Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 03:43

General

  • Target

    e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5.exe

  • Size

    3.6MB

  • MD5

    78260204ab2a8d1039ea744d228ced1f

  • SHA1

    a108fb238a98c5090e3824db51a8a92ce0eb6cb1

  • SHA256

    e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5

  • SHA512

    2895dc42aa22b201c1fb809ffd7c6be40870a75b953e66299fdf222c3b5d299ad85172aea3ccbebda4a5af3a34766005a4ec3b96114c7fb56784d49efaf84b39

  • SSDEEP

    98304:UbR1dh6claIxZJrXentG2P8aGsw2kvpDNsK:UN1dIcljZ9MJP8fP75F

Malware Config

Extracted

Family

socelars

C2

http://www.fddnice.pw/

http://www.sokoinfo.pw/

http://www.zzhlike.pw/

http://www.wygexde.xyz/

Extracted

Family

ffdroider

C2

http://101.36.107.74

Signatures

  • Detect Fabookie payload 1 IoCs
  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Ffdroider family
  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars family
  • Socelars payload 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 41 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5.exe
    "C:\Users\Admin\AppData\Local\Temp\e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\aszd.exe
      "C:\Users\Admin\AppData\Local\Temp\aszd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2268
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im chrome.exe
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:288
    • C:\Users\Admin\AppData\Local\Temp\md9_9sjm.exe
      "C:\Users\Admin\AppData\Local\Temp\md9_9sjm.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2880
    • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe
      "C:\Users\Admin\AppData\Local\Temp\KRSetp.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2908
    • C:\Users\Admin\AppData\Local\Temp\cllhjkd.exe
      "C:\Users\Admin\AppData\Local\Temp\cllhjkd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\AppData\Local\Temp\cllhjkd.exe" ySerjRi2.exe> NuL &&sTaRT ySerjRi2.exe -PDCM9U3PjEKIfJ & If "" == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\cllhjkd.exe" ) do taskkill -f /IM "%~NXN" > Nul
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Users\Admin\AppData\Local\Temp\ySerjRi2.exe
          ySerjRi2.exe -PDCM9U3PjEKIfJ
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:940
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /Q /C copy /y "C:\Users\Admin\AppData\Local\Temp\ySerjRi2.exe" ySerjRi2.exe> NuL &&sTaRT ySerjRi2.exe -PDCM9U3PjEKIfJ & If "-PDCM9U3PjEKIfJ " == "" for %N In ("C:\Users\Admin\AppData\Local\Temp\ySerjRi2.exe" ) do taskkill -f /IM "%~NXN" > Nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2636
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c ECHO | Set /p = "MZ" > XsV9OO.mL & Copy /Y /B XsV9OO.Ml + 97EuVEV.YQ + YEKB.D + X67XN2.XZG + QffPWF3.0U + P1ZHqLAr.F + JlMMSK.3 + LHIHT.kWS + 2HmY.V DC0GX.w > NUL & StaRT regsvr32 -u -s Dc0gX.W & DeL 97EuVEV.YQ YEKb.D X67XN2.XZG QfFpwF3.0u P1ZHqlAr.F JlMmSK.3 LHIHT.kws 2HmY.V XsV9OO.ml > NUL
            5⤵
            • System Location Discovery: System Language Discovery
            PID:776
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" ECHO "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1984
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" Set /p = "MZ" 1>XsV9OO.mL"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1964
            • C:\Windows\SysWOW64\regsvr32.exe
              regsvr32 -u -s Dc0gX.W
              6⤵
              • Loads dropped DLL
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • System Location Discovery: System Language Discovery
              PID:1308
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -f /IM "cllhjkd.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
    • C:\Users\Admin\AppData\Local\Temp\PlayerUI6.exe
      "C:\Users\Admin\AppData\Local\Temp\PlayerUI6.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2184
    • C:\Users\Admin\AppData\Local\Temp\pub2.exe
      "C:\Users\Admin\AppData\Local\Temp\pub2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 128
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:436
    • C:\Users\Admin\AppData\Local\Temp\pzysgf.exe
      "C:\Users\Admin\AppData\Local\Temp\pzysgf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1652
      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
        C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2816
    • C:\Users\Admin\AppData\Local\Temp\mmt.exe
      "C:\Users\Admin\AppData\Local\Temp\mmt.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2HmY.V

