Analysis

  • max time kernel
    20s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-11-2020 16:58

General

Malware Config

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

gozi_rm3

Attributes
  • exe_type

    loader

Extracted

Family

gozi_rm3

Botnet

86920224

C2

https://sibelikinciel.xyz

Attributes
  • build

    300869

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Extracted

Family

danabot

C2

92.204.160.54

2.56.213.179

45.153.186.47

93.115.21.29

185.45.193.50

193.34.166.247

rsa_pubkey.plain

Extracted

Family

formbook

Version

4.1

C2

http://www.norjax.com/app/

Decoy

niresandcard.com

bonusscommesseonline.com

mezhyhirya.com

paklfz.com

bespokewomensuits.com

smarteralarm.info

munespansiyon.com

pmtradehouse.com

hotmobile-uk.com

ntdao.com

zohariaz.com

www145123.com

oceanstateofstyle.com

palermofelicissima.info

yourkinas.com

pthwheel.net

vfmagent.com

xn--3v0bw66b.com

comsystematrisk.win

on9.party

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • AgentTesla Payload 15 IoCs
  • CryptOne packer 2 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Formbook Payload 8 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE 12 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\31.exe
      "C:\Users\Admin\AppData\Local\Temp\31.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8B3F.tmp\8B40.tmp\8B41.bat C:\Users\Admin\AppData\Local\Temp\31.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"
          4⤵
            PID:1444
          • C:\Users\Admin\AppData\Roaming\2.exe
            C:\Users\Admin\AppData\Roaming\2.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Users\Admin\AppData\Roaming\2.exe
              C:\Users\Admin\AppData\Roaming\2.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:568
          • C:\Users\Admin\AppData\Roaming\3.exe
            C:\Users\Admin\AppData\Roaming\3.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of SetWindowsHookEx
            PID:1664
          • C:\Users\Admin\AppData\Roaming\4.exe
            C:\Users\Admin\AppData\Roaming\4.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:668
          • C:\Users\Admin\AppData\Roaming\5.exe
            C:\Users\Admin\AppData\Roaming\5.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1460
          • C:\Users\Admin\AppData\Roaming\6.exe
            C:\Users\Admin\AppData\Roaming\6.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:908
          • C:\Users\Admin\AppData\Roaming\7.exe
            C:\Users\Admin\AppData\Roaming\7.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of SetWindowsHookEx
            PID:428
          • C:\Users\Admin\AppData\Roaming\8.exe
            C:\Users\Admin\AppData\Roaming\8.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:812
          • C:\Users\Admin\AppData\Roaming\9.exe
            C:\Users\Admin\AppData\Roaming\9.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1164
          • C:\Users\Admin\AppData\Roaming\10.exe
            C:\Users\Admin\AppData\Roaming\10.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:476
          • C:\Users\Admin\AppData\Roaming\11.exe
            C:\Users\Admin\AppData\Roaming\11.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1600
          • C:\Users\Admin\AppData\Roaming\12.exe
            C:\Users\Admin\AppData\Roaming\12.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1720
      • C:\Windows\SysWOW64\help.exe
        "C:\Windows\SysWOW64\help.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:340
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Roaming\2.exe"
          3⤵
            PID:1668

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Zdnilg\autochkujotnv.exe
      • C:\Program Files (x86)\Zdnilg\autochkujotnv.exe
      • C:\Users\Admin\AppData\Local\Temp\8B3F.tmp\8B40.tmp\8B41.bat
      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
      • C:\Users\Admin\AppData\Local\Temp\tmp4089.tmp
      • C:\Users\Admin\AppData\Local\Temp\tmpA093.tmp
      • C:\Users\Admin\AppData\Roaming\1.jar
      • C:\Users\Admin\AppData\Roaming\10.exe
      • C:\Users\Admin\AppData\Roaming\10.exe
      • C:\Users\Admin\AppData\Roaming\11.exe
      • C:\Users\Admin\AppData\Roaming\11.exe
      • C:\Users\Admin\AppData\Roaming\11.exe
      • C:\Users\Admin\AppData\Roaming\12.exe
      • C:\Users\Admin\AppData\Roaming\12.exe
      • C:\Users\Admin\AppData\Roaming\2.exe
      • C:\Users\Admin\AppData\Roaming\2.exe
      • C:\Users\Admin\AppData\Roaming\2.exe
      • C:\Users\Admin\AppData\Roaming\3.exe
      • C:\Users\Admin\AppData\Roaming\3.exe
      • C:\Users\Admin\AppData\Roaming\3.exe
      • C:\Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • C:\Users\Admin\AppData\Roaming\4.exe
      • C:\Users\Admin\AppData\Roaming\4.exe
      • C:\Users\Admin\AppData\Roaming\5.exe
      • C:\Users\Admin\AppData\Roaming\5.exe
      • C:\Users\Admin\AppData\Roaming\6.exe
        MD5

