Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 00:09

General

  • Target

    708610982c93031b1f8666a8bdf496f0N.exe

  • Size

    6.0MB

  • MD5

    708610982c93031b1f8666a8bdf496f0

  • SHA1

    f4e36e0624ba714fcd2c0a67f8e621f73fc3e1bd

  • SHA256

    337f970e714e24afe4f69ce24776f97f013631193b2bc9b515e570586c7a9bf4

  • SHA512

    86a9b195089243d3380a7f2817075b8839f8aca4e343fdd2d4879aee7e954e36dd6c95e5193f6a4bd2f7498d5333785619850e6769a79452ef7eaee0b5e8368a

  • SSDEEP

    98304:ZyKgr4HtnobS4p4n/h9w8/ZMiGdFqN6r0WTUeauZ1goGJR9JtCr:ZIrME4/h9HZMiGbrMeauZ1goGJPs

Malware Config

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 6 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\708610982c93031b1f8666a8bdf496f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\708610982c93031b1f8666a8bdf496f0N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installer.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:376
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
          4⤵
          • Enumerates connected drives
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:3476
        • C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe
          C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe 0011 installp1
          4⤵
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Checks SCSI registry key(s)
          • Suspicious use of WriteProcessMemory
          PID:2532
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe"
            5⤵
              PID:5060
            • C:\Users\Admin\AppData\Roaming\1725754243473.exe
              "C:\Users\Admin\AppData\Roaming\1725754243473.exe" /sjson "C:\Users\Admin\AppData\Roaming\1725754243473.txt"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5100
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe"
              5⤵
                PID:2628
              • C:\Users\Admin\AppData\Roaming\1725754267441.exe
                "C:\Users\Admin\AppData\Roaming\1725754267441.exe" /sjson "C:\Users\Admin\AppData\Roaming\1725754267441.txt"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:312
              • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1500
            • C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe
              C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe 200 installp1
              4⤵
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Drops Chrome extension
              • Writes to the Master Boot Record (MBR)
              • System Location Discovery: System Language Discovery
              • Checks SCSI registry key(s)
              • Suspicious use of WriteProcessMemory
              PID:4060
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c taskkill /f /im chrome.exe
                5⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1376
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  PID:4968
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\80EBA4EA58D40136.exe"
                5⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Suspicious use of WriteProcessMemory
                PID:4340
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 3
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:4864
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Suspicious use of WriteProcessMemory
              PID:3980
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 3
                5⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2372
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4924
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe" >> NUL
              4⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Suspicious use of WriteProcessMemory
              PID:4136
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1
                5⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:3952
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"
            3⤵
            • Executes dropped EXE
            PID:4752
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4100
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1632
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 42F11DB3BB8A2E817525DAF3D110D851 C
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4252

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Cookies1725754267410

        Filesize

        20KB

        MD5

        49693267e0adbcd119f9f5e02adf3a80

        SHA1

        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

        SHA256

        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

        SHA512

        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

      • C:\Users\Admin\AppData\Local\Login Data1725754267410

        Filesize

        40KB

        MD5

        a182561a527f929489bf4b8f74f65cd7

        SHA1

        8cd6866594759711ea1836e86a5b7ca64ee8911f

        SHA256

        42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

        SHA512

        9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

      • C:\Users\Admin\AppData\Local\Login Data1725754267410

        Filesize

        48KB

        MD5

        349e6eb110e34a08924d92f6b334801d

        SHA1

        bdfb289daff51890cc71697b6322aa4b35ec9169

        SHA256

        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

        SHA512

        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

      • C:\Users\Admin\AppData\Local\Temp\MSIC256.tmp

        Filesize

        6KB

        MD5

        84878b1a26f8544bda4e069320ad8e7d

        SHA1

        51c6ee244f5f2fa35b563bffb91e37da848a759c

        SHA256

        809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444

        SHA512

        4742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Installer.exe

        Filesize

        5.8MB

        MD5

        5b0dd7584865516869f2d1d8c2eea131

        SHA1

        f02ae45e08dce791681450e3e4e038147cacf321

        SHA256

        7f0f4dbee4b6bd80769e640b089603c8593e7dd97c0a2dd122e5ca05d7823d9c

        SHA512

        43ed616167cb76f6f9945032b687b659239dbb6d38477b85862bb3bb9770ea2348852c25ac89afa44686261ef313b865d592f2f373edc7f7ebd73ac8b5c5a7fd

