Analysis

  • max time kernel
    299s
  • max time network
    297s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 05:14

General

  • Target

    77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe

  • Size

    9.1MB

  • MD5

    8ea30acc005292f38b5b3886f244b2a9

  • SHA1

    feaaeef18b6d2a5a2b974b5a32d970e8d9356321

  • SHA256

    77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f

  • SHA512

    77910c47ac6c57982db81da036a0c78ca43792edb7f91d2e07903ab4a833c528f9c13100745d801c06b5649672e00bfda5475bc25c17fb2d7eeac0de9981697f

  • SSDEEP

    196608:UxB14xuTMS+BPC2cZ07LqyUl7m6/ZTYtSx0USapM7KxBx:YL4QTz+YZ0/qXjpYteX

Score
10/10

Malware Config

Extracted

Family

tofsee

C2

vanaheim.cn

jotunheim.name

Signatures

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Tofsee family
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 13 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe
    "C:\Users\Admin\AppData\Local\Temp\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe
      C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe -package:"C:\Users\Admin\AppData\Local\Temp\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7D146D20-9C35-40E6-9EAF-554AA786CF46}
        3⤵
        • Executes dropped EXE
        PID:3816
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{00B42D26-DB1E-4F43-B800-68B90C8B29E6}
        3⤵
        • Executes dropped EXE
        PID:3988
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{1225480E-C0AD-4304-92A3-C4E62C7B2D4F}
        3⤵
        • Executes dropped EXE
        PID:2720
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{EB20DF47-BE30-4C29-83B7-8D8522973E3D}
        3⤵
        • Executes dropped EXE
        PID:4176
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{75822692-0842-42EE-BC9F-8B47918E6808}
        3⤵
        • Executes dropped EXE
        PID:2968
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{D1FD5E39-B14C-4356-A8E0-F3A708B32142}
        3⤵
        • Executes dropped EXE
        PID:956
      • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\msn.exe
        C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\msn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Users\Admin\AppData\Roaming\clichannel_test\msn.exe
          C:\Users\Admin\AppData\Roaming\clichannel_test\msn.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:3872
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\SysWOW64\cmd.exe
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:116
            • C:\Users\Admin\AppData\Local\Temp\readerservice_v1.exe
              C:\Users\Admin\AppData\Local\Temp\readerservice_v1.exe
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3537bd3b

    Filesize

    1.7MB

    MD5

    e294348f41f727a4fca6644437f23c5a

    SHA1

    3dcdcc89d1ed685ce3e26a0d28c9c82a77b095bf

    SHA256

    2d5897eb8e842f1f7e27cc15e37940392c411c81ebd92f1b1dd789a3e676105f

    SHA512

    e373b43c5c520ccbeac15a85603568fc80556b6f4747fb13af4a68586cec54c254fb03f5f7ee1ceccddeee90408ee0e354bdaa07beeb951540239a5df56c0937

  • C:\Users\Admin\AppData\Local\Temp\readerservice_v1.exe

    Filesize

    994KB

    MD5

    de0ea31558536ca7e3164c3cd4578bf5

    SHA1

    5cc890c3ade653bb1ed1e53dabb0410602ee52df

    SHA256

    6e599490e164505af796569dce30e18218b179b2b791fe69764892b3ed3e7478

    SHA512

    c47299cd5f3b4961f423c2ca1fef5a33eb4b0f63dc232af70ef9da39f6f82270406061dd543461de7e47abd1244e26d6190de6035120211b27d4c23f97a25aba

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\ISBEW64.exe

    Filesize

    178KB

    MD5

    40f3a092744e46f3531a40b917cca81e

    SHA1

    c73f62a44cb3a75933cecf1be73a48d0d623039b

    SHA256

    561f14cdece85b38617403e1c525ff0b1b752303797894607a4615d0bd66f97f

    SHA512

    1589b27db29051c772e5ba56953d9f798efbf74d75e0524fa8569df092d28960972779811a7916198d0707d35b1093d3e0dd7669a8179c412cfa7df7120733b2

