Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 15:40

General

  • Target

    main_setup_x86x64.exe

  • Size

    5.7MB

  • MD5

    d241c70e1db8676e48c9c02937b2a589

  • SHA1

    45f2b455c72040798fd92801e28dd5c154be8e8b

  • SHA256

    36a7bd10bbfbb3998773c4822e1813b4f4bfb33e65a008241c35116e19dae52c

  • SHA512

    5b376da38f0361a672ac3ac4c1fe0ec66ed3642fb591ade7fe4f400f7ad3c1affe440a4b243d036e4e58ed131df43376ff5e2b6c1b733a43cf4e68dd752f7072

  • SSDEEP

    98304:JEp59qaoFjCCtIJ89NG67vrPqTxSMcEeeZ6eDoPKXLcj:JEpKaoRw89kOrSTWLeDNXI

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 7 IoCs
  • Sectoprat family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Vidar Stealer 1 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 64 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.exe
    "C:\Users\Admin\AppData\Local\Temp\main_setup_x86x64.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS037198A6\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_1.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2440
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_1.exe
            sahiba_1.exe
            5⤵
            • Executes dropped EXE
            PID:3000
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_2.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2176
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_2.exe
            sahiba_2.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2776
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 264
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2236
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_3.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2768
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_3.exe
            sahiba_3.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            PID:2996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2996 -s 988
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:3060
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_4.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2460
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_4.exe
            sahiba_4.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:3036
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1684
            • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
              C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_5.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2028
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_5.exe
            sahiba_5.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2824
            • C:\Users\Admin\AppData\Local\Temp\is-KJIA9.tmp\sahiba_5.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-KJIA9.tmp\sahiba_5.tmp" /SL5="$60120,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_5.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2332
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_6.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1872
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_6.exe
            sahiba_6.exe
            5⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:3044
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_7.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:2936
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_7.exe
            sahiba_7.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1432
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_8.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1536
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_8.exe
            sahiba_8.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1344
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_9.exe
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1352
          • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_9.exe
            sahiba_9.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:3008
            • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_9.exe
              C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_9.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1172
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c sahiba_10.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1964
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 432
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\libcurl.dll

    Filesize

    218KB

    MD5

    d09be1f47fd6b827c81a4812b4f7296f

    SHA1

    028ae3596c0790e6d7f9f2f3c8e9591527d267f7

    SHA256

    0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

    SHA512

    857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\libstdc++-6.dll

    Filesize

    647KB

    MD5

    5e279950775baae5fea04d2cc4526bcc

    SHA1

    8aef1e10031c3629512c43dd8b0b5d9060878453

    SHA256

    97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

    SHA512

    666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\libwinpthread-1.dll

    Filesize

    69KB

    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_1.txt

    Filesize

    1.0MB

    MD5

    b65276c9e9864815be738ec102f747d4

    SHA1

    7b2d710d28b7584a402015b381200af16929a71a

    SHA256

    3f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193

    SHA512

    71af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_10.txt

    Filesize

    2.0MB

    MD5

    78a26a53ce7872da5b8888eb9def6213

    SHA1

    5d78b2b4cbf9b68c73b0de0f72a3a3d924ae8e48

    SHA256

    0af3463bb8b618353780b6d6bdf6fb0beadf1cb3d1abed0c5c7bb6ce0c8e8d0e

    SHA512

    6f93b5e20c81eb9be4aedd206f5cbc00ec0edfc98e264748a0fc8af7d908f13ef7c5c8862bac003ca18c72660a3e82b8d58f681b616ef1589dc4a441ef2975fe

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_2.txt

    Filesize

    181KB

    MD5

    1ada33ee282b0820c6b19aa0c9bff3e8

    SHA1

    e2bb17c09d6750879812e6098805bd10a5729900

    SHA256

    92dd84bb6595077942fc88a3e510dc5af6dd37e3f13efbabd0c0f2f89cab9a8a

    SHA512

    3e85a7e2e3341b253641fa22ad71005e4e08078f41a67959e86e100748c335bf876216990700638d2ad455d3c639206680e7d780fafc2e8247814d09cf55b3a3

