Analysis

  • max time kernel
    300s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 12:31

General

  • Target

    setup.exe

  • Size

    762.0MB

  • MD5

    9326c686071c528549c80eea2638082e

  • SHA1

    3c31e38d81289de167d9f37fbc6697b5c9cf71bd

  • SHA256

    59ca077c90d1d26bb9e79b44c74a0ecf04bd02a92a90146efe87c170e11ca3d2

  • SHA512

    9af45bc59bbd42d738cbf9547d8d6121a61bd97a6b9a3a2f2fc39caf721a6a64ce7ab991e482bd13a39ac3ddf62cfc1f95613c7d805370d2cda0199f4bccc114

  • SSDEEP

    49152:NpfTCy0d0R7ruhVrPwHStdgjGf+WAud5iqBRSLmIe59123L7W:eyN7ruHaLGf+Wzd5TSLm/23m

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • XMRig Miner payload 16 IoCs
  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Modifies firewall policy service
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\Documents\piratemamm\7LElpB9o0GBihytYYfNCAQqM.exe
      C:\Users\Admin\Documents\piratemamm\7LElpB9o0GBihytYYfNCAQqM.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Users\Admin\AppData\Local\Temp\is-LMQ9E.tmp\7LElpB9o0GBihytYYfNCAQqM.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-LMQ9E.tmp\7LElpB9o0GBihytYYfNCAQqM.tmp" /SL5="$700E0,4712415,54272,C:\Users\Admin\Documents\piratemamm\7LElpB9o0GBihytYYfNCAQqM.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Users\Admin\AppData\Local\Mobile Media Converter\mobilemediaconverter32.exe
          "C:\Users\Admin\AppData\Local\Mobile Media Converter\mobilemediaconverter32.exe" -i
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1968
        • C:\Users\Admin\AppData\Local\Mobile Media Converter\mobilemediaconverter32.exe
          "C:\Users\Admin\AppData\Local\Mobile Media Converter\mobilemediaconverter32.exe" -s
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1744
    • C:\Users\Admin\Documents\piratemamm\MekAEzPWsJLCrqTrgqaDlJ8S.exe
      C:\Users\Admin\Documents\piratemamm\MekAEzPWsJLCrqTrgqaDlJ8S.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2916
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2172
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1644
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1508
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "CIFUBVHI"
        3⤵
        • Launches sc.exe
        PID:1736
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "CIFUBVHI" binpath= "C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:1240
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:328
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "CIFUBVHI"
        3⤵
        • Launches sc.exe
        PID:1680
  • C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
    C:\ProgramData\lmguvcpihozg\eqtpkqwqodik.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2468
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:1964
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:308
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
      2⤵
      • Power Settings
      • Suspicious use of AdjustPrivilegeToken
      PID:2412
    • C:\Windows\system32\conhost.exe
      C:\Windows\system32\conhost.exe
      2⤵
        PID:1340
      • C:\Windows\system32\svchost.exe
        svchost.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      25db0c16edba1f61d4cc49fd4771da1b

      SHA1

      eceb8a4c3b8578ebad6f5d38b523ed72c085762b

      SHA256

      11684da2bb2244f732bfac915739cf25c9281b5206979c81612b4646a37b7d08

      SHA512

      d0dd804091be661469bc4d0df7940fb3805eba8df379f2f042978934928813122411d7bbf950432f1053f04c631a6213e39b4b715148614cd4681a5b7f9d3fd5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      128b67c983ce3165156570f9a3ca117c

      SHA1

      edb69ab868ec35f9cc984e05cd7cba957a2278d9

      SHA256

      d87356d997014f135f14705f6d0c2ae5da08e6e7dbd4bd73cfc257128da4805c

      SHA512

      e4bea8ad265ac030f272f2f82b3f3f97d0d030f0ef99686b208895916eba49a228090ebb0884db00aab77837033f209e22004803df0cd5b352fa5efec9ea9635

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      caffc06eb64b3c7ff71901764f5d2ee3

      SHA1

      05dabb6c9685056abbf71d03f1ed85fdf563d843

      SHA256

      f6d362c697243c8362698411bb0d972147b83396a8a05fe1c43ccbd1142f2eb7

      SHA512

      21c06aa3abd3065d3d640d5a087646e8ecbcdc2e6042a951487e3d758bc6056a933eb4f9d5d3bed0bdbf4970a120f27afe6b2ed331aca2847b4b7b45caac77f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      4a7ce4e40f6d4e9beef57892df050269