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\ContactsUX.dll

    Filesize

    331KB

    MD5

    54ee6a204238313dc6aca21c7e036c17

    SHA1

    531fd1c18e2e4984c72334eb56af78a1048da6c7

    SHA256

    0abf68b8409046a1555d48ac506fd26fda4b29d8d61e07bc412a4e21de2782fd

    SHA512

    19a2e371712aab54b75059d39a9aea6e7de2eb69b3ffc0332e60df617ebb9de61571b2ca722cddb75c9cbc79f8200d03f73539f21f69366eae3c7641731c7820

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\DIFxData.ini

    Filesize

    84B

    MD5

    1eb6253dee328c2063ca12cf657be560

    SHA1

    46e01bcbb287873cf59c57b616189505d2bb1607

    SHA256

    6bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1

    SHA512

    7c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\FontData.ini

    Filesize

    37B

    MD5

    8ce28395a49eb4ada962f828eca2f130

    SHA1

    270730e2969b8b03db2a08ba93dfe60cbfb36c5f

    SHA256

    a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932

    SHA512

    bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\MSNCore.dll

    Filesize

    982KB

    MD5

    cb2d9ad26387f27218585b0d1f510caa

    SHA1

    83a0ca6c9d062e8e9d0b87290345e1f553fc6936

    SHA256

    c5a628cf693f348330556bd915813b502597308edecdcc76e83874bae1b564bb

    SHA512

    8c63642013827066884af20f3ec5d699ef5f7a8d6bf47ae5b6c49de66e3448279ecf39a41f0a9ed6f8fab292a74a8575897c88b2d567c6c1a897624837878b77

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\_isres_0x0409.dll

    Filesize

    1.8MB

    MD5

    7de024bc275f9cdeaf66a865e6fd8e58

    SHA1

    5086e4a26f9b80699ea8d9f2a33cead28a1819c0

    SHA256

    bd32468ee7e8885323f22eabbff9763a0f6ffef3cc151e0bd0481df5888f4152

    SHA512

    191c57e22ea13d13806dd390c4039029d40c7532918618d185d8a627aabc3969c7af2e532e3c933bde8f652b4723d951bf712e9ba0cc0d172dde693012f5ef1a

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\_isuser_0x0409.dll

    Filesize

    12KB

    MD5

    1d4e1f21f1385cc07506110fee280914

    SHA1

    75cce0ca7134a0453a15cd692e91078c01d364f7

    SHA256

    1aa4410434b32b851a1cbc74db7bf3ffcb39164348bec5f0c21cf9ff9d6bcc9b

    SHA512

    318b97e0a3720708dc4a9455de5ce78c2c8122e66a88c02caa5f410bcf6e3cb4a223f0c6fbe111976022316af17427608c8db32c50090934a5bd95ab9b3a7d43

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\galatea.json

    Filesize

    60KB

    MD5

    fabe3640bcaefb3bf6cd3700a2da8f29

    SHA1

    e940598ce9b2ae40c15378a4e28f31a29a7073cd

    SHA256

    d0bea4e59196a8d6d60dbeff827344daaf620576bd95c338061c90f6f5dceae3

    SHA512

    bdcc21164ba532cabb82248cdaedf335d3eb887dbebb3b8581615a866b36995c94eb5a51b8522866161899c81623a06a4444333081f67da1be71e3e2791a6300

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\isrt.dll

    Filesize

    426KB

    MD5

    8af02bf8e358e11caec4f2e7884b43cc

    SHA1

    16badc6c610eeb08de121ab268093dd36b56bf27

    SHA256

    58a724d23c63387a2dda27ccfdbc8ca87fd4db671bea8bb636247667f6a5a11e

    SHA512

    d0228a8cc93ff6647c2f4ba645fa224dc9d114e2adb5b5d01670b6dafc2258b5b1be11629868748e77b346e291974325e8e8e1192042d7c04a35fc727ad4e3fd

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\msidcrl40.dll

    Filesize

    791KB

    MD5

    ef66829b99bbfc465b05dc7411b0dcfa

    SHA1

    c6f6275f92053b4b9fa8f2738ed3e84f45261503

    SHA256

    257e6489f5b733f2822f0689295a9f47873be3cec5f4a135cd847a2f2c82a575

    SHA512

    6839b7372e37e67c270a4225f91df21f856158a292849da2101c2978ce37cd08b75923ab30ca39d7360ce896fc6a2a2d646dd88eb2993cef612c43a475fdb2ea