    Filesize

    415KB

    MD5

    cab61d492ab33bf8e6f9637461c01fa7

    SHA1

    e60bceafa1e486a523313a6f78b9f38e8a61cb9d

    SHA256

    c4e613bc21b503b3060781adf8880759a9282e826d1d60ea84457a12a2fc3deb

    SHA512

    c47e163200773fd608040f5294c9d07c9444ef4ba245bbd11a32756e97dcc6866bbe2e49dc684049f0073a4ba96065f009f94361aa6df2823ffe4496ff4954d6

  • C:\Users\Admin\AppData\Local\Temp\97EuvEV.Yq

    Filesize

    206KB

    MD5

    6b25ed51f3cb678d8ba90a7185804749

    SHA1

    8f4cd04ae5a54d41c497c6159ffc498e954846f7

    SHA256

    781742b58bf7edf0d371d4805aad00511187bcbffc411608fdb7c79c7ce24f07

    SHA512

    48511b2068f4faeedc64c8ac5cef70d401561c76f5b061dfd118653435711f0a8d3b7f635134ec37764089f45508763d65bce4f81cb58c90cc5f2bbd68da46a3

  • C:\Users\Admin\AppData\Local\Temp\Cab91B5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\JlMmsK.3

    Filesize

    63KB

    MD5

    dec119aed226068fdf6ad173e18c07d0

    SHA1

    97d90a9e797be7a87985d03d740d046f7f113be0

    SHA256

    1752700220c3f7932b13602231ad009f555ede58eb9b090f4aea1fee408af47b

    SHA512

    4ef92ea73131ba7f2abb4b6d35c4d8bffc7d4e9e284292ab807a82ad6466c20144e9a64ee8058be459cbaaca412b6e41ae20278d3f96ec24dd8f42989178e0d0

  • C:\Users\Admin\AppData\Local\Temp\KRSetp.exe

    Filesize

    145KB

    MD5

    81f7a517bb059767497ea5249acdccc9

    SHA1

    e3e11db84fe185bf7d4da3048ded7233fa060f78

    SHA256

    c0a2050f0874cb3181ccd7eff703cfd5ba583508d8152442fdc209238016923b

    SHA512

    fcee215e39c8c382347a265392d4c432a6634476746b7549b91065f754299b711e9ab0696ec9fd4f330836c13d26f77ee99b2d94b9b353540c2ee8c3cd25fa7d

  • C:\Users\Admin\AppData\Local\Temp\LhIHt.kws

    Filesize

    89KB

    MD5

    79a7ca1ed207441d4322f2e1a2e5a4b5

    SHA1

    742091efec4302a6476cbac6a98b193818394863

    SHA256

    0e9bac6981b0fee65ed92f01112045a986c9d4739c340d54871749d08dcf675c

    SHA512

    41cbbce258857bc3d954bb1b5c9e00359df88ddb8af79c12839ca698df86185989863eee8cdfee5219a25570bc9f463d9437613d5bfe92ef1ebf777ce8ad3649

  • C:\Users\Admin\AppData\Local\Temp\P1zhqlar.F

    Filesize

    266KB

    MD5

    064c913bd41b0073b710db687fe914cd

    SHA1

    23b3d90edeb013994a61a1fa488cf96de059b50e

    SHA256

    bd2740c0541798b9933c1a6854e32f6e911f6f8de9cda48b9fbc17ffbefee1bc

    SHA512

    8a42562d543b4e68062aa2e85216c8f3768bffb1c98e296067734b67f8974886e439674f89e339cf8919d8c48f90ccf5342172051d8c6ad85bcdf607a704cdd7

  • C:\Users\Admin\AppData\Local\Temp\PlayerUI6.exe

    Filesize

    71KB

    MD5

    eb8c3efd163f76ec76dd419a696f513f

    SHA1

    072e0e405cf87c85f46aab552ffe140e7ffd63c3

    SHA256

    bcc495c75df0a47f59a60fdfb870bf833f0d320aff3f1e316f1cd96b5e578c07

    SHA512

    c335ffbd94a1bb3f3111bcae0e83bf5d180d2ee517526910a19ec76a9e3b736d94d73fd7cc691d08baa31a1f67012048ffdd6a4bc5f871e537079caf3497a139

  • C:\Users\Admin\AppData\Local\Temp\Qffpwf3.0u

    Filesize

    19KB

    MD5

    614c4336db0db59e7708537f1a2de8cb

    SHA1

    03bb00e6590527ff8e3420220966afb98c93823d

    SHA256

    fe7e50905b04b569250c803f0d650c3b23b49340af16785979eaa2c26f795e72

    SHA512

    e90a54d51cae709c9574849679e1df34dbe71b017b498ad5a07b3a316a443aca8e1a1ed288c897e4bdd8735149f5d0a1855bb1454b25b4d1851af60d8e2160de

