Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-04-2024 16:33

General

  • Target

    setup_installer.exe

  • Size

    3.6MB

  • MD5

    1df01ae4f663bbb5bdc2abb2d68a1348

  • SHA1

    bed2b62f36b774a21cb14ee8c1e98363458028fc

  • SHA256

    b1c5d186dc4924256dc9e8f9fad845bdb583f7028c547aa8ca2fe2076e2a081f

  • SHA512

    7cc3faf78ffdaa3ef2327cea4ea22f062934e1029dc4727428cfc4a7dad943a94f0bc39b061dfdec1277f364584f7bf0e92c22aa22c44e6d34e524ac0ad684be

  • SSDEEP

    98304:x3CvLUBsgE9a4SZgRzEpVbzmX4lhfnVJQbSNKHG2a:x0LUCgya4S6zOVpVJsYKxa

Malware Config

Extracted

Family

privateloader

C2

http://37.0.10.214/proxies.txt

http://37.0.10.244/server.txt

http://wfsdragon.ru/api/setStats.php

37.0.10.237

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

vidar

Version

40.1

Botnet

706

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

redline

Botnet

pub2

C2

185.92.73.84:80

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 3 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 36 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:184
    • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4564
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed12ff8f9303069a13.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5016
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12ff8f9303069a13.exe
          Wed12ff8f9303069a13.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:732
          • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12ff8f9303069a13.exe
            "C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12ff8f9303069a13.exe" -a
            5⤵
            • Executes dropped EXE
            • Modifies system certificate store
            PID:5000
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed1258b9cb39.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4624
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed1258b9cb39.exe
          Wed1258b9cb39.exe
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:1464
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 360
            5⤵
            • Program crash
            PID:4072
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed122efa49d386.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed122efa49d386.exe
          Wed122efa49d386.exe
          4⤵
          • Executes dropped EXE
          PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed12b86e03fc.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4212
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12b86e03fc.exe
          Wed12b86e03fc.exe
          4⤵
          • Executes dropped EXE
          PID:4820
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 1028
            5⤵
            • Program crash
            PID:868
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed120d4de2378.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed120d4de2378.exe
          Wed120d4de2378.exe
          4⤵
          • Executes dropped EXE
          PID:3156
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed127454568dab5787.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2444
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed127454568dab5787.exe
          Wed127454568dab5787.exe
          4⤵
          • Executes dropped EXE
          PID:1864
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed12f234a21660d.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12f234a21660d.exe
          Wed12f234a21660d.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:5032
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c Wed12691e8dbf.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4016
        • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12691e8dbf.exe
          Wed12691e8dbf.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 568
        3⤵
        • Program crash
        PID:1524
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3920 -ip 3920
    1⤵
      PID:1400
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 1464 -ip 1464
      1⤵
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4820 -ip 4820
        1⤵
          PID:5112
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          1⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4080
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4644
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          1⤵
            PID:5104
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
            • Suspicious use of FindShellTrayWindow
            PID:4012
          • C:\Windows\system32\sihost.exe
            sihost.exe
            1⤵
              PID:4552
            • C:\Windows\system32\sihost.exe
              sihost.exe
              1⤵
                PID:3848
              • C:\Windows\system32\sihost.exe
                sihost.exe
                1⤵
                  PID:3864

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed120d4de2378.exe

                  Filesize

                  300KB

                  MD5

                  953d93e24956822e11d1ff9e433731d4

                  SHA1

                  3f45bcca182046fa8957821089d804200227985d

                  SHA256

                  f4eb31de9302b29f94e951cd77159b29ad6f36dc48dff1df573d13be632a0c16

                  SHA512

                  c3791ebb2a90a82c4b937b58daa979a6e33d14606a5e89f398d56c8093d6582c76287576486c9292f0af00f7c7823147ef9d3993f47bb582b6f91c6fd9461137

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed122efa49d386.exe

                  Filesize

                  900KB

                  MD5

                  0a0d22f1c9179a67d04166de0db02dbb

                  SHA1

                  106e55bd898b5574f9bd33dac9f3c0b95cecd90d

                  SHA256

                  a59457fbfaf3d1b2e17463d0ffd50680313b1905aff69f13694cfc3fffd5a4ac

                  SHA512

                  8abf8dc0da25c0fdbaa1ca39db057db80b9a135728fed9cd0f45b0f06d5652cee8d309b92e7cb953c0c4e8b38ffa2427c33f4865f1eb985a621316f9eb187b8b

