Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 16:33

General

  • Target

    f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe

  • Size

    3.6MB

  • MD5

    f6336737452a7a106dde9be8ba468a0c

  • SHA1

    19b4f742ad0beb3bd2306b8e8b1d989e52a01365

  • SHA256

    76c9ba959cb30c682c744ec265b3ae18fa5f92250cdc153139fb83835ca17356

  • SHA512

    8df61530106e314cc78f82907ae89896b3281721bfe440565219c5fcebf01a90ef0bfeb55d6c7069ee68a9a1711dbca28fb9060d1ffc6026f706a2744ed539de

  • SSDEEP

    98304:ysevup9c1bf8FmhU3sXZi1ZsarTqLpRgj+uMeCm6:yI9wBhJYZsATqYCuBC

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

redline

Botnet

pub2

C2

185.92.73.84:80

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6336737452a7a106dde9be8ba468a0c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Users\Admin\AppData\Local\Temp\7zS07021217\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS07021217\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3764
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed12ff8f9303069a13.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4996
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12ff8f9303069a13.exe
            Wed12ff8f9303069a13.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:376
            • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12ff8f9303069a13.exe
              "C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12ff8f9303069a13.exe" -a
              6⤵
              • Executes dropped EXE
              PID:2056
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed1258b9cb39.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1388
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed1258b9cb39.exe
            Wed1258b9cb39.exe
            5⤵
            • Executes dropped EXE
            • Checks SCSI registry key(s)
            PID:3948
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 360
              6⤵
              • Program crash
              PID:3576
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed122efa49d386.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3544
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed122efa49d386.exe
            Wed122efa49d386.exe
            5⤵
            • Executes dropped EXE
            PID:716
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed12b86e03fc.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12b86e03fc.exe
            Wed12b86e03fc.exe
            5⤵
            • Executes dropped EXE
            PID:1936
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed120d4de2378.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5088
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed120d4de2378.exe
            Wed120d4de2378.exe
            5⤵
            • Executes dropped EXE
            PID:3968
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed127454568dab5787.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4560
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed127454568dab5787.exe
            Wed127454568dab5787.exe
            5⤵
            • Executes dropped EXE
            PID:3484
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed12f234a21660d.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1976
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12f234a21660d.exe
            Wed12f234a21660d.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2512
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Wed12691e8dbf.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4680
          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12691e8dbf.exe
            Wed12691e8dbf.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:1408
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 556
          4⤵
          • Program crash
          PID:1148
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2888 -ip 2888
    1⤵
      PID:3936
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3948 -ip 3948
      1⤵
        PID:3144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1936 -ip 1936
        1⤵
          PID:3804
        • C:\Windows\system32\WerFaultSecure.exe
          "C:\Windows\system32\WerFaultSecure.exe" -protectedcrash -p 3120 -i 3120 -h 520 -j 552 -s 556 -d 1044
          1⤵
            PID:1992
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
            1⤵
            • Modifies data under HKEY_USERS
            PID:3112

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed120d4de2378.exe

            Filesize

            300KB

            MD5

            953d93e24956822e11d1ff9e433731d4

            SHA1

            3f45bcca182046fa8957821089d804200227985d

            SHA256

            f4eb31de9302b29f94e951cd77159b29ad6f36dc48dff1df573d13be632a0c16

            SHA512

            c3791ebb2a90a82c4b937b58daa979a6e33d14606a5e89f398d56c8093d6582c76287576486c9292f0af00f7c7823147ef9d3993f47bb582b6f91c6fd9461137

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed122efa49d386.exe

            Filesize

            900KB

            MD5

            0a0d22f1c9179a67d04166de0db02dbb

            SHA1

            106e55bd898b5574f9bd33dac9f3c0b95cecd90d

            SHA256

            a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac

            SHA512

            8abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed1258b9cb39.exe

            Filesize

            267KB

            MD5

            0d09277405cb84cd4e0b465759b9b73f

            SHA1

            b98be57eeee56ad576656b554d22069422e20f89

            SHA256

            5e3ee0b5954c435e10c41a144ffb9e17e02898fd3a2b074943ad7d202e4ae4f3

            SHA512

            8a6bbcf38db54e585cdf6a0179392b37d4b69352f650e017eb264109b6b337bed1ecd1135e7fe3013e76421bba1886441ec4e1df22e8c10799a27f6e0b8f20d9