  • C:\Users\Admin\AppData\Local\Temp\Tar92C1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\X67XN2.XZG

    Filesize

    67KB

    MD5

    5442df440039fcc2500af01ccf765d6b

    SHA1

    823f9cc957feb5c71168291bdcf8a85eafe22987

    SHA256

    aff51216192aa0fe4bbdaf9d8f8bc663020ca537bdcb48efee43c8287f05b4ec

    SHA512

    96eb518f4299173ce163f9b3ebe9bb975da6bca3b2a65c00adc916d6cfb55eee665555efd92a8a1ece1da47de939ea3230505396dfcce2f58f388ad43dd93ae6

  • C:\Users\Admin\AppData\Local\Temp\XsV9OO.mL

    Filesize

    2B

    MD5

    ac6ad5d9b99757c3a878f2d275ace198

    SHA1

    439baa1b33514fb81632aaf44d16a9378c5664fc

    SHA256

    9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

    SHA512

    bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

  • C:\Users\Admin\AppData\Local\Temp\YEkb.D

    Filesize

    136KB

    MD5

    cbff8f61a0d113104b0df551869c14ba

    SHA1

    c357021809ba404ef4c2219ec239e59b41f9ba33

    SHA256

    9adabc5bd192273ea81e5011c020471cdf913d5bc101efa8f455045daaf9cdf6

    SHA512

    66ae4c74b15a71d7c17f4025a307aca76c14fe5fc1858bc7de8e9e0187aa53fa9e1e1ae18e0ad5fa7ecb0d2fd72565b6d5990181d00d0a680a95a1431e795498

  • C:\Users\Admin\AppData\Local\Temp\cllhjkd.exe

    Filesize

    1.4MB

    MD5

    62229d197f4259b13833f1844416f1e0

    SHA1

    dd08739188001cf9b9aa079dea6b85f4c53dc53f

    SHA256

    5f7cf2470f08557eacce0c92e280e5a6876a1d775848bfb75717102ab3b411b4

    SHA512

    7052dcc3f4b95626540de13541a7491fb21f5fb10249f114fe9b3bf5da5afa3b3abff3b3dd27d69315763afe300166b97c4a8212a973ce916bf8b53829903c11

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    61KB

    MD5

    a6279ec92ff948760ce53bba817d6a77

    SHA1

    5345505e12f9e4c6d569a226d50e71b5a572dce2

    SHA256

    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

    SHA512

    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

  • C:\Users\Admin\AppData\Local\Temp\mmt.exe

    Filesize

    241KB

    MD5

    2caa7177ed51df16cef41c2ffc281295

    SHA1

    a537b974242a12e5b1fb2ffaf349488266ef8d80

    SHA256

    2e9419d4569abdd137206cc0ad1c574e793da322874dfc560db9c3e718626173

    SHA512

    8d6443d70f6e64a0bfb28cd55cb3a6c90d6d63e093e02208b74fa38c9ae0854f8b03d19ca5e2da02df824dd4d374699a947266a0bd6fa0f9c4825599a602d7ba

  • C:\Users\Admin\AppData\Local\Temp\pzysgf.exe

    Filesize

    975KB

    MD5

    8cbde3982249e20a6f564eb414f06fe4

    SHA1

    6d040b6c0f9d10b07f0b63797aa7bfabf0703925

    SHA256

    4a8a37d0010b2a946e9b202ea07d8b93a29a3ea9a56852678307076e10999c83

    SHA512

    d84863489b5fb2d17ee1df47de735a88d510bb8f5e378126243e34edb017d3ed82807c7dbd5cf6a977601f0e440be12e680679f1ce472619fd0ebbe9579c3e1b

  • \Users\Admin\AppData\Local\Temp\CC4F.tmp

    Filesize

    1.2MB

    MD5

    d124f55b9393c976963407dff51ffa79

    SHA1

    2c7bbedd79791bfb866898c85b504186db610b5d

    SHA256

    ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

    SHA512

    278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

  • \Users\Admin\AppData\Local\Temp\aszd.exe

    Filesize

    1.4MB

    MD5

    e9f3058e71d88d3234e630aff56f808a

    SHA1

    f87f74537526352a2fa344a740f3b6e62bb35b56

    SHA256

    74453a1a22a9c971caa87c55658059872c47f9ede5923b3be4f82bc8b8ed73a0

    SHA512

    a3a92f00323963f287acd3d336ed4b7d21b68f593a0f0fc27ade3a7ef8cc8eca3fc40f6ca127084b4f37f70941a880a8866fbbf070fb1d167cae869ac49744f7

