Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30-07-2024 16:15

General

  • Target

    4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe

  • Size

    322KB

  • MD5

    61c5a8e414a47b8cc2c69e1ac4370a35

  • SHA1

    d6d66b31e7ebe3bd032a33fbe35fed2720fae964

  • SHA256

    4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b

  • SHA512

    b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92

  • SSDEEP

    6144:l5B8DY9c80tk5koaMrtonT8nzkwHgDKFaz4cHgo2TW:rB8DY9yYhaODRgDKiHgo2a

Malware Config

Extracted

Family

redline

Botnet

diamotrix

C2

176.111.174.140:1912

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6082381502:AAFgFkge53k6kBZcTN8CBICiZV-VphQ1WgA/sendMessage?chat_id=5795480469

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

176.111.174.140:6606

176.111.174.140:7707

176.111.174.140:8808

Mutex

PWhSiRkcxVoa

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Async RAT payload 2 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe
      "C:\Users\Admin\AppData\Local\Temp\4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\system32\schtasks.exe
        schtasks /create /tn "SystemServicesTools" /tr "C:\Users\Admin\AppData\Roaming\{2864474C38203701991499}\{2864474C38203701991499}.exe" /sc onstart /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2792
      • C:\Windows\system32\relog.exe
        C:\Windows\system32\relog.exe
        3⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2784
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Identities\Service_Identities.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2760
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Macromedia\Service_Macromedia.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2592
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Media Center Programs\Service_Media Center Programs.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2716
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Service_Microsoft.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:2228
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\Mozilla\Service_Mozilla.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:592
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "eLsJA2Rzfc" /tr "C:\Users\Admin\AppData\Roaming\{2864474C38203701991499}\Service_{2864474C38203701991499}.exe" /sc onstart /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1156
    • C:\Users\Admin\AppData\Local\Temp\6519.tmp.uIZtAux.exe
      "C:\Users\Admin\AppData\Local\Temp\6519.tmp.uIZtAux.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:772
    • C:\Users\Admin\AppData\Local\Temp\6836.tmp.svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\6836.tmp.svchost.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /xml "C:\Users\Admin\AppData\Roaming\WinZIP_32\version.xml" /tn WPDR\Config_Error\Version /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2036
    • C:\Users\Admin\AppData\Local\Temp\7985.tmp.zbi.exe
      "C:\Users\Admin\AppData\Local\Temp\7985.tmp.zbi.exe"
      2⤵
      • Executes dropped EXE
      PID:1352
    • C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe
      "C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Local\Temp\onefile_3056_133668297989820000\test.exe
        "C:\Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2732
    • C:\Users\Admin\AppData\Local\Temp\3354.tmp.PwHnaA.exe
      "C:\Users\Admin\AppData\Local\Temp\3354.tmp.PwHnaA.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2488
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show profile
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:1752
        • C:\Windows\SysWOW64\findstr.exe
          findstr All
          4⤵
          • System Location Discovery: System Language Discovery
          PID:916
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
        3⤵
        • System Location Discovery: System Language Discovery
        PID:700
        • C:\Windows\SysWOW64\chcp.com
          chcp 65001
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1268
        • C:\Windows\SysWOW64\netsh.exe
          netsh wlan show networks mode=bssid
          4⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1040
    • C:\Users\Admin\AppData\Local\Temp\5843.tmp.PPGcgnyW.exe
      "C:\Users\Admin\AppData\Local\Temp\5843.tmp.PPGcgnyW.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1744
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2784
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6893.tmp.bat""
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2724
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:2896
        • C:\Users\Admin\AppData\Roaming\svchost.exe
          "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2760
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {D266EBA8-F8A4-4ED0-9BDB-F66802B36212} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:572
    • C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2612
    • C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      C:\Users\Admin\AppData\Roaming\WinZIP_32\servisis.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\2026228140ffc3c71f967e63f170739a\msgid.dat

    Filesize

    1B

    MD5

    cfcd208495d565ef66e7dff9f98764da

    SHA1

    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

    SHA256

    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

    SHA512

    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

  • C:\Users\Admin\AppData\Local\8fb1a76a6202bb69bf9ea99c6f246bbd\Admin@MUYDDIIS_en-US\Browsers\Firefox\Bookmarks.txt

    Filesize

    105B

    MD5

    2e9d094dda5cdc3ce6519f75943a4ff4

    SHA1

    5d989b4ac8b699781681fe75ed9ef98191a5096c

    SHA256

    c84c98bbf5e0ef9c8d0708b5d60c5bb656b7d6be5135d7f7a8d25557e08cf142

    SHA512

    d1f7eed00959e902bdb2125b91721460d3ff99f3bdfc1f2a343d4f58e8d4e5e5a06c0c6cdc0379211c94510f7c00d7a8b34fa7d0ca0c3d54cbbe878f1e9812b7

