Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 15:40

General

  • Target

    setup_installer.exe

  • Size

    5.6MB

  • MD5

    0de8943eeed1e068cfb1f8174eb4777b

  • SHA1

    8c9616d1c945fbddfe2093f2bc50408f53e59c19

  • SHA256

    8869188aa10bb2230b54eeaf867d45700c10f5eb2d2cf20139187cac10372231

  • SHA512

    637a07bc552cd0b30b820c32c0ebdff3451b25b8b83bfd65d5e924f4b9ba20ca75af48d5dbe5f16344128dc915d5fd3efe010d0270baf98b044570624444cd1f

  • SSDEEP

    98304:xI9eBSJ4cb13SCpPnmb+IVmK8Cnc1436M8qj8skXg1IPL+29CvLUBsK80:xI9e5cb15tnmCIgKHnc16aq1Kg1IPLzd

Malware Config

Extracted

Family

nullmixer

C2

http://razino.xyz/

Extracted

Family

redline

Botnet

Cana

C2

176.111.174.254:56328

Extracted

Family

redline

Botnet

Ani

C2

detuyaluro.xyz:80

Signatures

  • Detect Fabookie payload 1 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Fabookie family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 7 IoCs
  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • Nullmixer family
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 7 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 7 IoCs
  • Sectoprat family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Detected Nirsoft tools 2 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • Vidar Stealer 1 IoCs
  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 64 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:108
    • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\setup_install.exe
      "C:\Users\Admin\AppData\Local\Temp\7zSC6054728\setup_install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_1.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2012
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_1.exe
          sahiba_1.exe
          4⤵
          • Executes dropped EXE
          PID:2312
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_2.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_2.exe
          sahiba_2.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1644
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 268
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2184
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_3.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_3.exe
          sahiba_3.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1036 -s 960
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2784
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_4.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2056
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_4.exe
          sahiba_4.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies system certificate store
          PID:2504
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2260
          • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
            C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:2824
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_5.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1788
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_5.exe
          sahiba_5.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3028
          • C:\Users\Admin\AppData\Local\Temp\is-UPBU6.tmp\sahiba_5.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-UPBU6.tmp\sahiba_5.tmp" /SL5="$601D0,506127,422400,C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_5.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:2096
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_6.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1576
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_6.exe
          sahiba_6.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          PID:1928
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_7.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1424
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_7.exe
          sahiba_7.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:3036
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_8.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2120
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_8.exe
          sahiba_8.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_9.exe
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1264
        • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_9.exe
          sahiba_9.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:236
          • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_9.exe
            C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_9.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:972
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c sahiba_10.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 436
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\libcurl.dll

    Filesize

    218KB

    MD5

    d09be1f47fd6b827c81a4812b4f7296f

    SHA1

    028ae3596c0790e6d7f9f2f3c8e9591527d267f7

    SHA256

    0de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e

    SHA512

    857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\libcurlpp.dll

    Filesize

    54KB

    MD5

    e6e578373c2e416289a8da55f1dc5e8e

    SHA1

    b601a229b66ec3d19c2369b36216c6f6eb1c063e

    SHA256

    43e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f

    SHA512

    9df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\libstdc++-6.dll

    Filesize

    647KB

    MD5

    5e279950775baae5fea04d2cc4526bcc

    SHA1

    8aef1e10031c3629512c43dd8b0b5d9060878453

    SHA256

    97de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87

    SHA512

    666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\libwinpthread-1.dll

    Filesize

    69KB

    MD5

    1e0d62c34ff2e649ebc5c372065732ee

    SHA1

    fcfaa36ba456159b26140a43e80fbd7e9d9af2de

    SHA256

    509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

    SHA512

    3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_1.txt

    Filesize

    1.0MB

    MD5

    b65276c9e9864815be738ec102f747d4

    SHA1

    7b2d710d28b7584a402015b381200af16929a71a

    SHA256

    3f8b6c43ac0c4fa103b16d2c1db4f6b7bb5d6976e1f7618c7530be2f1470f193

    SHA512

    71af45c98057b59ee1e9c1aaf79b9b25bb2e30c2087d310d107f9bdd02da8a857babcb976456a326f37e1b35b074451878aa83a85b69b4df0db18cdb2ca3f54b

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_10.txt

    Filesize

    2.0MB

    MD5

    78a26a53ce7872da5b8888eb9def6213

    SHA1

    5d78b2b4cbf9b68c73b0de0f72a3a3d924ae8e48

    SHA256

    0af3463bb8b618353780b6d6bdf6fb0beadf1cb3d1abed0c5c7bb6ce0c8e8d0e

    SHA512

    6f93b5e20c81eb9be4aedd206f5cbc00ec0edfc98e264748a0fc8af7d908f13ef7c5c8862bac003ca18c72660a3e82b8d58f681b616ef1589dc4a441ef2975fe