      SHA1

      d97a6bd7bf64e48567334a2ab3b9999034b7eb97

      SHA256

      3a175656dab11931ca1e25263788e9b3ad31abf77e62c9da3f8719886d87fd04

      SHA512

      c9d4fa75ef41294b19df43caed166d33e61ebf296c8f40477b0c19febd90465390433e01ef20183cbb7723a6a04c81648d3be6dded5a3af5013297f809f11adc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2fd378aa19bb995bc80287cc4618d6e4

      SHA1

      238f3aea18df5856e4ce2295e5885b2d12091e40

      SHA256

      a9814e81766a281e8fb28a86208de49f1c3813b5b78857d5eb573a77d6555144

      SHA512

      51efd86424995c7a1d1253d1b4d6188b53dc1420c1c9c706461dc398cbf84c3ac61baf5bd5f1c4ce1ba4dc4d537610dca16ef9e46582d0bf5a76e267410ef458

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      272d5700f7f1c3042085fdc0b3272af8

      SHA1

      9caf5b0ac4c1557ba1ac4d845d7707ea05532f3d

      SHA256

      f3c5c969a2efe85dff3cad06f8f0ad2a247088ca5d08f80dcd93e3eb323bd047

      SHA512

      e3e63037779705b0da8e8d7aa5c9a9d1086814427feb1729f5566837a61cc4f5cbfcc292263d61bf1e50a55329d463ef0856c4aee2ac8b020947e8c8d56ee067

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      b7eb3723b4dfd8139e0f96174d50cb87

      SHA1

      393c7803ea4ccf9da606ef624cf200a87de1528f

      SHA256

      d566d162aff9b13302fc9771147c12cdcb0e31de6ef39f7fc0032ff437ac43ab

      SHA512

      6d66e28a98e96dc7bf36d83d1f15cde83ec8974fca858f753a93c803d25535f74dc506c3e3e7abe3d694e1502d3adfb1fe23d0243123ad80c49b2c3e00569630

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0d250369c837fecee40d12b71cde71c4

      SHA1

      325e1462a684e345f29625b22863bf0f2e57c1f4

      SHA256

      6556b22faf9bdf81c7b827f896b685d2acd0a1e374c1cd15f0047a90c5d6bc62

      SHA512

      4093c12522a40834a4b3b0af58dac11fc510535afc89f8ecad14c428e1cc8f80b0a0e510c47b01b83169b006171f2b587b1f88a859e9d9bda30b22f475d9d18f

    • C:\Users\Admin\AppData\Local\Mobile Media Converter\mobilemediaconverter32.exe

      Filesize

      3.7MB

      MD5

      65404e90386159bf151f79b9da582d3b

      SHA1

      2c3ff7859fa1c4b838e6667b21f2bd4790a346a3

      SHA256

      c4d37939210a996bdb197cf1c485a2801b333862e2753f01a7d805ee5b83287c

      SHA512

      ae76172ff8eafc0e8e89fe3831733a2a395d8455502ad16aec75eabbe3dc89ac6b99d506c906affb1a2172663f0211d36c4ba54370b8155e9127dab05a449c46

    • C:\Users\Admin\AppData\Local\Temp\Cab91A7.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar9246.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\Documents\piratemamm\7LElpB9o0GBihytYYfNCAQqM.exe

      Filesize

      4.7MB

      MD5

      506fd166ad693a874c81fc1af23104f3

      SHA1

      1828f8c505c06d51713b7dd141011fdf94b1348a

      SHA256

      0dcee77127bc5e5b3bbb9809db3cdcd12db1eb82860467b6b1af6bf27f7d4218

      SHA512

      c0443ce94feff899e430eddaefb50776bf94478050880b61a8baeb86db6ee25522a1aaba844771dcd0a68bd40a5c4868c6a96749b4a728b7ab68d3b8a73fffff

    • C:\Users\Admin\Documents\piratemamm\MekAEzPWsJLCrqTrgqaDlJ8S.exe

      Filesize

      10.1MB

      MD5

      3b24971c5fef776db7df10a769f0857a

      SHA1

      ab314ddf208ef3e8d06f2f5e96f0f481075de0f4

      SHA256

      0d990bedac4696a67ad46dbc686750086f72f4795ed8a6121782ba3b0dc736b5

      SHA512

      f70dccd6fd95516eac21b0cc30c70fb5f17c3c8f1f3b28fe3bdaec6053c2de53daf68caf422dea8861e4ab84f3dd7be36965c6998c1380dbf2a05a2a74b36b28

