Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-03-2021 12:51

General

  • Target

    1efa56669738d9ef717aae854188495d.exe

  • Size

    175KB

  • MD5

    1efa56669738d9ef717aae854188495d

  • SHA1

    3ff0cbdc4ec92da762c909fa42c23fcd6ff5519c

  • SHA256

    addfb046313926c0cfb9e4293f76c408d8e6798e129f1a1043835088c54aa69b

  • SHA512

    291ec99476a3d35d6f4d862b8f7e1380cb6cc49f4c5725befe53888d38e77b346e849aace9685e0d233b53ac2b4f8e5f4943976dc4295f2385b6d080c9eb984a

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xsss99.icu/upload/

http://bingooodsg.icu/upload/

http://junntd.xyz/upload/

http://ginessa11.xyz/upload/

http://overplayninsx.xyz/upload/

http://bananinze.com/upload/

http://daunimlas.com/upload/

rc4.i32
rc4.i32

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Creates new service(s) 1 TTPs
  • Executes dropped EXE 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1efa56669738d9ef717aae854188495d.exe
    "C:\Users\Admin\AppData\Local\Temp\1efa56669738d9ef717aae854188495d.exe"
    1⤵
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1904
  • C:\Users\Admin\AppData\Local\Temp\2AD8.exe
    C:\Users\Admin\AppData\Local\Temp\2AD8.exe
    1⤵
    • Executes dropped EXE
    PID:568
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\93c44d5b-9be8-4931-952f-18442c697260" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:1080
    • C:\Users\Admin\AppData\Local\Temp\2AD8.exe
      "C:\Users\Admin\AppData\Local\Temp\2AD8.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
        PID:1932
        • C:\Users\Admin\AppData\Local\7e418fcc-7558-4717-9030-8884e27487e5\updatewin1.exe
          "C:\Users\Admin\AppData\Local\7e418fcc-7558-4717-9030-8884e27487e5\updatewin1.exe"
          3⤵
            PID:1432
      • C:\Users\Admin\AppData\Local\Temp\3592.exe
        C:\Users\Admin\AppData\Local\Temp\3592.exe
        1⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:612
      • C:\Users\Admin\AppData\Local\Temp\40AA.exe
        C:\Users\Admin\AppData\Local\Temp\40AA.exe
        1⤵
        • Executes dropped EXE
        PID:1676
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\mlatmgbj\
          2⤵
            PID:1528
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\xxyjefdl.exe" C:\Windows\SysWOW64\mlatmgbj\
            2⤵
              PID:1812
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" create mlatmgbj binPath= "C:\Windows\SysWOW64\mlatmgbj\xxyjefdl.exe /d\"C:\Users\Admin\AppData\Local\Temp\40AA.exe\"" type= own start= auto DisplayName= "wifi support"
              2⤵
                PID:1444
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" description mlatmgbj "wifi internet conection"
                2⤵
                  PID:1492
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\System32\sc.exe" start mlatmgbj
                  2⤵
                    PID:1596
                • C:\Users\Admin\AppData\Local\Temp\434A.exe
                  C:\Users\Admin\AppData\Local\Temp\434A.exe
                  1⤵
                    PID:1908
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {FF037A0D-AA64-47B1-B073-F752BF67D235} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]
                    1⤵
                      PID:304
                      • C:\Users\Admin\AppData\Roaming\jvgthfs
                        C:\Users\Admin\AppData\Roaming\jvgthfs
                        2⤵
                          PID:1252

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      New Service

                      1
                      T1050

                      Privilege Escalation

                      New Service

                      1
                      T1050

                      Defense Evasion

                      File Permissions Modification

                      1
                      T1222

                      Install Root Certificate

                      1
                      T1130

                      Modify Registry

                      1
                      T1112

                      Discovery

                      Query Registry

                      1
                      T1012

                      Peripheral Device Discovery

                      1
                      T1120

                      System Information Discovery

                      1
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                        MD5

                        0936d19232cfcdafbced53ad410a7302

                        SHA1

                        7ecf78bc4b20f07d1b4e37d3b6d23276d559b18a

                        SHA256

                        9046bb77872ac1e6d8b9a6af797f1fdd5cac5b833de440cbd285f396938c54fa

                        SHA512

                        642215bbc005909a0a4ff3e1cfd9fb3017838e7a6bdf03c5716e980b59d46a793fd24d63ce8e27867d58daa644112e53e63fac7f671ee6f3a9b28bbde805805c