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\msn.exe

    Filesize

    5.5MB

    MD5

    537915708fe4e81e18e99d5104b353ed

    SHA1

    128ddb7096e5b748c72dc13f55b593d8d20aa3fb

    SHA256

    6dc7275f2143d1de0ca66c487b0f2ebff3d4c6a79684f03b9619bf23143ecf74

    SHA512

    9ceaaf7aa5889be9f5606646403133782d004b9d78ef83d7007dfce67c0f4f688d7931aebc74f1fc30aac2f1dd6281bdadfb52bc3ea46aca33b334adb4067ae2

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\msvcr80.dll

    Filesize

    612KB

    MD5

    43143abb001d4211fab627c136124a44

    SHA1

    edb99760ae04bfe68aaacf34eb0287a3c10ec885

    SHA256

    cb8928ff2faf2921b1eddc267dce1bb64e6fee4d15b68cd32588e0f3be116b03

    SHA512

    ced96ca5d1e2573dbf21875cf98a8fcb86b5bcdca4c041680a9cb87374378e04835f02ab569d5243608c68feb2e9b30ffe39feb598f5081261a57d1ce97556a6

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\setup.inx

    Filesize

    243KB

    MD5

    958f5a1eafc66b18a8fce8fa553b02c5

    SHA1

    3d14f94f82cdf7fb56274479fe189f547d31236b

    SHA256

    19ec267d7a698bd3acb8a4ffeb7c86853b114a723cb8b29ea23c0310340bdd04

    SHA512

    6ae6112f6c193a607497b0c37eceefb2f98ba3eed06a435a98b3bd2299a3145b4ab61814ed50780bd5c1a892a873e9fcaf4745752f323adea7637c2a12904cb9

  • C:\Users\Admin\AppData\Local\Temp\{1A6948BA-3A74-4381-834F-369116E77747}\{B6925B10-6F8E-49F1-9871-A2920416DE03}\trillium.xls

    Filesize

    1.1MB

    MD5

    8232a2129aa86786742fd1b0c111c2dd

    SHA1

    0b9aa5be7d71b2b4ceade2fb9b444f69363f139a

    SHA256

    5d307d330e9a00e5290092a4de5f78243c2abaab60769c71602b7b20324cc742

    SHA512

    a1d829de322ee1c0e902a6cb7e5b980dcd17ad1c743aa43328c81903a07fd1761da565b0cbb14d80bbb208f8fbd01e47aebb2dfafd995bbed3181b13305af089

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\77d5c3a637603fef747234b246f206cb3ac8200bc018a4d78d437fe80b0d071f.exe

    Filesize

    932KB

    MD5

    727ba97f9b8e0b1a375ddc41066394ef

    SHA1

    e52352f361a24f44ab54992bbcb926ab2c398640

    SHA256

    8108bb216acdb4032404cd873bdb4d158ae51e5b6c3e85769fb56f217b800a63

    SHA512

    b84bc63f09116fe2581c45ee656abc9e08afc9816edfa3d3d6a2ab1daa0712e10f60d9554671c71d63e42115017396777f25813373894f349f3a1580a4f3c770

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\0x0409.ini

    Filesize

    21KB

    MD5

    a108f0030a2cda00405281014f897241

    SHA1

    d112325fa45664272b08ef5e8ff8c85382ebb991

    SHA256

    8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

    SHA512

    d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\ISSetup.dll

    Filesize

    1.6MB

    MD5

    a89bf69cd0836e08a79d5c216ae776ed

    SHA1

    7d7ff6143a729726f200b2201c4a0e7358d2274b

    SHA256

    a01709a3c9d5eaacc6ca6ca47ef2e4e4e00d883289621c5bfff96620bfd93d8c

    SHA512

    206d05888d2cbb20dcf433abceab7c47597fe6cb15167a71c5486dd3098f59c44ac14e5459921ec4d546d2e55fda34c5119c128691edcfbf75724bb4e1cc7366