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed1258b9cb39.exe

                  Filesize

                  267KB

                  MD5

                  0d09277405cb84cd4e0b465759b9b73f

                  SHA1

                  b98be57eeee56ad576656b554d22069422e20f89

                  SHA256

                  5e3ee0b5954c435e10c41a144ffb9e17e02898fd3a2b074943ad7d202e4ae4f3

                  SHA512

                  8a6bbcf38db54e585cdf6a0179392b37d4b69352f650e017eb264109b6b337bed1ecd1135e7fe3013e76421bba1886441ec4e1df22e8c10799a27f6e0b8f20d9

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12691e8dbf.exe

                  Filesize

                  8KB

                  MD5

                  d640812863d65d90669e5b9194649f83

                  SHA1

                  dc2ec2d486ffeb8008c9dd9cfb91a100a3127b48

                  SHA256

                  2906cff26bce67c4a6c12d1f1d1691ab0f8ce7f98b8c5876c9385887fa7f021e

                  SHA512

                  f3078d3c2a63eff17eba10513c216be9a760b79a9dc7c06de7a47715c4c368275269d33b3bdb04b27c696796ee612f753a0c309b296c7fd63138bff8bb87e09d

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed127454568dab5787.exe

                  Filesize

                  1.7MB

                  MD5

                  05a0baf55450d99cb0fa0ee652e2cd0c

                  SHA1

                  e7334de04c18c241a091c3327cdcd56e85cc6baf

                  SHA256

                  4cfbdd8acdc923beeca12d94f06d2f1632765434a2087df7ac803c254a0adf9c

                  SHA512

                  b6d1fc00d7b076068b0879fa4d29b68d3054b5fca24edd5852077bf34d37c43e79cb74fda9c45014610b317d57d70369a3e197784c04bc3c6eac5e1ea9a64fff

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12b86e03fc.exe

                  Filesize

                  604KB

                  MD5

                  1e90790e7d177d29fc32f926a419c534

                  SHA1

                  25142c6b5243f09542d28ce75f42f8b1e337bf18

                  SHA256

                  859b840ac0113845859e79c66583996665f246ccc6f3ebfe419e2e07e8f515cc

                  SHA512

                  667f4c651debd720b8f4c534fd4690a9cc2ddbce98d7577285f6e42b88e71ba209433ad0dcb3dc7d34b79df7a59ad6d1e7c8602365b5501d85a235c3d84d4f6d

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12f234a21660d.exe

                  Filesize

                  180KB

                  MD5

                  b4fc051f0e24474bbdc858ddd81b4572

                  SHA1

                  1b7650afe1b152e1a6eca0e9490d3b53c9b273d7

                  SHA256

                  d9ad89bed347d1477d54cf99a56cadbb71da8487d3f251769f129fa0d1d85d9a

                  SHA512

                  5f9b9981b30bd91dc01cb52655885c0797949f959454560632f5969d8cf7e9743720893bbf4a82b6aea9cf34b30bbc90f324f1524a182c07a1dc37855c4d2818

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\Wed12ff8f9303069a13.exe

                  Filesize

                  56KB

                  MD5

                  c0d18a829910babf695b4fdaea21a047

                  SHA1

                  236a19746fe1a1063ebe077c8a0553566f92ef0f

                  SHA256

                  78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98

                  SHA512

                  cca06a032d8232c0046c6160f47b8792370745b47885c2fa75308abc3df76dcc5965858b004c1aad05b8cd8fbb9a359077be1b97ec087a05d740145030675823