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                        MD5

                        61a03d15cf62612f50b74867090dbe79

                        SHA1

                        15228f34067b4b107e917bebaf17cc7c3c1280a8

                        SHA256

                        f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

                        SHA512

                        5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                        MD5

                        9c381e1c05936ad539bc8d0fe34981c3

                        SHA1

                        cff61eb4121208e3fc90e0ae7cc605fc44e65ab9

                        SHA256

                        bde1d8daaa1cb82ecab9742c4e06ae955070fb10be6689f5f177efe3496d32e3

                        SHA512

                        bdc49a8fd3318658de368d640198e91a07dac3365fd1a6eff2265b1d909fb5a32d398b4fa94a6d8dd04876980b138217f15a579d1b47df0820f58ee4db295d65

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                        MD5

                        cbbf9eb8f549e2a459dc47961c1c7c76

                        SHA1

                        ba58be6020b5faf18bc52d93c1ccb1cb7b9d286e

                        SHA256

                        e9374729309df6cd7eea5bde4de239715a03a5b67158205f0983ec1006b56e8d

                        SHA512

                        17675ffa403c6c83df957f75bbf1679ce9f2813731a1e8d42202d1d7fff5c56d1a23d783b4d9bb282b2074f988fdc3fc8364dc3a9243ef6fe1625befa13ca71d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        2e923bb8fe3b76d0f5b2077509f9fb48

                        SHA1

                        0715ae964b34788468ddd3282898b24d6ec38aea

                        SHA256

                        a1fb91619140928f9731c3a32d9c4fe4b49303781c16175d578e3c646c549df7

                        SHA512

                        6d22c8e2bb495870d3f913d10758cf4dd123152d456cf42433d8930c188abcb23c20b66b0f2f95373c9bbe316de1707741319d91468218d4cfa2acd2eb937ba4

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                        MD5

                        9fb3e7ca97955b8b840c49ee1a5a87a5

                        SHA1

                        f303d9354773d147d49840b7fcd83b9c3c66875e

                        SHA256

                        8409691d21b73027a84d1406ec3d82b21af28f24c8e0964574e43a7c29bea0b4

                        SHA512

                        c66a731527bfa5daac44d2ca7e68f7926aa03b6c862e2465b767e13178d94f1df1649511483aa516eb7fbb3417855179d934109745f7e276e7c25a72639da2fc

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                        MD5

                        b247a33cfca060e9a10fd76cf0414a12

                        SHA1

                        30bf09ac9fb3fd5565f908efc8fbc7600f488706

                        SHA256

                        3fb6eccab26e97ae79a638ae41d2616ebe5172d279bbf2fb09fe755e155f00a3

                        SHA512

                        e1adb97592fc85128925daa3699bdde1500914b84d71c993185345ed7962da01406ce7ea19db45db2f951657652692eb66eb486d067767e6978960358db5114e

                      • C:\Users\Admin\AppData\Local\7e418fcc-7558-4717-9030-8884e27487e5\updatewin1.exe
                        MD5

                        5b4bd24d6240f467bfbc74803c9f15b0

                        SHA1

                        c17f98c182d299845c54069872e8137645768a1a

                        SHA256

                        14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

                        SHA512

                        a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

                      • C:\Users\Admin\AppData\Local\7e418fcc-7558-4717-9030-8884e27487e5\updatewin2.exe
                        MD5

                        996ba35165bb62473d2a6743a5200d45

                        SHA1

                        52169b0b5cce95c6905873b8d12a759c234bd2e0

                        SHA256

                        5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

                        SHA512

                        2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

                      • C:\Users\Admin\AppData\Local\93c44d5b-9be8-4931-952f-18442c697260\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • C:\Users\Admin\AppData\Local\Temp\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • C:\Users\Admin\AppData\Local\Temp\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • C:\Users\Admin\AppData\Local\Temp\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • C:\Users\Admin\AppData\Local\Temp\3592.exe
                        MD5

                        4328b263719a51a40732349a08ba3bb6

                        SHA1

                        904bd397a12c124af4a24021c6a21060955c79a3

                        SHA256

                        a351c1d494a1060fc9cd1c914bb846d87318181202c4f9c06c6931a73c933522

                        SHA512

                        75a6cdea5867875cab4c8c446c950805ab643a81d5acba6e2fc459f2859f7606690a7f19b00fb4ab22ece57236bbeaaf83295901a1807eba1881c7342f298107