        cf04c482d91c7174616fb8e83288065a

        SHA1

        6444eb10ec9092826d712c1efad73e74c2adae14

        SHA256

        7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

        SHA512

        3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

      • C:\Users\Admin\AppData\Roaming\6.exe
        MD5

        cf04c482d91c7174616fb8e83288065a

        SHA1

        6444eb10ec9092826d712c1efad73e74c2adae14

        SHA256

        7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

        SHA512

        3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

      • C:\Users\Admin\AppData\Roaming\7.exe
      • C:\Users\Admin\AppData\Roaming\7.exe
      • C:\Users\Admin\AppData\Roaming\8.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • C:\Users\Admin\AppData\Roaming\8.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • C:\Users\Admin\AppData\Roaming\9.exe
      • C:\Users\Admin\AppData\Roaming\9.exe
      • C:\Users\Admin\AppData\Roaming\9.exe
      • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logim.jpeg
      • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logrf.ini
      • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logri.ini
      • C:\Users\Admin\AppData\Roaming\J-96T9R9\J-9logrv.ini
      • C:\Users\Admin\AppData\Roaming\feeed.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • C:\Users\Admin\AppData\Roaming\feeed.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • \Users\Admin\AppData\Local\Temp\InstallUtil.exe
      • \Users\Admin\AppData\Roaming\10.exe
      • \Users\Admin\AppData\Roaming\10.exe
      • \Users\Admin\AppData\Roaming\11.exe
      • \Users\Admin\AppData\Roaming\11.exe
      • \Users\Admin\AppData\Roaming\12.exe
      • \Users\Admin\AppData\Roaming\12.exe
      • \Users\Admin\AppData\Roaming\3.exe
      • \Users\Admin\AppData\Roaming\3.exe
      • \Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • \Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • \Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • \Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • \Users\Admin\AppData\Roaming\4.dll
        MD5

        647d2e78c8b882a4d308fc6e89812b0b

        SHA1

        b5cdc337cb41667409269a56c3092e1bd1917974

        SHA256

        da584a6b77aa53c232193a4757975aac5d5121bdc5266096e746432c453502c3

        SHA512

        a01641aba2c2a02932c18e25dafb8058a1d9e11cd4f25d17a06731e39c7738614b833b856e7fc26ad0100212772d57dbccfd5a6297b6cb21fa4dec48f1aff1bb

      • \Users\Admin\AppData\Roaming\5.exe
      • \Users\Admin\AppData\Roaming\5.exe
      • \Users\Admin\AppData\Roaming\7.exe
      • \Users\Admin\AppData\Roaming\7.exe
      • \Users\Admin\AppData\Roaming\8.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • \Users\Admin\AppData\Roaming\8.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • \Users\Admin\AppData\Roaming\9.exe
      • \Users\Admin\AppData\Roaming\9.exe
      • \Users\Admin\AppData\Roaming\feeed.exe
        MD5

        dea5598aaf3e9dcc3073ba73d972ab17

        SHA1

        51da8356e81c5acff3c876dffbf52195fe87d97f

        SHA256

        8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

        SHA512

        a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

      • memory/340-66-0x0000000001840000-0x00000000019CD000-memory.dmp
        Filesize

        1.6MB

      • memory/340-57-0x0000000000000000-mapping.dmp
      • memory/340-116-0x0000000002F60000-0x0000000003035000-memory.dmp
        Filesize

        852KB

      • memory/340-152-0x00000000031B0000-0x000000000331E000-memory.dmp
        Filesize

        1.4MB

      • memory/340-127-0x0000000002F60000-0x0000000003035000-memory.dmp
        Filesize

        852KB

      • memory/340-58-0x0000000000950000-0x0000000000956000-memory.dmp
        Filesize

        24KB

      • memory/428-29-0x0000000000000000-mapping.dmp
      • memory/428-30-0x0000000000000000-mapping.dmp
      • memory/476-42-0x0000000000000000-mapping.dmp
      • memory/476-43-0x0000000000000000-mapping.dmp
      • memory/476-63-0x0000000002F0A000-0x0000000002F0B000-memory.dmp
        Filesize

        4KB

      • memory/476-64-0x00000000031A0000-0x00000000031B1000-memory.dmp
        Filesize

        68KB

      • memory/568-15-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/568-16-0x000000000041E2D0-mapping.dmp
      • memory/652-80-0x0000000000000000-mapping.dmp
      • memory/668-13-0x0000000000000000-mapping.dmp
      • memory/668-14-0x0000000000000000-mapping.dmp
      • memory/668-60-0x0000000003220000-0x0000000003497000-memory.dmp
        Filesize

        2.5MB

      • memory/668-65-0x00000000034A0000-0x00000000034B1000-memory.dmp
        Filesize

        68KB

      • memory/812-113-0x0000000000930000-0x0000000000932000-memory.dmp
        Filesize

        8KB

      • memory/812-82-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
        Filesize

        4KB

      • memory/812-34-0x0000000000000000-mapping.dmp
      • memory/812-61-0x0000000072E90000-0x000000007357E000-memory.dmp
        Filesize

        6.9MB

      • memory/812-33-0x0000000000000000-mapping.dmp
      • memory/812-109-0x0000000000750000-0x000000000075F000-memory.dmp
        Filesize