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\libcurl.dll

                  Filesize

                  218KB

                  MD5

                  d09be1f47fd6b827c81a4812b4f7296f

                  SHA1

                  028ae3596c0790e6d7f9f2f3c8e9591527d267f7

                  SHA256

                  0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

                  SHA512

                  857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\libcurlpp.dll

                  Filesize

                  54KB

                  MD5

                  e6e578373c2e416289a8da55f1dc5e8e

                  SHA1

                  b601a229b66ec3d19c2369b36216c6f6eb1c063e

                  SHA256

                  43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

                  SHA512

                  9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\libgcc_s_dw2-1.dll

                  Filesize

                  113KB

                  MD5

                  9aec524b616618b0d3d00b27b6f51da1

                  SHA1

                  64264300801a353db324d11738ffed876550e1d3

                  SHA256

                  59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

                  SHA512

                  0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\libstdc++-6.dll

                  Filesize

                  647KB

                  MD5

                  5e279950775baae5fea04d2cc4526bcc

                  SHA1

                  8aef1e10031c3629512c43dd8b0b5d9060878453

                  SHA256

                  97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

                  SHA512

                  666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\libwinpthread-1.dll

                  Filesize

                  69KB

                  MD5

                  1e0d62c34ff2e649ebc5c372065732ee

                  SHA1

                  fcfaa36ba456159b26140a43e80fbd7e9d9af2de

                  SHA256

                  509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

                  SHA512

                  3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

                • C:\Users\Admin\AppData\Local\Temp\7zS8B001B87\setup_install.exe

                  Filesize

                  2.1MB

                  MD5

                  fc81ec59e515648eb844e4268b5c24c2

                  SHA1

                  5802c0d9af65954716c921ea6df0a867e0606ed1

                  SHA256

                  960c3c31011eed2057ccabdf997d5038a32b8a5f2b651aaee11f364be490cc31

                  SHA512

                  0dddb9c332531f1850a3af64d6ce4b347644e04481db687efe0fdb0dc56aba9aa1b4ce8bdfdf55bc21d543c2b31070858f7b2dd5551a23c1e9091c1210452855

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ndkqqdjp.ozq.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • memory/448-78-0x00007FFD01890000-0x00007FFD02351000-memory.dmp

                  Filesize

                  10.8MB

                • memory/448-73-0x0000000000CC0000-0x0000000000CC8000-memory.dmp

                  Filesize

                  32KB

                • memory/448-83-0x000000001B9F0000-0x000000001BA00000-memory.dmp

                  Filesize

                  64KB

                • memory/448-152-0x00007FFD01890000-0x00007FFD02351000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1464-107-0x0000000002680000-0x0000000002780000-memory.dmp

                  Filesize

                  1024KB

                • memory/1464-108-0x00000000024F0000-0x00000000024F9000-memory.dmp

                  Filesize

                  36KB

                • memory/1464-111-0x0000000000400000-0x00000000023AC000-memory.dmp

                  Filesize

                  31.7MB

                • memory/3156-148-0x0000000007420000-0x0000000007430000-memory.dmp

                  Filesize

                  64KB

                • memory/3156-145-0x00000000079E0000-0x0000000007FF8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3156-151-0x0000000007360000-0x000000000739C000-memory.dmp

                  Filesize

                  240KB

                • memory/3156-149-0x0000000007420000-0x0000000007430000-memory.dmp

                  Filesize

                  64KB

                • memory/3156-150-0x0000000008000000-0x000000000810A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3156-147-0x0000000004ED0000-0x0000000004EE2000-memory.dmp

                  Filesize

                  72KB

                • memory/3156-146-0x0000000000400000-0x0000000002CDB000-memory.dmp

                  Filesize

                  40.9MB

                • memory/3156-154-0x0000000073BE0000-0x0000000074390000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3156-142-0x0000000007430000-0x00000000079D4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3156-143-0x0000000004D00000-0x0000000004D22000-memory.dmp

                  Filesize

                  136KB

                • memory/3156-141-0x0000000004C30000-0x0000000004C54000-memory.dmp

                  Filesize

                  144KB

                • memory/3156-138-0x0000000002F80000-0x0000000003080000-memory.dmp

                  Filesize

                  1024KB

                • memory/3156-139-0x0000000004920000-0x0000000004950000-memory.dmp

                  Filesize

                  192KB

                • memory/3156-160-0x0000000007420000-0x0000000007430000-memory.dmp

                  Filesize

                  64KB

                • memory/3920-116-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3920-59-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3920-58-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3920-57-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-56-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-55-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-46-0x000000006B280000-0x000000006B2A6000-memory.dmp

                  Filesize

                  152KB

                • memory/3920-54-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/3920-51-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3920-47-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3920-52-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-48-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3920-53-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-50-0x00000000007A0000-0x000000000082F000-memory.dmp

                  Filesize

                  572KB

                • memory/3920-49-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/3920-120-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                  Filesize

                  1.5MB

                • memory/3920-112-0x0000000000400000-0x000000000051B000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3920-114-0x0000000064940000-0x0000000064959000-memory.dmp