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe

        Filesize

        175KB

        MD5

        4cfee35f55ecaef4bdc4508eb5d46f8a

        SHA1

        be092ce3723b7a8ea942ec59c1c30e5d585b89ba

        SHA256

        fa828cf0731d35f2e35606d56aad77fc5fff41dfd5d37a5ad0f657b38b57cfbe

        SHA512

        4cf15a517f103750ac0ad93bb858b930f7c2f454ecc688f0adbe20ee9a8b18dc04fc004d0678b3de5b94a50049d8e73fa1c3616adfa5aeb716e1ad6521913401

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe

        Filesize

        4.3MB

        MD5

        e70e40b7acda24d775bfa15b89137483

        SHA1

        a993e1cccbfbdf0ec6eead05a99506e3fdc4e146

        SHA256

        26b8ffe7b3e413e1cb19c534d3b8c2bd05244aad79d84f96a6eb9ad5e5e19136

        SHA512

        0ff7bb4228a2aee8d062031c31c67e05b88176efb0771602a591a599a78d7d03ba5e4d343caf8f4fadc14230b0b07605900eeb76a8e593fb22528a98d4300053

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe

        Filesize

        134KB

        MD5

        4127593be833d53d84be69a1073b46d6

        SHA1

        589338f5597ae7bc8e184dcf06b7bf0cb21ca104

        SHA256

        d0ba78c12f7fc6d3c7976b561c6e092bdefc4ee297b51c1f1bd2c13b775df5a4

        SHA512

        a239cf6ebd06f3d3955dd7fc885e3d0a8bc6d363c5861e4e2a2ed02f23fba6a852ba01a6e3b3582e5e763fc721867d38c1ee58af9f62e8f366a57d5863753ddb

      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe

        Filesize

        975KB

        MD5

        6a714c56525073f78181129ce52175db

        SHA1

        eb7a9356e9cc40368e1774035c23b15b7c8d792b

        SHA256

        57c417f53d9032a2f256cee17c274df2d411858abb14789406671c1dca6017c4

        SHA512

        04a183bddeeaa6fe316596fad52a6e707549ca2e93b2b294c618b4381018bf5791582e2ac08e0f5e5cea86ac980a56208e54e1e310945614e00524d50a00c550

      • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe

        Filesize

        71KB

        MD5

        f0372ff8a6148498b19e04203dbb9e69

        SHA1

        27fe4b5f8cb9464ab5ddc63e69c3c180b77dbde8

        SHA256

        298d334b630c77b70e66cf5e9c1924c7f0d498b02c2397e92e2d9efdff2e1bdf

        SHA512

        65d84817cdddb808b6e0ab964a4b41e96f7ce129e3cc8c253a31642efe73a9b7070638c22c659033e1479322aceea49d1afdceff54f8ed044b1513bffd33f865

      • C:\Users\Admin\AppData\Local\Temp\ecvB6A9.tmp

        Filesize

        14.0MB

        MD5

        053f33bc51ecaceb8bdbe1f13b24b384

        SHA1

        6e24d04820330d86de573e08252dfa37ea2266bd

        SHA256

        bce0a9a2886c985a61e3bff1f8e3c6d8c6d5a7f69c105c310d665c20008bdd6b

        SHA512

        728db52fde0e473b2c32a48d1aa3aceedae376c70204a19007f81647ab67526c0c6911e0f14872a8470cd912564173e641c1e989328c422642d1f9eb255c1d68

      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

        Filesize

        31B

        MD5

        b7161c0845a64ff6d7345b67ff97f3b0

        SHA1

        d223f855da541fe8e4c1d5c50cb26da0a1deb5fc

        SHA256

        fe9e28ff0b652e22a124b0a05382bc1ac48cbd9c7c76ca647b0c9f8542888f66

        SHA512

        98d8971ff20ba256cf886a9db416ac9366d2c6ad4ff51a65bd7e539974dc93f4c897f92d8c9c0319c69b27eacf05cd350a0302828e63190b03457a0eda57f680

      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt

        Filesize

        1KB

        MD5

        4888df6747c7b5165d3be00ff648ba1e

        SHA1

        a103dc0dd8da8ee99b0a06e0f5a915641e9268ed

        SHA256

        c820b1e9412f9e03a716787097c53ae3de6640dff9fbf81e20efdea7ba9897ef

        SHA512

        0888ffb551c1cf6fbd54fef1a7457232250cf74c88972fc63d6c4ed455c525ad3d94791cf4092da932a600fabada873c77125f627ad31a7184e030f4b352b793