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_4.txt

    Filesize

    972KB

    MD5

    5668cb771643274ba2c375ec6403c266

    SHA1

    dd78b03428b99368906fe62fc46aaaf1db07a8b9

    SHA256

    d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384

    SHA512

    135bd12414773cc84270af5225920a01487626528d7bbc2b703be71652265772c2e5488ee3f7e2c53b0b01c617b8c7920e0b457472b6724cfa9ec4c390b0a55a

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_5.txt

    Filesize

    757KB

    MD5

    8c4df9d37195987ede03bf8adb495686

    SHA1

    010626025ca791720f85984a842c893b78f439d2

    SHA256

    5207c76c2e29a2f9951dc4697199a89fdd9516a324f4df7fa04184c3942cc185

    SHA512

    8fcb279c27682e13ec716e250c9d87cd3d9447b6376e4e6b97e8a283994c02eeac112f2e2c60d4e6316ece5e11fd992cd06efa48c72ee7b0c306b16347698655

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_6.txt

    Filesize

    130KB

    MD5

    ed3809598fa382b3798c9ea73e717633

    SHA1

    886c47cd90c1186ff50f0dd0f9a954af4f9855e7

    SHA256

    eb246654c3bb7be5fcae7918bf2c7df84446b6763de5966c15a42ed937ffc45b

    SHA512

    7b45a4558eb442926c7787c8ffda69d4564018402716363ea282d2e68bc36734bd2698687550ea01f9c146afd93f26a417808d6fe51dbb7c43dd68491b2f03e9

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_7.txt

    Filesize

    804KB

    MD5

    a73c42ca8cdc50ffefdd313e2ba4d423

    SHA1

    7fcc3b60e169fe3c64935de7e431654f570d9dd2

    SHA256

    c7dcc52d680abbfa5fa776d2b9ffa1a8360247617d6bef553a29da8356590f0b

    SHA512

    2bf103b2219839c3c17c88dc3248460dc518c5408a5deb5bea80a48ee713b3900c3b1dad8e27f643c01d49ad471761aaa5b0d53c3d507d96a5d92ca5517dac99

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_8.txt

    Filesize

    280KB

    MD5

    220ecbbbe11c05affa11e330989f6435

    SHA1

    92e8b468db0fc5a860c9974778af12e28003a0a7

    SHA256

    c338f9a0ad66342a14971975da43c29e51f6ac04d526567d5b2298be7b533be1

    SHA512

    9baff08576a69ef847bb8989d3852f2991c198591d55346548e0f13c87da59284d7745b87c4557f4badb866a3b0f332eebc2de949a144caa24f6ea7dafae71ac

  • C:\Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_9.txt

    Filesize

    386KB

    MD5

    45718979b55d4e6512fcda91f7396b5f

    SHA1

    6db821e00e09504182323ef39857d4072c7d66e2

    SHA256

    cbd9ea9ace434652f4d12228912c681181bbd76b5db76b14a73f8eaee94bb3cc

    SHA512

    f8fda3231b3c811604e70777b700692d67fb47038ebdc087fae006103edfff6f2e14c79ae0406c229e68ae255cfae888471cc54991eb550329618ddd622ce1bf

  • C:\Users\Admin\AppData\Local\Temp\Cab409B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar411B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    184KB

    MD5

    7fee8223d6e4f82d6cd115a28f0b6d58

    SHA1

    1b89c25f25253df23426bd9ff6c9208f1202f58b

    SHA256

    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

    SHA512

    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe

    Filesize

    61KB

    MD5

    a6279ec92ff948760ce53bba817d6a77

    SHA1

    5345505e12f9e4c6d569a226d50e71b5a572dce2

    SHA256

    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

    SHA512

    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

  • \Users\Admin\AppData\Local\Temp\7zSC6054728\libgcc_s_dw2-1.dll

    Filesize

    113KB

    MD5

    9aec524b616618b0d3d00b27b6f51da1

    SHA1

    64264300801a353db324d11738ffed876550e1d3

    SHA256

    59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

    SHA512

    0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

  • \Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_2.exe

    Filesize

    181KB

    MD5

    1ada33ee282b0820c6b19aa0c9bff3e8

    SHA1

    e2bb17c09d6750879812e6098805bd10a5729900

    SHA256

    92dd84bb6595077942fc88a3e510dc5af6dd37e3f13efbabd0c0f2f89cab9a8a

    SHA512

    3e85a7e2e3341b253641fa22ad71005e4e08078f41a67959e86e100748c335bf876216990700638d2ad455d3c639206680e7d780fafc2e8247814d09cf55b3a3