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_3.txt

    Filesize

    547KB

    MD5

    26374fa53f4ea2996ab12c97b9c6a6f9

    SHA1

    d890be0a7e38fe9cf2124f8026f3695441a572c5

    SHA256

    1910b1f38bb9a757fbde7639c303c09e8a020c8ad881fe862584319332c7e4da

    SHA512

    1cda656803067309660f06bf56193ac5b9076c9ade089b3a16770932aaa5b69ddc0e353abeb4e4b5f3605001b1ca7ff169b56e459036f2dbac986a1bfa2ecfe2

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_4.txt

    Filesize

    972KB

    MD5

    5668cb771643274ba2c375ec6403c266

    SHA1

    dd78b03428b99368906fe62fc46aaaf1db07a8b9

    SHA256

    d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

    SHA512

    135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_5.txt

    Filesize

    757KB

    MD5

    8c4df9d37195987ede03bf8adb495686

    SHA1

    010626025ca791720f85984a842c893b78f439d2

    SHA256

    5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

    SHA512

    8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_6.txt

    Filesize

    130KB

    MD5

    ed3809598fa382b3798c9ea73e717633

    SHA1

    886c47cd90c1186ff50f0dd0f9a954af4f9855e7

    SHA256

    eb246654c3bb7be5fcae7918bf2c7df84446b6763de5966c15a42ed937ffc45b

    SHA512

    7b45a4558eb442926c7787c8ffda69d4564018402716363ea282d2e68bc36734bd2698687550ea01f9c146afd93f26a417808d6fe51dbb7c43dd68491b2f03e9

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_7.txt

    Filesize

    804KB

    MD5

    a73c42ca8cdc50ffefdd313e2ba4d423

    SHA1

    7fcc3b60e169fe3c64935de7e431654f570d9dd2

    SHA256

    c7dcc52d680abbfa5fa776d2b9ffa1a8360247617d6bef553a29da8356590f0b

    SHA512

    2bf103b2219839c3c17c88dc3248460dc518c5408a5deb5bea80a48ee713b3900c3b1dad8e27f643c01d49ad471761aaa5b0d53c3d507d96a5d92ca5517dac99

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_8.txt

    Filesize

    280KB

    MD5

    220ecbbbe11c05affa11e330989f6435

    SHA1

    92e8b468db0fc5a860c9974778af12e28003a0a7

    SHA256

    c338f9a0ad66342a14971975da43c29e51f6ac04d526567d5b2298be7b533be1

    SHA512

    9baff08576a69ef847bb8989d3852f2991c198591d55346548e0f13c87da59284d7745b87c4557f4badb866a3b0f332eebc2de949a144caa24f6ea7dafae71ac

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\sahiba_9.txt

    Filesize

    386KB

    MD5

    45718979b55d4e6512fcda91f7396b5f

    SHA1

    6db821e00e09504182323ef39857d4072c7d66e2

    SHA256

    cbd9ea9ace434652f4d12228912c681181bbd76b5db76b14a73f8eaee94bb3cc

    SHA512

    f8fda3231b3c811604e70777b700692d67fb47038ebdc087fae006103edfff6f2e14c79ae0406c229e68ae255cfae888471cc54991eb550329618ddd622ce1bf

  • C:\Users\Admin\AppData\Local\Temp\7zS037198A6\setup_install.exe

    Filesize

    287KB

    MD5

    f6a581d16f23248c329cc645118b4289

    SHA1

    60ca9cf0776f26fab4602e78eff29187d90767ca

    SHA256

    5344f9bda7ef7999ed1232b0b08df2c79e9b4372fcdc7e8a93228d2b53d3bfa4

    SHA512

    342e59faa81acba2c3fcfa2f6cdc7fad60fb7f4523ff7637db94978c39f15194213067812426ea18e06428c795cc79a55ce1667213d825a7e13b81eaf2b7392a