        60KB

      • memory/812-114-0x0000000000A40000-0x0000000000A42000-memory.dmp
        Filesize

        8KB

      • memory/812-111-0x0000000000760000-0x0000000000762000-memory.dmp
        Filesize

        8KB

      • memory/908-56-0x0000000000280000-0x0000000000290000-memory.dmp
        Filesize

        64KB

      • memory/908-25-0x0000000000000000-mapping.dmp
      • memory/908-24-0x0000000000000000-mapping.dmp
      • memory/1020-4-0x0000000000000000-mapping.dmp
      • memory/1020-5-0x0000000000000000-mapping.dmp
      • memory/1164-110-0x0000000004CF0000-0x0000000004D43000-memory.dmp
        Filesize

        332KB

      • memory/1164-108-0x0000000000670000-0x0000000000672000-memory.dmp
        Filesize

        8KB

      • memory/1164-39-0x0000000000000000-mapping.dmp
      • memory/1164-38-0x0000000000000000-mapping.dmp
      • memory/1164-81-0x0000000000F70000-0x0000000000F71000-memory.dmp
        Filesize

        4KB

      • memory/1164-62-0x0000000072E90000-0x000000007357E000-memory.dmp
        Filesize

        6.9MB

      • memory/1444-2-0x0000000000000000-mapping.dmp
      • memory/1460-21-0x0000000000000000-mapping.dmp
      • memory/1460-22-0x0000000000000000-mapping.dmp
      • memory/1600-46-0x0000000000000000-mapping.dmp
      • memory/1600-47-0x0000000000000000-mapping.dmp
      • memory/1652-71-0x0000000000000000-mapping.dmp
      • memory/1664-9-0x0000000000000000-mapping.dmp
      • memory/1664-10-0x0000000000000000-mapping.dmp
      • memory/1668-59-0x0000000000000000-mapping.dmp
      • memory/1720-50-0x0000000000000000-mapping.dmp
      • memory/1720-51-0x0000000000000000-mapping.dmp
      • memory/1812-176-0x0000000000000000-mapping.dmp
      • memory/1948-0-0x0000000000000000-mapping.dmp
      • memory/2056-106-0x00000000004015B0-mapping.dmp
      • memory/2136-185-0x0000000000000000-mapping.dmp
      • memory/2188-169-0x0000000072E90000-0x000000007357E000-memory.dmp
        Filesize

        6.9MB

      • memory/2188-168-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2188-159-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2188-165-0x000000000044CF8E-mapping.dmp
      • memory/2188-167-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2256-112-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
        Filesize

        2.5MB

      • memory/2308-180-0x0000000000000000-mapping.dmp
      • memory/2332-115-0x0000000000000000-mapping.dmp
      • memory/2368-118-0x0000000000000000-mapping.dmp
      • memory/2376-117-0x0000000000000000-mapping.dmp
      • memory/2428-128-0x0000000000000048-mapping.dmp
      • memory/2428-175-0x0000000006FF0000-0x0000000007013000-memory.dmp
        Filesize

        140KB

      • memory/2428-120-0x0000000000000000-mapping.dmp
      • memory/2428-158-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
        Filesize

        4KB

      • memory/2428-174-0x0000000002EE0000-0x0000000002EE1000-memory.dmp
        Filesize

        4KB

      • memory/2452-122-0x000000000041E270-mapping.dmp
      • memory/2452-121-0x0000000000400000-0x000000000042D000-memory.dmp
        Filesize

        180KB

      • memory/2508-157-0x0000000076B50000-0x0000000076C6D000-memory.dmp
        Filesize

        1.1MB

      • memory/2508-156-0x0000000076990000-0x000000007699C000-memory.dmp
        Filesize

        48KB

      • memory/2508-125-0x0000000000300000-0x0000000000318000-memory.dmp
        Filesize

        96KB

      • memory/2508-124-0x0000000000000000-mapping.dmp
      • memory/2508-129-0x0000000001E20000-0x0000000001ECD000-memory.dmp
        Filesize

        692KB

      • memory/2564-126-0x0000000000000000-mapping.dmp
      • memory/2668-172-0x0000000000000000-mapping.dmp
      • memory/2668-173-0x000000013FA20000-0x000000013FAB3000-memory.dmp
        Filesize

        588KB

      • memory/2740-153-0x0000000000000048-mapping.dmp
      • memory/2740-131-0x0000000000000000-mapping.dmp
      • memory/2812-132-0x0000000000000000-mapping.dmp
      • memory/2896-139-0x0000000072E90000-0x000000007357E000-memory.dmp
        Filesize

        6.9MB

      • memory/2896-138-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2896-137-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2896-135-0x000000000044CCFE-mapping.dmp
      • memory/2896-134-0x0000000000400000-0x0000000000452000-memory.dmp
        Filesize

        328KB

      • memory/2948-146-0x0000000000020000-0x0000000000021000-memory.dmp
        Filesize

        4KB

      • memory/2948-144-0x0000000072E90000-0x000000007357E000-memory.dmp
        Filesize

        6.9MB

      • memory/2948-141-0x0000000000000000-mapping.dmp