  • \Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    184KB

    MD5

    7fee8223d6e4f82d6cd115a28f0b6d58

    SHA1

    1b89c25f25253df23426bd9ff6c9208f1202f58b

    SHA256

    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

    SHA512

    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

  • \Users\Admin\AppData\Local\Temp\md9_9sjm.exe

    Filesize

    473KB

    MD5

    83658e1ab7e604f57c88e56c06431643

    SHA1

    47b4f9a180959c1ccd7aef7132a0f460e2129e43

    SHA256

    0ed379e28dbe1c5caa0022a650a5bb8336e91e51dcd960db1ae0bf67baf36848

    SHA512

    5c0ae500b4e765c951938de55738786b4955dcdbb4a2cd8b89584a3cc2bfa8d93216e68a6f49e8d76898c42c91181f41ec42660cc0780f7c4727fdf71aaa2d0f

  • \Users\Admin\AppData\Local\Temp\pub2.exe

    Filesize

    161KB

    MD5

    830b90c66a2dfdc3127a06dff8966e02

    SHA1

    7225ae7659fa9b72b3f93b3cd26a7cc3268e2a70

    SHA256

    cbf13c9639cc3a59eaf720081a7724f07518c9c5b46fba53277fd7b07f8e37f0

    SHA512

    21f6d27fb07db662f5e627d108d724aa7789f7891f62e00f8c01d7c9adf7a46d2b67924f4ed85337288de2d782b9f196945ab57353c70140b6815bee3b520464

  • memory/1308-430-0x0000000000250000-0x00000000002EF000-memory.dmp

    Filesize

    636KB

  • memory/1308-203-0x0000000010000000-0x000000001013D000-memory.dmp

    Filesize

    1.2MB

  • memory/1308-429-0x0000000010000000-0x000000001013D000-memory.dmp

    Filesize

    1.2MB

  • memory/1308-431-0x0000000000350000-0x00000000003DC000-memory.dmp

    Filesize

    560KB

  • memory/1308-435-0x0000000000350000-0x00000000003DC000-memory.dmp

    Filesize

    560KB

  • memory/1308-432-0x0000000000350000-0x00000000003DC000-memory.dmp

    Filesize

    560KB

  • memory/1308-434-0x0000000000350000-0x00000000003DC000-memory.dmp

    Filesize

    560KB

  • memory/1512-154-0x0000000000CE0000-0x0000000000D22000-memory.dmp

    Filesize

    264KB

  • memory/1652-146-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1652-141-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1876-204-0x0000000000400000-0x0000000000820000-memory.dmp

    Filesize

    4.1MB

  • memory/2060-43-0x0000000003720000-0x0000000003836000-memory.dmp

    Filesize

    1.1MB

  • memory/2060-32-0x0000000003720000-0x0000000003836000-memory.dmp

    Filesize

    1.1MB

  • memory/2184-130-0x0000000001140000-0x0000000001158000-memory.dmp

    Filesize

    96KB

  • memory/2432-139-0x0000000000170000-0x00000000001CB000-memory.dmp

    Filesize

    364KB

  • memory/2432-138-0x0000000000170000-0x00000000001CB000-memory.dmp

    Filesize

    364KB

  • memory/2432-261-0x0000000000430000-0x0000000000452000-memory.dmp

    Filesize

    136KB

  • memory/2432-331-0x0000000000170000-0x00000000001CB000-memory.dmp

    Filesize

    364KB

  • memory/2432-262-0x0000000000430000-0x0000000000452000-memory.dmp

    Filesize

    136KB

  • memory/2432-436-0x0000000000430000-0x0000000000452000-memory.dmp

    Filesize

    136KB

  • memory/2816-428-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2816-263-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2880-260-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2880-438-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-205-0x0000000000150000-0x0000000000156000-memory.dmp

    Filesize

    24KB

  • memory/2908-155-0x0000000001000000-0x000000000102E000-memory.dmp

    Filesize

    184KB

  • memory/2908-190-0x0000000000130000-0x0000000000136000-memory.dmp

    Filesize

    24KB

  • memory/2908-202-0x00000000003F0000-0x000000000040C000-memory.dmp

    Filesize

    112KB