    • C:\Windows\System32\GroupPolicy\gpt.ini

      Filesize

      127B

      MD5

      8ef9853d1881c5fe4d681bfb31282a01

      SHA1

      a05609065520e4b4e553784c566430ad9736f19f

      SHA256

      9228f13d82c3dc96b957769f6081e5bac53cffca4ffde0ba1e102d9968f184a2

      SHA512

      5ddee931a08cfea5bb9d1c36355d47155a24d617c2a11d08364ffc54e593064011dee4fea8ac5b67029cab515d3071f0ba0422bb76af492a3115272ba8feb005

    • \Users\Admin\AppData\Local\Temp\is-E4ENK.tmp\_isetup\_iscrypt.dll

      Filesize

      2KB

      MD5

      a69559718ab506675e907fe49deb71e9

      SHA1

      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

      SHA256

      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

      SHA512

      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

    • \Users\Admin\AppData\Local\Temp\is-E4ENK.tmp\_isetup\_isdecmp.dll

      Filesize

      13KB

      MD5

      a813d18268affd4763dde940246dc7e5

      SHA1

      c7366e1fd925c17cc6068001bd38eaef5b42852f

      SHA256

      e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

      SHA512

      b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

    • \Users\Admin\AppData\Local\Temp\is-E4ENK.tmp\_isetup\_shfoldr.dll

      Filesize

      22KB

      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\is-LMQ9E.tmp\7LElpB9o0GBihytYYfNCAQqM.tmp

      Filesize

      680KB

      MD5

      a5d28160c73e3ce84e3ae5eedf204b1b

      SHA1

      8f1ed887af6e0038e29d13461207812db2cf4481

      SHA256

      8c2c2b0dc057eff4186f869af75744e8f652ff31631a5fe84f707446d5175c67

      SHA512

      1b6d6bb5f3697c7ecf249f62c1dabb9665d0b7cf2d5deae73f5f710e09fd51fd3113b074e96514938f38b753adef5f24f24407305d04cc6175e015dce0338210

    • memory/980-429-0x0000000140000000-0x0000000141919000-memory.dmp

      Filesize

      25.1MB

    • memory/1340-433-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1340-432-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1340-431-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1340-434-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1340-435-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1340-449-0x0000000140000000-0x000000014000E000-memory.dmp

      Filesize

      56KB

    • memory/1708-459-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-453-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-458-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-442-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-438-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-446-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-450-0x00000000000B0000-0x00000000000D0000-memory.dmp

      Filesize

      128KB

    • memory/1708-439-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-441-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-443-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-445-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-444-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-440-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-451-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-455-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-448-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-452-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1708-454-0x0000000140000000-0x0000000140840000-memory.dmp

      Filesize

      8.2MB

    • memory/1744-464-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1744-412-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1744-418-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1744-470-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1744-460-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1744-467-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1968-406-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1968-400-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/1968-410-0x0000000000400000-0x00000000007AF000-memory.dmp

      Filesize

      3.7MB

    • memory/2096-0-0x000000013FE00000-0x0000000140218000-memory.dmp

      Filesize

      4.1MB

    • memory/2916-403-0x0000000077130000-0x0000000077132000-memory.dmp

      Filesize

      8KB

    • memory/2916-405-0x0000000077130000-0x0000000077132000-memory.dmp

      Filesize

      8KB

    • memory/2916-413-0x0000000140000000-0x0000000141919000-memory.dmp

      Filesize

      25.1MB

    • memory/2916-401-0x0000000077130000-0x0000000077132000-memory.dmp

      Filesize

      8KB

    • memory/2956-337-0x0000000000401000-0x000000000040B000-memory.dmp

      Filesize

      40KB

    • memory/2956-416-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/2956-333-0x0000000000400000-0x0000000000414000-memory.dmp

      Filesize

      80KB

    • memory/3012-417-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/3012-461-0x00000000037A0000-0x0000000003B4F000-memory.dmp

      Filesize

      3.7MB

    • memory/3012-399-0x00000000037A0000-0x0000000003B4F000-memory.dmp

      Filesize

      3.7MB