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12691e8dbf.exe

            Filesize

            8KB

            MD5

            d640812863d65d90669e5b9194649f83

            SHA1

            dc2ec2d486ffeb8008c9dd9cfb91a100a3127b48

            SHA256

            2906cff26bce67c4a6c12d1f1d1691ab0f8ce7f98b8c5876c9385887fa7f021e

            SHA512

            f3078d3c2a63eff17eba10513c216be9a760b79a9dc7c06de7a47715c4c368275269d33b3bdb04b27c696796ee612f753a0c309b296c7fd63138bff8bb87e09d

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed127454568dab5787.exe

            Filesize

            1.7MB

            MD5

            05a0baf55450d99cb0fa0ee652e2cd0c

            SHA1

            e7334de04c18c241a091c3327cdcd56e85cc6baf

            SHA256

            4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c

            SHA512

            b6d1fc00d7b076068b0879fa4d29b68d3054b5fca24edd5852077bf34d37c43e79cb74fda9c45014610b317d57d70369a3e197784c04bc3c6eac5e1ea9a64fff

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12b86e03fc.exe

            Filesize

            604KB

            MD5

            1e90790e7d177d29fc32f926a419c534

            SHA1

            25142c6b5243f09542d28ce75f42f8b1e337bf18

            SHA256

            859b840ac0113845859e79c66583996665f246ccc6f3ebfe419e2e07e8f515cc

            SHA512

            667f4c651debd720b8f4c534fd4690a9cc2ddbce98d7577285f6e42b88e71ba209433ad0dcb3dc7d34b79df7a59ad6d1e7c8602365b5501d85a235c3d84d4f6d

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12f234a21660d.exe

            Filesize

            180KB

            MD5

            b4fc051f0e24474bbdc858ddd81b4572

            SHA1

            1b7650afe1b152e1a6eca0e9490d3b53c9b273d7

            SHA256

            d9ad89bed347d1477d54cf99a56cadbb71da8487d3f251769f129fa0d1d85d9a

            SHA512

            5f9b9981b30bd91dc01cb52655885c0797949f959454560632f5969d8cf7e9743720893bbf4a82b6aea9cf34b30bbc90f324f1524a182c07a1dc37855c4d2818

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\Wed12ff8f9303069a13.exe

            Filesize

            56KB

            MD5

            c0d18a829910babf695b4fdaea21a047

            SHA1

            236a19746fe1a1063ebe077c8a0553566f92ef0f

            SHA256

            78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

            SHA512

            cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\libcurl.dll

            Filesize

            218KB

            MD5

            d09be1f47fd6b827c81a4812b4f7296f

            SHA1

            028ae3596c0790e6d7f9f2f3c8e9591527d267f7

            SHA256

            0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

            SHA512

            857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\libcurlpp.dll

            Filesize

            54KB

            MD5

            e6e578373c2e416289a8da55f1dc5e8e

            SHA1

            b601a229b66ec3d19c2369b36216c6f6eb1c063e

            SHA256

            43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

            SHA512

            9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\libgcc_s_dw2-1.dll

            Filesize

            113KB

            MD5

            9aec524b616618b0d3d00b27b6f51da1

            SHA1

            64264300801a353db324d11738ffed876550e1d3

            SHA256

            59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

            SHA512

            0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\libstdc++-6.dll

            Filesize

            647KB

            MD5

            5e279950775baae5fea04d2cc4526bcc

            SHA1

            8aef1e10031c3629512c43dd8b0b5d9060878453

            SHA256

            97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

            SHA512

            666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\libwinpthread-1.dll

            Filesize

            69KB

            MD5

            1e0d62c34ff2e649ebc5c372065732ee

            SHA1

            fcfaa36ba456159b26140a43e80fbd7e9d9af2de

            SHA256

            509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

            SHA512

            3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

          • C:\Users\Admin\AppData\Local\Temp\7zS07021217\setup_install.exe

            Filesize

            2.1MB

            MD5

            fc81ec59e515648eb844e4268b5c24c2

            SHA1

            5802c0d9af65954716c921ea6df0a867e0606ed1

            SHA256

            960c3c31011eed2057ccabdf997d5038a32b8a5f2b651aaee11f364be490cc31

            SHA512

            0dddb9c332531f1850a3af64d6ce4b347644e04481db687efe0fdb0dc56aba9aa1b4ce8bdfdf55bc21d543c2b31070858f7b2dd5551a23c1e9091c1210452855