  • C:\Users\Admin\AppData\Local\Temp\3354.tmp.PwHnaA.exe

    Filesize

    175KB

    MD5

    19f436930646f3e8f283fa71f2a4cbcb

    SHA1

    99397666d23ddde6078496ee73bde00ae9403393

    SHA256

    40e64ea2d9253f93606f6f62966f05e2bb300e03e82ecd54c5dcba5640df0dff

    SHA512

    addba9ff5bd334ddfec06f87d2c69c06028b82d0aab732f73ef35e84f46d889f48ab6823371a9b9f415e2758e62270866682b833bca7406354802e0157314e0d

  • C:\Users\Admin\AppData\Local\Temp\5843.tmp.PPGcgnyW.exe

    Filesize

    47KB

    MD5

    670d1014ec5713d005f8ddfefc495a9e

    SHA1

    91362eaf33dc55e4d970fbefbda975be32628d6b

    SHA256

    70c6d555938fdc95c03f98a7a3a37b607d1dce623663479082c5b9514caa04fd

    SHA512

    175827b48f35899e89fcbdacd2e98b378b92abc8e7a1c225441f57a46d02fea838104e3d6480a137f401c72e2d7979ff3db7a74d5c52e84a0733246f0fa5384f

  • C:\Users\Admin\AppData\Local\Temp\6519.tmp.uIZtAux.exe

    Filesize

    300KB

    MD5

    8d14c4ba7260c61ecde30d97fd3c124a

    SHA1

    f60a7243a5160ff0dd60c37e1de43b81cead3549

    SHA256

    6985ec7f67fabd26633c991be04ce5f899224a56bb078ba186b4be21f9e4714d

    SHA512

    b068decea7ec68d2b4347493d9e4b8cc4fb0c3c5f5ecc2a52be6eb35d28e75d3de1636efe0b67cce825e8d08d3fb82d137b1d6eb1225662fb8c3dff9616dcc4c

  • C:\Users\Admin\AppData\Local\Temp\6836.tmp.svchost.exe

    Filesize

    321KB

    MD5

    6ddd28445b8fc2485cb72f22d1adc936

    SHA1

    403c02d952120aafc6fb659a0ce0b99b1384442c

    SHA256

    d73a9c06d72b25fc9cc1d3883ba52ba949c91297d20f8cff37481d9b442a7ef7

    SHA512

    9abc68fab4c2a37f6cf07e2d1d7baccf26da411969b6dca4508776b9f57e3ed228dbc1a50e6dc4784791bdb86423d1f20c0f4d118c20d23951906a14ebd4682b

  • C:\Users\Admin\AppData\Local\Temp\7985.tmp.zbi.exe

    Filesize

    5.2MB

    MD5

    0534ab10184891cd61d262bfd79b7b4c

    SHA1

    a13d37959a92bc37f4d3c42eb53d77cc760f448a

    SHA256

    191272e200345dcb0a7a8c8c975a8b07847f07b9d9f0c3af472fdb88092aee0b

    SHA512

    381af090cc87f2f2b8583c28a164f8f2e978c2bdffe3161d37fa30e38c5e026b90ae5f45dd13f9ded8ee207e4694abf2a58256deb8986ec11d802b7578f6be9d

  • C:\Users\Admin\AppData\Local\Temp\Cab9262.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\onefile_3056_133668297989820000\python310.dll

    Filesize

    4.2MB

    MD5

    384349987b60775d6fc3a6d202c3e1bd

    SHA1

    701cb80c55f859ad4a31c53aa744a00d61e467e5

    SHA256

    f281c2e252ed59dd96726dbb2de529a2b07b818e9cc3799d1ffa9883e3028ed8

    SHA512

    6bf3ef9f08f4fc07461b6ea8d9822568ad0a0f211e471b990f62c6713adb7b6be28b90f206a4ec0673b92bae99597d1c7785381e486f6091265c7df85ff0f9b5

  • C:\Users\Admin\AppData\Local\Temp\tmp6893.tmp.bat

    Filesize

    151B

    MD5

    64a5b41881b62d758d0eef7169ef65cf

    SHA1

    b3ce0a9f1fcdcf3fa2791260f80a1a5544e861cb

    SHA256

    bdd04d5db45da91e17f60fb561c30dbc55bec0f33ec5a34098bf4886402dc279

    SHA512

    ce6aec283c05befab339a1d7c694467aafc2662509c1b62d378798ba8ee255d95445f33f729976303b58531ae3758a158f35e313262bfc98f6f6529abaa87121