  • \Users\Admin\AppData\Local\Temp\7zSC6054728\sahiba_3.exe

    Filesize

    547KB

    MD5

    26374fa53f4ea2996ab12c97b9c6a6f9

    SHA1

    d890be0a7e38fe9cf2124f8026f3695441a572c5

    SHA256

    1910b1f38bb9a757fbde7639c303c09e8a020c8ad881fe862584319332c7e4da

    SHA512

    1cda656803067309660f06bf56193ac5b9076c9ade089b3a16770932aaa5b69ddc0e353abeb4e4b5f3605001b1ca7ff169b56e459036f2dbac986a1bfa2ecfe2

  • \Users\Admin\AppData\Local\Temp\7zSC6054728\setup_install.exe

    Filesize

    287KB

    MD5

    f6a581d16f23248c329cc645118b4289

    SHA1

    60ca9cf0776f26fab4602e78eff29187d90767ca

    SHA256

    5344f9bda7ef7999ed1232b0b08df2c79e9b4372fcdc7e8a93228d2b53d3bfa4

    SHA512

    342e59faa81acba2c3fcfa2f6cdc7fad60fb7f4523ff7637db94978c39f15194213067812426ea18e06428c795cc79a55ce1667213d825a7e13b81eaf2b7392a

  • memory/108-36-0x0000000002B80000-0x0000000002C9E000-memory.dmp

    Filesize

    1.1MB

  • memory/108-43-0x0000000002B80000-0x0000000002C9E000-memory.dmp

    Filesize

    1.1MB

  • memory/236-160-0x0000000000920000-0x0000000000986000-memory.dmp

    Filesize

    408KB

  • memory/972-290-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/972-292-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-286-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-284-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-282-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-291-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-293-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/972-288-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/1036-294-0x0000000000400000-0x0000000002C7D000-memory.dmp

    Filesize

    40.5MB

  • memory/1644-303-0x0000000000400000-0x0000000002C22000-memory.dmp

    Filesize

    40.1MB

  • memory/1928-194-0x00000000003C0000-0x00000000003C6000-memory.dmp

    Filesize

    24KB

  • memory/1928-174-0x0000000001070000-0x0000000001098000-memory.dmp

    Filesize

    160KB

  • memory/1928-204-0x00000000003D0000-0x00000000003F2000-memory.dmp

    Filesize

    136KB

  • memory/1928-205-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2096-164-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2260-156-0x0000000000240000-0x000000000029B000-memory.dmp

    Filesize

    364KB

  • memory/2260-152-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2260-154-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2260-155-0x0000000000240000-0x000000000024D000-memory.dmp

    Filesize

    52KB

  • memory/2504-151-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2504-318-0x00000000004C0000-0x00000000004E2000-memory.dmp

    Filesize

    136KB

  • memory/2504-305-0x00000000004C0000-0x00000000004E2000-memory.dmp

    Filesize

    136KB

  • memory/2504-150-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2504-295-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2504-272-0x00000000004C0000-0x00000000004E2000-memory.dmp

    Filesize

    136KB

  • memory/2504-296-0x0000000000220000-0x000000000027B000-memory.dmp

    Filesize

    364KB

  • memory/2504-271-0x00000000004C0000-0x00000000004E2000-memory.dmp

    Filesize

    136KB

  • memory/2740-184-0x0000000002D40000-0x0000000002D5E000-memory.dmp

    Filesize

    120KB

  • memory/2740-304-0x0000000000400000-0x0000000002C3B000-memory.dmp

    Filesize

    40.2MB

  • memory/2740-173-0x0000000000390000-0x00000000003B0000-memory.dmp

    Filesize

    128KB

  • memory/2824-302-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2824-275-0x0000000000240000-0x0000000000262000-memory.dmp

    Filesize

    136KB

  • memory/2824-274-0x0000000000240000-0x0000000000262000-memory.dmp

    Filesize

    136KB

  • memory/2824-273-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2948-281-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-65-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-265-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2948-70-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-79-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-78-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-77-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-76-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-75-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-276-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-69-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-280-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2948-279-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-278-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2948-62-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-64-0x0000000064941000-0x000000006494F000-memory.dmp

    Filesize

    56KB

  • memory/2948-63-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-80-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-66-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-68-0x0000000000520000-0x000000000063E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-67-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2948-54-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-51-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2948-313-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-74-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2948-73-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/2948-45-0x0000000000400000-0x000000000051E000-memory.dmp

    Filesize

    1.1MB

  • memory/2948-72-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-71-0x000000006FE40000-0x000000006FFC6000-memory.dmp

    Filesize

    1.5MB

  • memory/2948-310-0x000000006EB40000-0x000000006EB63000-memory.dmp

    Filesize

    140KB

  • memory/2948-309-0x000000006B440000-0x000000006B4CF000-memory.dmp

    Filesize

    572KB

  • memory/2948-307-0x0000000064940000-0x0000000064959000-memory.dmp

    Filesize

    100KB

  • memory/2948-312-0x000000006B280000-0x000000006B2A6000-memory.dmp

    Filesize

    152KB

  • memory/3028-165-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/3028-128-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB