Analysis

  • max time kernel
    1594s
  • max time network
    1768s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    02-04-2021 13:29

General

  • Target

    DBF.Viewer.Pro.3.11.crack.by.F4CG.exe

  • Size

    4.8MB

  • MD5

    98e0552e7c661d3f84c5ca691bb58b60

  • SHA1

    f8747cbd9256e9587e45b1feeded6b082b098e5d

  • SHA256

    23e30d6f1d505e6a0cf1672ec7420d28af81975a9832f1af2eae8a3233a09eb4

  • SHA512

    d767b09e6d24ce96ce95e7cbcb248b93373f7dcbad3a96ba249a3c54df9511567c4ff2bfd8393492a0f90ae8bf5ab37c1cf71f75092ad81dde7a7a7a5f7e76da

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

zloader

Botnet

googleaktualizacija

Campaign

googleaktualizacija2

C2

https://iqowijsdakm.com/gate.php

https://wiewjdmkfjn.com/gate.php

https://dksaoidiakjd.com/gate.php

https://iweuiqjdakjd.com/gate.php

https://yuidskadjna.com/gate.php

https://olksmadnbdj.com/gate.php

https://odsakmdfnbs.com/gate.php

https://odsakjmdnhsaj.com/gate.php

https://odjdnhsaj.com/gate.php

https://odoishsaj.com/gate.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Taurus Stealer

    Taurus is an infostealer first seen in June 2020.

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 34 IoCs
  • Loads dropped DLL 54 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 59 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DBF.Viewer.Pro.3.11.crack.by.F4CG.exe
    "C:\Users\Admin\AppData\Local\Temp\DBF.Viewer.Pro.3.11.crack.by.F4CG.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
            • Executes dropped EXE
            PID:364
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
        keygen-step-1.exe
        3⤵
        • Executes dropped EXE
        PID:1584
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
        keygen-step-3.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\PING.EXE
            ping 1.1.1.1 -n 1 -w 3000
            5⤵
            • Runs ping.exe
            PID:824
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
        keygen-step-4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe
            "C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe" ll
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1884
            • C:\Users\Admin\AppData\Local\Temp\is-O47II.tmp\setups.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-O47II.tmp\setups.tmp" /SL5="$201B6,635399,250368,C:\Users\Admin\AppData\Local\Temp\U596WLRJ9S\setups.exe" ll
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1508
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe" https://catser.inappapiurl.com/redirect/57a764d042bf8/
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:1704
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:1092
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:1389580 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2252
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:1324066 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:2636
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:472105 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  PID:3492
                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275489 /prefetch:2
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:2124
                  • C:\Windows\SysWOW64\regsvr32.exe
                    regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\260824873.exe"
                    9⤵
                    • Loads dropped DLL
                    PID:2720
                    • C:\Windows\SysWOW64\msiexec.exe
                      msiexec.exe
                      10⤵
                        PID:2328
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:865358 /prefetch:2
                    8⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1012
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"
            4⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:940
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c taskkill /f /im chrome.exe
              5⤵
                PID:848
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /f /im chrome.exe
                  6⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:548
            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe
              "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system certificate store
              PID:2164
              • C:\Users\Admin\AppData\Roaming\EE66.tmp.exe
                "C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2380
                • C:\Users\Admin\AppData\Roaming\EE66.tmp.exe
                  "C:\Users\Admin\AppData\Roaming\EE66.tmp.exe"
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2772
              • C:\Users\Admin\AppData\Roaming\EFDE.tmp.exe
                "C:\Users\Admin\AppData\Roaming\EFDE.tmp.exe"
                5⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                PID:2416
                • C:\Windows\system32\msiexec.exe
                  -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                  6⤵
                    PID:1512
                  • C:\Windows\system32\msiexec.exe
                    -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
                    6⤵
                    • Blocklisted process makes network request
                    PID:2904
                • C:\Users\Admin\AppData\Roaming\F07B.tmp.exe
                  "C:\Users\Admin\AppData\Roaming\F07B.tmp.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:2468
                  • C:\Windows\SysWOW64\cmd.exe
                    /c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Roaming\F07B.tmp.exe
                    6⤵
                      PID:2104
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 3
                        7⤵
                        • Delays execution with timeout.exe
                        PID:2152
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"
                    5⤵
                      PID:2612
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:2692
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:3112
                    • C:\ProgramData\7185728.exe
                      "C:\ProgramData\7185728.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3228
                    • C:\ProgramData\6872105.exe
                      "C:\ProgramData\6872105.exe"
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      PID:3240
                      • C:\ProgramData\Windows Host\Windows Host.exe
                        "C:\ProgramData\Windows Host\Windows Host.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:3692
                    • C:\ProgramData\4085740.exe
                      "C:\ProgramData\4085740.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3268
                      • C:\ProgramData\4085740.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        PID:4068
                      • C:\ProgramData\4085740.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        PID:4092
                      • C:\ProgramData\4085740.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        PID:3096
                      • C:\ProgramData\4085740.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        PID:4084
                      • C:\ProgramData\4085740.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        PID:4076
                    • C:\ProgramData\5281535.exe
                      "C:\ProgramData\5281535.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3280
                      • C:\ProgramData\5281535.exe
                        "{path}"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2524
                    • C:\ProgramData\739483.exe
                      "C:\ProgramData\739483.exe"
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3292
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX1\gcttt.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    PID:3312
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      PID:3348
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3380
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3136
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2708
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1
              1⤵
              • Runs ping.exe
              PID:2704

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/364-52-0x0000000000400000-0x0000000000983000-memory.dmp

              Filesize

              5.5MB

            • memory/364-45-0x0000000000400000-0x0000000000983000-memory.dmp

              Filesize

              5.5MB

            • memory/432-54-0x000007FEF7080000-0x000007FEF72FA000-memory.dmp

              Filesize

              2.5MB

            • memory/1204-57-0x000000001AF80000-0x000000001AF82000-memory.dmp

              Filesize

              8KB

            • memory/1204-42-0x000007FEF4EE0000-0x000007FEF58CC000-memory.dmp

              Filesize

              9.9MB

            • memory/1204-55-0x00000000012B0000-0x00000000012B1000-memory.dmp

              Filesize

              4KB

            • memory/1508-77-0x00000000003D0000-0x00000000003D1000-memory.dmp

              Filesize

              4KB

            • memory/1512-132-0x0000000140000000-0x0000000140383000-memory.dmp

              Filesize

              3.5MB

            • memory/1512-138-0x0000000140000000-0x0000000140383000-memory.dmp

              Filesize

              3.5MB

            • memory/1520-25-0x0000000002420000-0x0000000002421000-memory.dmp

              Filesize

              4KB

            • memory/1624-90-0x0000000000130000-0x000000000014B000-memory.dmp

              Filesize

              108KB

            • memory/1624-50-0x00000000023E0000-0x000000000257C000-memory.dmp

              Filesize

              1.6MB

            • memory/1624-59-0x0000000000EC0000-0x0000000000FAF000-memory.dmp

              Filesize

              956KB

            • memory/1624-89-0x0000000000140000-0x0000000000141000-memory.dmp

              Filesize

              4KB

            • memory/1668-2-0x0000000074B31000-0x0000000074B33000-memory.dmp

              Filesize

              8KB

            • memory/1704-82-0x000007FEFB6F1000-0x000007FEFB6F3000-memory.dmp

              Filesize

              8KB

            • memory/1884-75-0x0000000000401000-0x000000000040C000-memory.dmp

              Filesize

              44KB

            • memory/2164-96-0x0000000000020000-0x000000000002D000-memory.dmp

              Filesize

              52KB

            • memory/2164-117-0x0000000002680000-0x00000000026C8000-memory.dmp

              Filesize

              288KB

            • memory/2328-235-0x0000000000090000-0x00000000000B6000-memory.dmp

              Filesize

              152KB

            • memory/2380-124-0x0000000004500000-0x0000000004511000-memory.dmp

              Filesize

              68KB

            • memory/2380-129-0x0000000000250000-0x0000000000297000-memory.dmp

              Filesize

              284KB

            • memory/2468-119-0x0000000007290000-0x000000000C70C000-memory.dmp

              Filesize

              84.5MB

            • memory/2468-121-0x0000000000400000-0x000000000587C000-memory.dmp

              Filesize

              84.5MB

            • memory/2524-215-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/2524-213-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/2524-216-0x0000000000400000-0x0000000000430000-memory.dmp

              Filesize

              192KB

            • memory/2524-218-0x0000000000860000-0x0000000000861000-memory.dmp

              Filesize

              4KB

            • memory/2692-126-0x00000000704F0000-0x0000000070693000-memory.dmp

              Filesize

              1.6MB

            • memory/2720-232-0x0000000000400000-0x000000000044B000-memory.dmp

              Filesize

              300KB

            • memory/2720-231-0x0000000000280000-0x0000000000281000-memory.dmp

              Filesize

              4KB

            • memory/2772-127-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/2772-131-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/2904-141-0x0000000140000000-0x000000014070A000-memory.dmp