  • C:\Users\Admin\AppData\Roaming\Adobe\Service_Adobe.exe

    Filesize

    322KB

    MD5

    61c5a8e414a47b8cc2c69e1ac4370a35

    SHA1

    d6d66b31e7ebe3bd032a33fbe35fed2720fae964

    SHA256

    4da3bff89fc796886ca615a29a2595c4109f86fff2a9e699ea1036195719cb3b

    SHA512

    b1d732a280ea6f9e0eca5802016292e9c373a6e6d2c48404bbe00eb67a791427945ec3d1998ffdd8bda603adb9ee6c9312cf2976ed3567ab0a2c7f8494079c92

  • C:\Users\Admin\AppData\Roaming\WinZIP_32\version.xml

    Filesize

    1KB

    MD5

    2b29aa25ee90747f05e920706e4dfc4f

    SHA1

    2ec04aa0574178e5b5245362fdb5b1cfbf4ec637

    SHA256

    93e469a8135addc4822f19a7afb7d02baea8242626188ce3e2b039862fc67511

    SHA512

    2a3f6bda5c957eed82b5fdf39bb33d109c68e39a1e096c944bfe725f027757efa87bc44ea037f9baf47426d0335a12639ff67c626aec3fc1c5c430b2efbf44fb

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    1KB

    MD5

    ee9d791fd900430e4d594e5bde5c096a

    SHA1

    25dd0ac5926d1d02bf4c9fe60d5aff6b602c9b7d

    SHA256

    74c6900b084deaf2ac76ee2113cfe73509e751c588707395fa2731e9bc154ccd

    SHA512

    cd1c18139594002e96c7094ff731812d9afb45fb34735731fb65eaecbd7918c2379fa52b8eea551ac9c51589827619f898a9a0ac95ee1ad8c0e94b589403efeb

  • \Users\Admin\AppData\Local\Temp\2407.tmp.sahyu.exe

    Filesize

    14.0MB

    MD5

    c04a91e68f4d54aac6959c0f8bfa38b7

    SHA1

    50578031ed4a270b3e51a1a99d121c0a47546386

    SHA256

    fd8aed52f0a913f9d59e2f1116da4ce8c8d35d95e631b11972aba80933160923

    SHA512

    133ca344372a8634e5bc4a87851dfe6c8d0ae1cac38d59b6004cec4a29a65973b9b65d0ab4d5dc7ce899672a5361f57e8ecf566b1a1f87f34050dcb97083b3fb

  • \Users\Admin\AppData\Local\Temp\onefile_3056_133668297989820000\test.exe

    Filesize

    30.6MB

    MD5

    140c6fc5931bec7542b3dc0b08486c4c

    SHA1

    11005a2f4afea3913b027940df459a8cca86f8df

    SHA256

    c5fddb56fcb37d5e29a857a5ff53a584a982ae3a5aff1fc670408b202ab1bb37

    SHA512

    be47ea2464a189e6faa64d54daf59d546907ccea778a735eae3118105942e3d67a3d96e8f27d68d28c56d99078839dec139ace95153bab060ee7654a15863a6a

  • memory/572-104-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/572-102-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/768-105-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/768-86-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/772-80-0x00000000003F0000-0x0000000000442000-memory.dmp

    Filesize

    328KB

  • memory/1208-66-0x0000000002B00000-0x0000000002B16000-memory.dmp

    Filesize

    88KB

  • memory/1208-72-0x0000000002E80000-0x0000000002ED7000-memory.dmp

    Filesize

    348KB

  • memory/1208-70-0x0000000002D40000-0x0000000002D83000-memory.dmp

    Filesize

    268KB

  • memory/1208-64-0x0000000002B00000-0x0000000002B16000-memory.dmp

    Filesize

    88KB

  • memory/1208-68-0x0000000002D40000-0x0000000002D83000-memory.dmp

    Filesize

    268KB

  • memory/1744-344-0x00000000003C0000-0x00000000003D2000-memory.dmp

    Filesize

    72KB

  • memory/2032-401-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2032-403-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2612-361-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2612-363-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2760-359-0x0000000000C70000-0x0000000000C82000-memory.dmp

    Filesize

    72KB

  • memory/2760-397-0x00000000053C0000-0x0000000005422000-memory.dmp

    Filesize

    392KB

  • memory/2764-204-0x0000000001380000-0x00000000013B2000-memory.dmp

    Filesize

    200KB

  • memory/2796-2-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

    Filesize

    4KB

  • memory/2796-99-0x0000000140000000-0x0000000140056000-memory.dmp

    Filesize

    344KB