      • C:\Users\Admin\AppData\Local\Temp\gdiview.msi

        Filesize

        231KB

        MD5

        7cc103f6fd70c6f3a2d2b9fca0438182

        SHA1

        699bd8924a27516b405ea9a686604b53b4e23372

        SHA256

        dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1

        SHA512

        92ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128

      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        184KB

        MD5

        7fee8223d6e4f82d6cd115a28f0b6d58

        SHA1

        1b89c25f25253df23426bd9ff6c9208f1202f58b

        SHA256

        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

        SHA512

        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

        Filesize

        61KB

        MD5

        a6279ec92ff948760ce53bba817d6a77

        SHA1

        5345505e12f9e4c6d569a226d50e71b5a572dce2

        SHA256

        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

        SHA512

        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

      • C:\Users\Admin\AppData\Roaming\1725754243473.exe

        Filesize

        101KB

        MD5

        ef6f72358cb02551caebe720fbc55f95

        SHA1

        b5ee276e8d479c270eceb497606bd44ee09ff4b8

        SHA256

        6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

        SHA512

        ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

      • C:\Users\Admin\AppData\Roaming\1725754243473.txt

        Filesize

        10KB

        MD5

        b198ea3e355ce219af5fecbfde746ba8

        SHA1

        b23a0b93bbb4ee6c3c05c6d2219da601fa471fcc

        SHA256

        4a4e1c2988e8be6d09e9c83c04b71dbc2af7872e2a7e6bd18689739837a4893c

        SHA512

        df45dedda3d09b46c471bb79e6aaf9416c2129476d96d2021e454515213c57e8c4515f7615b01394be1a615bfecbf596f666cea62b3f0d076f1dc40ffcd91ca7

      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bevga8mt.Admin\storage\default\moz-extension+++c9cdd9b2-a8a6-4f4c-8167-86f19e1820e6^userContextId=4294967295\idb\3647222921wleabcEoxlt-eengsairo.sqlite

        Filesize

        48KB

        MD5

        2eab03c24e521ee22c08a3e3bab16d7f

        SHA1

        d8ea20c5d4e7866c66ef36201e27fce4e10ad12b

        SHA256

        5c1fffc1e126ebbc19e4ef0cff60d5a0278cc57868737157746827acf7248ba2

        SHA512

        916cefe311d2b01d58062a022f5172880bd99c817b421f354a75a5c09e013676da7e2c16f333f1be121d62cb848b9739b0f2c4d2f45c56789574b93a97c7685b

      • memory/376-34-0x0000000010000000-0x000000001033D000-memory.dmp

        Filesize

        3.2MB

      • memory/376-33-0x0000000000400000-0x000000000050C000-memory.dmp

        Filesize

        1.0MB

      • memory/376-68-0x0000000000400000-0x000000000050C000-memory.dmp

        Filesize

        1.0MB

      • memory/1632-214-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/1632-208-0x0000000000400000-0x0000000000422000-memory.dmp

        Filesize

        136KB

      • memory/2532-50-0x0000000000400000-0x000000000050C000-memory.dmp

        Filesize

        1.0MB

      • memory/2532-64-0x0000000003570000-0x0000000003A1F000-memory.dmp

        Filesize

        4.7MB

      • memory/4060-60-0x0000000003600000-0x0000000003AAF000-memory.dmp

        Filesize

        4.7MB

      • memory/4060-51-0x0000000000400000-0x000000000050C000-memory.dmp

        Filesize

        1.0MB

      • memory/4100-203-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/4100-199-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/4752-186-0x0000000000830000-0x0000000000836000-memory.dmp

        Filesize

        24KB

      • memory/4752-185-0x0000000000A60000-0x0000000000A88000-memory.dmp

        Filesize

        160KB

      • memory/4752-184-0x0000000000820000-0x0000000000826000-memory.dmp

        Filesize

        24KB

      • memory/4752-183-0x0000000000160000-0x0000000000194000-memory.dmp

        Filesize

        208KB

      • memory/4924-121-0x0000000002D00000-0x0000000002D0D000-memory.dmp

        Filesize

        52KB