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\data1.cab

    Filesize

    5.7MB

    MD5

    d4e3955f36d2b45cd11b1063353a02cb

    SHA1

    8807d3431d994fab11ce7c4b72a67da409300551

    SHA256

    b0ca8b88216a544cf3e880a0a59968c4a331a804f6f86465417a73297f86c64e

    SHA512

    b8164df0b5b6c43a324445b5bb6ad0e275f68d8dff03b2a7cdad4fe9b1b501c5ad596aa0cdefc02a04e0386d2cd058a7e3dfb3a33c6dc2845107951ddc67274e

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\data1.hdr

    Filesize

    13KB

    MD5

    4eefa033b1f09b89aca52d8ff3669f43

    SHA1

    8948bbc034c1a7e265b48e7e3f5d5edfbacce488

    SHA256

    5b2cf05da7cd8a047f6e079763e16734f4f205bf716a5ac5f6b48e56f78e251e

    SHA512

    6c2f1c3c62905b567c05cc8766cbea0c29784c17e8152fe4bd5670b6df8229fc884fb0027ceae00f8ea49a758b1bb15640d413b83d428199bd9c972bb2f9b5a1

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\Disk1\layout.bin

    Filesize

    522B

    MD5

    8103843e6af7a898761f4445ed2758c9

    SHA1

    296185854b6da7cce8da7c21b428505d7dd1ad33

    SHA256

    b48c38116f94462389320efdd2677649d2d21a514f70024ec48e4e90bba492af

    SHA512

    9e0d8fb754f9b63427fa7b62f9915aa2e44a81a65c42370d2e2fd038563709952b009d96f2c88e5c355f1508028781f6a8d06a15c51edf242203a685c0032eb0

  • C:\Users\Admin\AppData\Local\Temp\{3F955866-1776-4E8F-AEB1-AFB4BD032658}\setup.ini

    Filesize

    2KB

    MD5

    3223112e3e534cf36b29d0939b6ab823

    SHA1

    d8b823f7ac9863a512249c877dae7748d71951ed

    SHA256

    3bf858273e606c30612db9ae05f65632b9c5814d0ffdcf6a3ba982301cfdad0c

    SHA512

    8cfb400f1d51952a7911c8ee79a66766fba27c74c98ec0732d2ec22b88c294bd81b02320a0eacfb339d8c409d35a501cc8e6ff3b7343bda84e0a22f32865b335

  • memory/116-188-0x00007FFB84990000-0x00007FFB84B85000-memory.dmp

    Filesize

    2.0MB

  • memory/116-189-0x0000000073C10000-0x0000000073D8B000-memory.dmp

    Filesize

    1.5MB

  • memory/116-196-0x0000000073C10000-0x0000000073D8B000-memory.dmp

    Filesize

    1.5MB

  • memory/212-211-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-220-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-229-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-212-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-227-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-213-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-226-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-225-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-224-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-202-0x00007FFB84990000-0x00007FFB84B85000-memory.dmp

    Filesize

    2.0MB

  • memory/212-203-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-204-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-205-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-206-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-208-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-210-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-228-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-223-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-222-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-214-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-215-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-216-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-217-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-218-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-219-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/212-221-0x0000000000960000-0x0000000000976000-memory.dmp

    Filesize

    88KB

  • memory/2536-147-0x0000000073A80000-0x0000000073BFB000-memory.dmp

    Filesize

    1.5MB

  • memory/2536-148-0x00007FFB84990000-0x00007FFB84B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3872-183-0x00007FFB84990000-0x00007FFB84B85000-memory.dmp

    Filesize

    2.0MB

  • memory/3872-185-0x0000000073C10000-0x0000000073D8B000-memory.dmp

    Filesize

    1.5MB

  • memory/3872-182-0x0000000073C10000-0x0000000073D8B000-memory.dmp

    Filesize

    1.5MB

  • memory/4276-100-0x0000000010000000-0x0000000010114000-memory.dmp

    Filesize

    1.1MB

  • memory/4276-101-0x0000000004040000-0x0000000004042000-memory.dmp

    Filesize

    8KB

  • memory/4276-106-0x00000000042C0000-0x0000000004487000-memory.dmp

    Filesize

    1.8MB

  • memory/4276-184-0x0000000004040000-0x0000000004042000-memory.dmp

    Filesize

    8KB