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_001yi3ve.sjd.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe

            Filesize

            3.6MB

            MD5

            1df01ae4f663bbb5bdc2abb2d68a1348

            SHA1

            bed2b62f36b774a21cb14ee8c1e98363458028fc

            SHA256

            b1c5d186dc4924256dc9e8f9fad845bdb583f7028c547aa8ca2fe2076e2a081f

            SHA512

            7cc3faf78ffdaa3ef2327cea4ea22f062934e1029dc4727428cfc4a7dad943a94f0bc39b061dfdec1277f364584f7bf0e92c22aa22c44e6d34e524ac0ad684be

          • memory/1408-99-0x000000001B830000-0x000000001B840000-memory.dmp

            Filesize

            64KB

          • memory/1408-90-0x00007FF89A620000-0x00007FF89B0E1000-memory.dmp

            Filesize

            10.8MB

          • memory/1408-164-0x00007FF89A620000-0x00007FF89B0E1000-memory.dmp

            Filesize

            10.8MB

          • memory/1408-83-0x0000000000CD0000-0x0000000000CD8000-memory.dmp

            Filesize

            32KB

          • memory/1936-124-0x0000000000400000-0x0000000002400000-memory.dmp

            Filesize

            32.0MB

          • memory/1936-112-0x0000000002620000-0x0000000002720000-memory.dmp

            Filesize

            1024KB

          • memory/1936-113-0x0000000004000000-0x000000000409D000-memory.dmp

            Filesize

            628KB

          • memory/2512-101-0x0000000000900000-0x0000000000906000-memory.dmp

            Filesize

            24KB

          • memory/2512-97-0x00000000008E0000-0x0000000000902000-memory.dmp

            Filesize

            136KB

          • memory/2512-165-0x00007FF89A620000-0x00007FF89B0E1000-memory.dmp

            Filesize

            10.8MB

          • memory/2512-93-0x00007FF89A620000-0x00007FF89B0E1000-memory.dmp

            Filesize

            10.8MB

          • memory/2512-120-0x000000001AE20000-0x000000001AE30000-memory.dmp

            Filesize

            64KB

          • memory/2512-95-0x00000000008C0000-0x00000000008C6000-memory.dmp

            Filesize

            24KB

          • memory/2512-92-0x00000000000F0000-0x0000000000122000-memory.dmp

            Filesize

            200KB

          • memory/2888-59-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/2888-68-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/2888-69-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/2888-67-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-63-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-66-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-131-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-126-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/2888-130-0x000000006EB40000-0x000000006EB63000-memory.dmp

            Filesize

            140KB

          • memory/2888-65-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-64-0x000000006FE40000-0x000000006FFC6000-memory.dmp

            Filesize

            1.5MB

          • memory/2888-56-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/2888-129-0x000000006B280000-0x000000006B2A6000-memory.dmp

            Filesize

            152KB

          • memory/2888-128-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/2888-125-0x0000000000400000-0x000000000051B000-memory.dmp

            Filesize

            1.1MB

          • memory/2888-62-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/2888-61-0x0000000064940000-0x0000000064959000-memory.dmp

            Filesize

            100KB

          • memory/2888-58-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/2888-60-0x000000006B440000-0x000000006B4CF000-memory.dmp

            Filesize

            572KB

          • memory/3764-117-0x0000000005600000-0x0000000005954000-memory.dmp

            Filesize

            3.3MB

          • memory/3764-151-0x0000000007400000-0x0000000007A7A000-memory.dmp

            Filesize

            6.5MB

          • memory/3764-176-0x0000000073290000-0x0000000073A40000-memory.dmp

            Filesize

            7.7MB

          • memory/3764-122-0x0000000005A20000-0x0000000005A3E000-memory.dmp

            Filesize

            120KB

          • memory/3764-123-0x0000000006030000-0x000000000607C000-memory.dmp

            Filesize

            304KB

          • memory/3764-172-0x00000000070A0000-0x00000000070BA000-memory.dmp

            Filesize

            104KB

          • memory/3764-173-0x0000000007090000-0x0000000007098000-memory.dmp

            Filesize

            32KB

          • memory/3764-116-0x0000000005590000-0x00000000055F6000-memory.dmp

            Filesize

            408KB

          • memory/3764-114-0x00000000054F0000-0x0000000005556000-memory.dmp

            Filesize

            408KB

          • memory/3764-100-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/3764-96-0x0000000073290000-0x0000000073A40000-memory.dmp

            Filesize

            7.7MB

          • memory/3764-98-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/3764-133-0x0000000006A10000-0x0000000006A42000-memory.dmp

            Filesize

            200KB

          • memory/3764-134-0x000000006F0A0000-0x000000006F0EC000-memory.dmp

            Filesize

            304KB

          • memory/3764-132-0x000000007FB10000-0x000000007FB20000-memory.dmp

            Filesize

            64KB

          • memory/3764-144-0x0000000005F70000-0x0000000005F8E000-memory.dmp

            Filesize

            120KB

          • memory/3764-145-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/3764-146-0x0000000006CD0000-0x0000000006D73000-memory.dmp

            Filesize

            652KB

          • memory/3764-171-0x0000000006FB0000-0x0000000006FC4000-memory.dmp

            Filesize

            80KB

          • memory/3764-170-0x0000000006FA0000-0x0000000006FAE000-memory.dmp

            Filesize

            56KB

          • memory/3764-169-0x0000000006F70000-0x0000000006F81000-memory.dmp

            Filesize

            68KB

          • memory/3764-166-0x0000000006FE0000-0x0000000007076000-memory.dmp

            Filesize

            600KB

          • memory/3764-167-0x0000000073290000-0x0000000073A40000-memory.dmp

            Filesize

            7.7MB

          • memory/3764-111-0x0000000004B90000-0x0000000004BB2000-memory.dmp

            Filesize

            136KB

          • memory/3764-153-0x0000000006D80000-0x0000000006D9A000-memory.dmp

            Filesize

            104KB

          • memory/3764-91-0x0000000000AE0000-0x0000000000B16000-memory.dmp

            Filesize

            216KB

          • memory/3764-94-0x0000000004BD0000-0x00000000051F8000-memory.dmp

            Filesize

            6.2MB

          • memory/3764-162-0x0000000006DF0000-0x0000000006DFA000-memory.dmp

            Filesize

            40KB

          • memory/3948-115-0x0000000002610000-0x0000000002619000-memory.dmp

            Filesize

            36KB

          • memory/3948-121-0x00000000026F0000-0x00000000027F0000-memory.dmp

            Filesize

            1024KB

          • memory/3948-118-0x0000000000400000-0x00000000023AC000-memory.dmp

            Filesize

            31.7MB

          • memory/3968-157-0x0000000007470000-0x0000000007480000-memory.dmp

            Filesize

            64KB

          • memory/3968-150-0x0000000007480000-0x0000000007A24000-memory.dmp

            Filesize

            5.6MB

          • memory/3968-163-0x0000000008090000-0x00000000080CC000-memory.dmp

            Filesize

            240KB

          • memory/3968-159-0x0000000007330000-0x0000000007342000-memory.dmp

            Filesize

            72KB

          • memory/3968-156-0x0000000007470000-0x0000000007480000-memory.dmp

            Filesize

            64KB

          • memory/3968-158-0x0000000007470000-0x0000000007480000-memory.dmp

            Filesize

            64KB

          • memory/3968-152-0x0000000004AE0000-0x0000000004B02000-memory.dmp

            Filesize

            136KB

          • memory/3968-155-0x0000000007A30000-0x0000000008048000-memory.dmp

            Filesize

            6.1MB

          • memory/3968-168-0x0000000007470000-0x0000000007480000-memory.dmp

            Filesize

            64KB

          • memory/3968-149-0x0000000004A40000-0x0000000004A64000-memory.dmp

            Filesize

            144KB

          • memory/3968-147-0x0000000002FA0000-0x00000000030A0000-memory.dmp

            Filesize

            1024KB

          • memory/3968-148-0x0000000004940000-0x0000000004970000-memory.dmp

            Filesize

            192KB

          • memory/3968-154-0x0000000000400000-0x0000000002CDB000-memory.dmp

            Filesize

            40.9MB

          • memory/3968-160-0x0000000073290000-0x0000000073A40000-memory.dmp

            Filesize

            7.7MB

          • memory/3968-161-0x0000000007350000-0x000000000745A000-memory.dmp

            Filesize

            1.0MB