              Filesize

              7.0MB

            • memory/2904-134-0x0000000140000000-0x000000014070A000-memory.dmp

              Filesize

              7.0MB

            • memory/2904-139-0x0000000140000000-0x000000014070A000-memory.dmp

              Filesize

              7.0MB

            • memory/2904-142-0x0000000000300000-0x0000000000320000-memory.dmp

              Filesize

              128KB

            • memory/2904-136-0x0000000000100000-0x0000000000114000-memory.dmp

              Filesize

              80KB

            • memory/3112-145-0x0000000000050000-0x0000000000051000-memory.dmp

              Filesize

              4KB

            • memory/3112-144-0x000007FEF4C40000-0x000007FEF562C000-memory.dmp

              Filesize

              9.9MB

            • memory/3112-148-0x000000001ACC0000-0x000000001ACC2000-memory.dmp

              Filesize

              8KB

            • memory/3112-149-0x0000000000590000-0x00000000005AD000-memory.dmp

              Filesize

              116KB

            • memory/3112-147-0x0000000000580000-0x0000000000581000-memory.dmp

              Filesize

              4KB

            • memory/3112-150-0x00000000005B0000-0x00000000005B1000-memory.dmp

              Filesize

              4KB

            • memory/3228-184-0x0000000000890000-0x0000000000891000-memory.dmp

              Filesize

              4KB

            • memory/3228-153-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/3228-177-0x00000000001E0000-0x00000000001E1000-memory.dmp

              Filesize

              4KB

            • memory/3228-183-0x0000000000330000-0x0000000000331000-memory.dmp

              Filesize

              4KB

            • memory/3228-170-0x00000000008E0000-0x00000000008E1000-memory.dmp

              Filesize

              4KB

            • memory/3228-181-0x00000000003A0000-0x00000000003D4000-memory.dmp

              Filesize

              208KB

            • memory/3240-186-0x0000000000340000-0x0000000000354000-memory.dmp

              Filesize

              80KB

            • memory/3240-179-0x0000000000330000-0x0000000000331000-memory.dmp

              Filesize

              4KB

            • memory/3240-168-0x0000000000A40000-0x0000000000A41000-memory.dmp

              Filesize

              4KB

            • memory/3240-185-0x0000000000490000-0x0000000000491000-memory.dmp

              Filesize

              4KB

            • memory/3240-154-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/3240-192-0x0000000000360000-0x0000000000361000-memory.dmp

              Filesize

              4KB

            • memory/3268-169-0x0000000000360000-0x0000000000361000-memory.dmp

              Filesize

              4KB

            • memory/3268-164-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/3268-207-0x0000000004ED0000-0x0000000004F65000-memory.dmp

              Filesize

              596KB

            • memory/3268-198-0x00000000046F0000-0x00000000046F1000-memory.dmp

              Filesize

              4KB

            • memory/3268-211-0x0000000005250000-0x00000000052B1000-memory.dmp

              Filesize

              388KB

            • memory/3268-210-0x0000000005E30000-0x0000000005ED6000-memory.dmp

              Filesize

              664KB

            • memory/3280-173-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

              Filesize

              4KB

            • memory/3280-166-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/3280-199-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

              Filesize

              4KB

            • memory/3280-209-0x0000000005FA0000-0x0000000006044000-memory.dmp

              Filesize

              656KB

            • memory/3280-200-0x0000000000420000-0x0000000000421000-memory.dmp

              Filesize

              4KB

            • memory/3280-212-0x00000000051C0000-0x000000000521E000-memory.dmp

              Filesize

              376KB

            • memory/3280-206-0x00000000006D0000-0x00000000006D5000-memory.dmp

              Filesize

              20KB

            • memory/3292-165-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB

            • memory/3292-187-0x00000000007B0000-0x00000000007C1000-memory.dmp

              Filesize

              68KB

            • memory/3292-182-0x0000000000330000-0x0000000000331000-memory.dmp

              Filesize

              4KB

            • memory/3292-180-0x0000000000520000-0x000000000055B000-memory.dmp

              Filesize

              236KB

            • memory/3292-178-0x00000000001F0000-0x00000000001F1000-memory.dmp

              Filesize

              4KB

            • memory/3292-196-0x00000000046A0000-0x00000000046A1000-memory.dmp

              Filesize

              4KB

            • memory/3292-167-0x0000000000890000-0x0000000000891000-memory.dmp

              Filesize

              4KB

            • memory/3692-205-0x0000000000670000-0x0000000000671000-memory.dmp

              Filesize

              4KB

            • memory/3692-195-0x0000000000E60000-0x0000000000E61000-memory.dmp

              Filesize

              4KB

            • memory/3692-194-0x000000006FB20000-0x000000007020E000-memory.dmp

              Filesize

              6.9MB