                      • C:\Users\Admin\AppData\Local\Temp\40AA.exe
                        MD5

                        0aea4d493d5420856fc80865efba4838

                        SHA1

                        12acfd267b76fbcdc98914902d73ff7adfd15c3d

                        SHA256

                        ff7ae82d36a61a1480ca96bc4fef2831fb5bef00d733f29bdf5f053e7cc89ac5

                        SHA512

                        763fff58c3488579f0224c45a5e9d982ddf9b33d94def7671869f91f8b03e7f8b3452014f1dd4b95113e714d9db1f5a6d9f325a51cab964decb7263688796d63

                      • C:\Users\Admin\AppData\Local\Temp\40AA.exe
                        MD5

                        0aea4d493d5420856fc80865efba4838

                        SHA1

                        12acfd267b76fbcdc98914902d73ff7adfd15c3d

                        SHA256

                        ff7ae82d36a61a1480ca96bc4fef2831fb5bef00d733f29bdf5f053e7cc89ac5

                        SHA512

                        763fff58c3488579f0224c45a5e9d982ddf9b33d94def7671869f91f8b03e7f8b3452014f1dd4b95113e714d9db1f5a6d9f325a51cab964decb7263688796d63

                      • C:\Users\Admin\AppData\Local\Temp\434A.exe
                        MD5

                        1073896ed8714969c25798c6b30a954c

                        SHA1

                        1b1ef4654cae70cb1bc34eb270d189edb285b46a

                        SHA256

                        4aeed5485089f1b6efe2eb92328b30f04262b2f171ca41ffcadb2407e1ddadf4

                        SHA512

                        b26bec26537603e649ebc57ab51e287d5c527d8cbdeecf8c3fdb08919cae0417fc5b0cd173c33f11657f0daca6789e6b729656b44684519586a5d862a90725bb

                      • C:\Users\Admin\AppData\Local\Temp\xxyjefdl.exe
                        MD5

                        2e583118bacc70273bb9aa94fa4a168d

                        SHA1

                        896477e6c12cf036f988cb6f93bf5d4b19777286

                        SHA256

                        50d5d1fdd41e0cccff81066b7c121dcec13e997804a85ef96a77de4ea8018959

                        SHA512

                        7a9a3bc57716a1fbdf593cfaafe14c56e0996ac537ecd9238939b7ef6b2f456585c0bd8494aa7b60d7a4ad5977b5b1c5e7503cb086b33ed0bce16c5222878a98

                      • C:\Users\Admin\AppData\Roaming\jvgthfs
                        MD5

                        1efa56669738d9ef717aae854188495d

                        SHA1

                        3ff0cbdc4ec92da762c909fa42c23fcd6ff5519c

                        SHA256

                        addfb046313926c0cfb9e4293f76c408d8e6798e129f1a1043835088c54aa69b

                        SHA512

                        291ec99476a3d35d6f4d862b8f7e1380cb6cc49f4c5725befe53888d38e77b346e849aace9685e0d233b53ac2b4f8e5f4943976dc4295f2385b6d080c9eb984a

                      • C:\Users\Admin\AppData\Roaming\jvgthfs
                        MD5

                        1efa56669738d9ef717aae854188495d

                        SHA1

                        3ff0cbdc4ec92da762c909fa42c23fcd6ff5519c

                        SHA256

                        addfb046313926c0cfb9e4293f76c408d8e6798e129f1a1043835088c54aa69b

                        SHA512

                        291ec99476a3d35d6f4d862b8f7e1380cb6cc49f4c5725befe53888d38e77b346e849aace9685e0d233b53ac2b4f8e5f4943976dc4295f2385b6d080c9eb984a

                      • \ProgramData\mozglue.dll
                        MD5

                        8f73c08a9660691143661bf7332c3c27

                        SHA1

                        37fa65dd737c50fda710fdbde89e51374d0c204a

                        SHA256

                        3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                        SHA512

                        0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                      • \ProgramData\msvcp140.dll
                        MD5

                        109f0f02fd37c84bfc7508d4227d7ed5

                        SHA1

                        ef7420141bb15ac334d3964082361a460bfdb975

                        SHA256

                        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                        SHA512

                        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                      • \ProgramData\nss3.dll
                        MD5

                        bfac4e3c5908856ba17d41edcd455a51

                        SHA1

                        8eec7e888767aa9e4cca8ff246eb2aacb9170428

                        SHA256

                        e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                        SHA512

                        2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                      • \ProgramData\vcruntime140.dll
                        MD5