                  Filesize

                  100KB

                • memory/3920-119-0x000000006EB40000-0x000000006EB63000-memory.dmp

                  Filesize

                  140KB

                • memory/3920-117-0x000000006B440000-0x000000006B4CF000-memory.dmp

                  Filesize

                  572KB

                • memory/4564-109-0x00000000062C0000-0x00000000062DE000-memory.dmp

                  Filesize

                  120KB

                • memory/4564-155-0x0000000002EE0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4564-170-0x0000000007A00000-0x0000000007A1A000-memory.dmp

                  Filesize

                  104KB

                • memory/4564-171-0x00000000079F0000-0x00000000079F8000-memory.dmp

                  Filesize

                  32KB

                • memory/4564-165-0x0000000007900000-0x000000000790E000-memory.dmp

                  Filesize

                  56KB

                • memory/4564-123-0x0000000007320000-0x0000000007352000-memory.dmp

                  Filesize

                  200KB

                • memory/4564-122-0x000000007EF00000-0x000000007EF10000-memory.dmp

                  Filesize

                  64KB

                • memory/4564-124-0x0000000070050000-0x000000007009C000-memory.dmp

                  Filesize

                  304KB

                • memory/4564-134-0x0000000006940000-0x000000000695E000-memory.dmp

                  Filesize

                  120KB

                • memory/4564-135-0x0000000007360000-0x0000000007403000-memory.dmp

                  Filesize

                  652KB

                • memory/4564-136-0x0000000007D10000-0x000000000838A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4564-137-0x00000000076D0000-0x00000000076EA000-memory.dmp

                  Filesize

                  104KB

                • memory/4564-84-0x0000000002EE0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4564-89-0x0000000002EE0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4564-140-0x0000000007750000-0x000000000775A000-memory.dmp

                  Filesize

                  40KB

                • memory/4564-166-0x0000000007910000-0x0000000007924000-memory.dmp

                  Filesize

                  80KB

                • memory/4564-80-0x0000000005630000-0x0000000005C58000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4564-110-0x0000000006450000-0x000000000649C000-memory.dmp

                  Filesize

                  304KB

                • memory/4564-144-0x0000000007940000-0x00000000079D6000-memory.dmp

                  Filesize

                  600KB

                • memory/4564-161-0x0000000073BE0000-0x0000000074390000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4564-105-0x0000000005F20000-0x0000000006274000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4564-104-0x0000000005EB0000-0x0000000005F16000-memory.dmp

                  Filesize

                  408KB

                • memory/4564-74-0x0000000002A70000-0x0000000002AA6000-memory.dmp

                  Filesize

                  216KB

                • memory/4564-99-0x0000000005CD0000-0x0000000005D36000-memory.dmp

                  Filesize

                  408KB

                • memory/4564-90-0x0000000073BE0000-0x0000000074390000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4564-92-0x00000000055D0000-0x00000000055F2000-memory.dmp

                  Filesize

                  136KB

                • memory/4564-153-0x00000000078D0000-0x00000000078E1000-memory.dmp

                  Filesize

                  68KB

                • memory/4564-159-0x0000000002EE0000-0x0000000002EF0000-memory.dmp

                  Filesize

                  64KB

                • memory/4820-113-0x00000000026D0000-0x000000000276D000-memory.dmp

                  Filesize

                  628KB

                • memory/4820-115-0x00000000027B0000-0x00000000028B0000-memory.dmp

                  Filesize

                  1024KB

                • memory/4820-118-0x0000000000400000-0x0000000002400000-memory.dmp

                  Filesize

                  32.0MB

                • memory/4820-178-0x0000000000400000-0x0000000002400000-memory.dmp

                  Filesize

                  32.0MB

                • memory/5032-91-0x00000000016D0000-0x00000000016D6000-memory.dmp

                  Filesize

                  24KB

                • memory/5032-88-0x00000000016B0000-0x00000000016D2000-memory.dmp

                  Filesize

                  136KB

                • memory/5032-158-0x00007FFD01890000-0x00007FFD02351000-memory.dmp

                  Filesize

                  10.8MB

                • memory/5032-93-0x000000001BB10000-0x000000001BB20000-memory.dmp

                  Filesize

                  64KB

                • memory/5032-87-0x00007FFD01890000-0x00007FFD02351000-memory.dmp

                  Filesize

                  10.8MB

                • memory/5032-79-0x0000000000FD0000-0x0000000001002000-memory.dmp

                  Filesize

                  200KB

                • memory/5032-85-0x00000000016A0000-0x00000000016A6000-memory.dmp

                  Filesize

                  24KB