MD5

        e6e578373c2e416289a8da55f1dc5e8e

        SHA1

        b601a229b66ec3d19c2369b36216c6f6eb1c063e

        SHA256

        43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

        SHA512

        9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\libgcc_s_dw2-1.dll

        Filesize

        113KB

        MD5

        9aec524b616618b0d3d00b27b6f51da1

        SHA1

        64264300801a353db324d11738ffed876550e1d3

        SHA256

        59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

        SHA512

        0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\libstdc++-6.dll

        Filesize

        647KB

        MD5

        5e279950775baae5fea04d2cc4526bcc

        SHA1

        8aef1e10031c3629512c43dd8b0b5d9060878453

        SHA256

        97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

        SHA512

        666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\libwinpthread-1.dll

        Filesize

        69KB

        MD5

        1e0d62c34ff2e649ebc5c372065732ee

        SHA1

        fcfaa36ba456159b26140a43e80fbd7e9d9af2de

        SHA256

        509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

        SHA512

        3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

      • \Users\Admin\AppData\Local\Temp\7zS49869D06\setup_install.exe

        Filesize

        2.1MB

        MD5

        fc81ec59e515648eb844e4268b5c24c2

        SHA1

        5802c0d9af65954716c921ea6df0a867e0606ed1

        SHA256

        960c3c31011eed2057ccabdf997d5038a32b8a5f2b651aaee11f364be490cc31

        SHA512

        0dddb9c332531f1850a3af64d6ce4b347644e04481db687efe0fdb0dc56aba9aa1b4ce8bdfdf55bc21d543c2b31070858f7b2dd5551a23c1e9091c1210452855

      • \Users\Admin\AppData\Local\Temp\setup_installer.exe

        Filesize

        3.6MB

        MD5

        1df01ae4f663bbb5bdc2abb2d68a1348

        SHA1

        bed2b62f36b774a21cb14ee8c1e98363458028fc

        SHA256

        b1c5d186dc4924256dc9e8f9fad845bdb583f7028c547aa8ca2fe2076e2a081f

        SHA512

        7cc3faf78ffdaa3ef2327cea4ea22f062934e1029dc4727428cfc4a7dad943a94f0bc39b061dfdec1277f364584f7bf0e92c22aa22c44e6d34e524ac0ad684be

      • memory/1036-239-0x0000000000400000-0x00000000023AC000-memory.dmp

        Filesize

        31.7MB

      • memory/1036-172-0x0000000002550000-0x0000000002650000-memory.dmp

        Filesize

        1024KB

      • memory/1036-173-0x0000000000250000-0x0000000000259000-memory.dmp

        Filesize

        36KB

      • memory/1036-174-0x0000000000400000-0x00000000023AC000-memory.dmp

        Filesize

        31.7MB

      • memory/1200-238-0x0000000002E60000-0x0000000002E75000-memory.dmp

        Filesize

        84KB

      • memory/1504-178-0x0000000000400000-0x0000000002CDB000-memory.dmp

        Filesize

        40.9MB

      • memory/1504-159-0x0000000002CE0000-0x0000000002D04000-memory.dmp

        Filesize

        144KB

      • memory/1504-180-0x00000000076D0000-0x0000000007710000-memory.dmp

        Filesize

        256KB

      • memory/1504-177-0x0000000000260000-0x0000000000290000-memory.dmp

        Filesize

        192KB

      • memory/1504-302-0x00000000076D0000-0x0000000007710000-memory.dmp

        Filesize

        256KB

      • memory/1504-176-0x0000000002DB0000-0x0000000002EB0000-memory.dmp

        Filesize

        1024KB

      • memory/1504-162-0x0000000002FB0000-0x0000000002FD2000-memory.dmp

        Filesize

        136KB

      • memory/1632-168-0x00000000739F0000-0x0000000073F9B000-memory.dmp

        Filesize

        5.7MB

      • memory/2324-75-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-70-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2324-57-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2324-277-0x0000000000400000-0x000000000051B000-memory.dmp

        Filesize

        1.1MB

      • memory/2324-278-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2324-280-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2324-281-0x000000006EB40000-0x000000006EB63000-memory.dmp

        Filesize

        140KB

      • memory/2324-282-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-78-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2324-79-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2324-279-0x000000006B280000-0x000000006B2A6000-memory.dmp

        Filesize

        152KB

      • memory/2324-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2324-76-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-74-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-73-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

        Filesize

        1.5MB

      • memory/2324-68-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2324-67-0x0000000064940000-0x0000000064959000-memory.dmp

        Filesize

        100KB

      • memory/2324-71-0x000000006B440000-0x000000006B4CF000-memory.dmp

        Filesize

        572KB

      • memory/2428-169-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2428-300-0x000000001AF30000-0x000000001AFB0000-memory.dmp

        Filesize

        512KB

      • memory/2428-175-0x000000001AF30000-0x000000001AFB0000-memory.dmp

        Filesize

        512KB

      • memory/2428-299-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2428-113-0x0000000000E20000-0x0000000000E28000-memory.dmp

        Filesize

        32KB

      • memory/2944-276-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2944-157-0x0000000000250000-0x0000000000272000-memory.dmp

        Filesize

        136KB

      • memory/2944-134-0x0000000000B20000-0x0000000000B52000-memory.dmp

        Filesize

        200KB

      • memory/2944-155-0x0000000000240000-0x0000000000246000-memory.dmp

        Filesize

        24KB

      • memory/2944-167-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2944-160-0x0000000000270000-0x0000000000276000-memory.dmp

        Filesize

        24KB

      • memory/2952-171-0x0000000000400000-0x0000000002400000-memory.dmp

        Filesize

        32.0MB

      • memory/2952-283-0x0000000000400000-0x0000000002400000-memory.dmp

        Filesize

        32.0MB

      • memory/2952-170-0x0000000002860000-0x00000000028FD000-memory.dmp

        Filesize

        628KB

      • memory/2952-179-0x00000000025A0000-0x00000000026A0000-memory.dmp

        Filesize

        1024KB

      • memory/2952-301-0x00000000025A0000-0x00000000026A0000-memory.dmp

        Filesize

        1024KB