                        7587bf9cb4147022cd5681b015183046

                        SHA1

                        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                        SHA256

                        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                        SHA512

                        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                      • \Users\Admin\AppData\Local\7e418fcc-7558-4717-9030-8884e27487e5\updatewin2.exe
                        MD5

                        996ba35165bb62473d2a6743a5200d45

                        SHA1

                        52169b0b5cce95c6905873b8d12a759c234bd2e0

                        SHA256

                        5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

                        SHA512

                        2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

                      • \Users\Admin\AppData\Local\Temp\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • \Users\Admin\AppData\Local\Temp\2AD8.exe
                        MD5

                        dfbf4111aaf98ca30c0cf21e99a08ff7

                        SHA1

                        8d0fc08860666b9d619dc0f82cebc467705b46f3

                        SHA256

                        a9cdf6379f7d8c42e258db15cacbd19dbb4702319f6db096f5dda7ef817ca75d

                        SHA512

                        f248195b6fdfa87d404f6f17d4d3a772d48edda5d09f9fa3e85c626e41c3a5648c2dd2b52f0c2515d7ec6e9c01931b32a5db412996dd803f52159ac97fecb56a

                      • \Users\Admin\AppData\Local\Temp\CC4F.tmp
                        MD5

                        d124f55b9393c976963407dff51ffa79

                        SHA1

                        2c7bbedd79791bfb866898c85b504186db610b5d

                        SHA256

                        ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                        SHA512

                        278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                      • memory/568-13-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/568-11-0x0000000001980000-0x0000000001A9A000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/568-8-0x0000000000000000-mapping.dmp
                      • memory/568-10-0x0000000001980000-0x0000000001991000-memory.dmp
                        Filesize

                        68KB

                      • memory/612-17-0x0000000002230000-0x0000000002241000-memory.dmp
                        Filesize

                        68KB

                      • memory/612-21-0x0000000000220000-0x00000000002B4000-memory.dmp
                        Filesize

                        592KB

                      • memory/612-14-0x0000000000000000-mapping.dmp
                      • memory/612-22-0x0000000000400000-0x0000000000498000-memory.dmp
                        Filesize

                        608KB

                      • memory/1080-35-0x0000000000000000-mapping.dmp
                      • memory/1148-70-0x0000000000000000-mapping.dmp
                      • memory/1148-73-0x0000000001D30000-0x0000000001D41000-memory.dmp
                        Filesize

                        68KB

                      • memory/1236-7-0x00000000025E0000-0x00000000025F6000-memory.dmp
                        Filesize

                        88KB

                      • memory/1252-61-0x0000000000000000-mapping.dmp
                      • memory/1444-48-0x0000000000000000-mapping.dmp
                      • memory/1492-59-0x0000000000000000-mapping.dmp
                      • memory/1528-33-0x0000000000000000-mapping.dmp
                      • memory/1676-28-0x0000000004690000-0x00000000046A1000-memory.dmp
                        Filesize

                        68KB

                      • memory/1676-37-0x0000000000230000-0x0000000000243000-memory.dmp
                        Filesize

                        76KB

                      • memory/1676-19-0x0000000000000000-mapping.dmp
                      • memory/1676-38-0x0000000000400000-0x0000000000415000-memory.dmp
                        Filesize

                        84KB

                      • memory/1812-42-0x0000000000000000-mapping.dmp
                      • memory/1900-16-0x000007FEF6080000-0x000007FEF62FA000-memory.dmp
                        Filesize

                        2.5MB

                      • memory/1904-5-0x0000000000220000-0x0000000000229000-memory.dmp
                        Filesize

                        36KB

                      • memory/1904-6-0x0000000000400000-0x0000000000409000-memory.dmp
                        Filesize

                        36KB

                      • memory/1904-2-0x0000000002340000-0x0000000002351000-memory.dmp
                        Filesize

                        68KB

                      • memory/1904-3-0x0000000075781000-0x0000000075783000-memory.dmp
                        Filesize

                        8KB

                      • memory/1908-45-0x0000000004520000-0x0000000004531000-memory.dmp
                        Filesize

                        68KB

                      • memory/1908-49-0x0000000004380000-0x00000000043EB000-memory.dmp
                        Filesize

                        428KB

                      • memory/1908-23-0x0000000000000000-mapping.dmp
                      • memory/1932-41-0x0000000000000000-mapping.dmp
                      • memory/1932-52-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1932-46-0x0000000001BB0000-0x0000000001BC1000-memory.dmp
                        Filesize

                        68KB