  • C:\Users\Admin\AppData\Local\Temp\CabCE0B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCE5C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    184KB

    MD5

    7fee8223d6e4f82d6cd115a28f0b6d58

    SHA1

    1b89c25f25253df23426bd9ff6c9208f1202f58b

    SHA256

    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

    SHA512

    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    61KB

    MD5

    a6279ec92ff948760ce53bba817d6a77

    SHA1

    5345505e12f9e4c6d569a226d50e71b5a572dce2

    SHA256

    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

    SHA512

    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

  • \Users\Admin\AppData\Local\Temp\7zS037198A6\libcurlpp.dll

    Filesize

    54KB

    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • \Users\Admin\AppData\Local\Temp\7zS037198A6\libgcc_s_dw2-1.dll

    Filesize

    113KB

    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • \Users\Admin\AppData\Local\Temp\setup_installer.exe

    Filesize

    5.6MB

    MD5

    0de8943eeed1e068cfb1f8174eb4777b

    SHA1

    8c9616d1c945fbddfe2093f2bc50408f53e59c19

    SHA256

    8869188aa10bb2230b54eeaf867d45700c10f5eb2d2cf20139187cac10372231

    SHA512

    637a07bc552cd0b30b820c32c0ebdff3451b25b8b83bfd65d5e924f4b9ba20ca75af48d5dbe5f16344128dc915d5fd3efe010d0270baf98b044570624444cd1f

  • memory/1172-172-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-181-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-182-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-183-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-174-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-176-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-178-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1172-180-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1344-292-0x0000000000400000-0x0000000002C3B000-memory.dmp

    Filesize

    40.2MB

  • memory/1344-147-0x00000000003C0000-0x00000000003E0000-memory.dmp

    Filesize

    128KB

  • memory/1344-154-0x0000000004710000-0x000000000472E000-memory.dmp

    Filesize

    120KB

  • memory/1684-171-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1684-168-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1840-54-0x0000000003310000-0x000000000342E000-memory.dmp

    Filesize

    1.1MB

  • memory/1840-48-0x0000000003310000-0x000000000342E000-memory.dmp

    Filesize

    1.1MB

  • memory/2332-161-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2644-284-0x00000000001D0000-0x00000000001F2000-memory.dmp

    Filesize

    136KB

  • memory/2644-289-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2756-76-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-196-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-79-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-77-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-74-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2756-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-73-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2756-81-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2756-191-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-85-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-192-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2756-193-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2756-194-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2756-82-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-83-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-84-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-75-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2756-86-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-61-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2756-78-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2756-87-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2756-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2756-80-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2756-195-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2776-291-0x0000000000400000-0x0000000002C22000-memory.dmp

    Filesize

    40.1MB

  • memory/2824-122-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2824-165-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2996-290-0x0000000000400000-0x0000000002C7D000-memory.dmp

    Filesize

    40.5MB

  • memory/3008-128-0x00000000011E0000-0x0000000001246000-memory.dmp

    Filesize

    408KB

  • memory/3036-167-0x0000000000AA0000-0x0000000000AFB000-memory.dmp

    Filesize

    364KB

  • memory/3036-278-0x00000000001E0000-0x0000000000202000-memory.dmp

    Filesize

    136KB

  • memory/3036-166-0x0000000000AA0000-0x0000000000AFB000-memory.dmp

    Filesize

    364KB

  • memory/3036-283-0x0000000000AA0000-0x0000000000AFB000-memory.dmp

    Filesize

    364KB

  • memory/3036-298-0x00000000001E0000-0x0000000000202000-memory.dmp

    Filesize

    136KB

  • memory/3044-155-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/3044-153-0x0000000000250000-0x0000000000272000-memory.dmp

    Filesize

    136KB

  • memory/3044-152-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/3044-141-0x00000000013E0000-0x0000000001408000-memory.dmp

    Filesize

    160KB