Analysis

  • max time kernel
    63s
  • max time network
    67s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-04-2021 07:46

General

  • Target

    Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

fickerstealer

C2

deniedfight.com:80

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • fickerstealer

    Ficker is an infostealer written in Rust and ASM.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Vidar Stealer 2 IoCs
  • XMRig Miner Payload 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
    "C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:3956
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:496
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:752
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4040
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • Runs ping.exe
              PID:4460
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1004
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4004
            • C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe
              "C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4508
              • C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe
                "C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 1 3.1617436086.60681db6bbd38 101
                6⤵
                  PID:2760
                  • C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe
                    "C:\Users\Admin\AppData\Local\Temp\H19UXYPJTM\multitimer.exe" 2 3.1617436086.60681db6bbd38
                    7⤵
                      PID:4700
                      • C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe
                        "C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe" /Verysilent /subid=577
                        8⤵
                          PID:5164
                          • C:\Users\Admin\AppData\Local\Temp\is-1AARR.tmp\Setup3310.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-1AARR.tmp\Setup3310.tmp" /SL5="$20314,138429,56832,C:\Users\Admin\AppData\Local\Temp\qdworh1l1wj\Setup3310.exe" /Verysilent /subid=577
                            9⤵
                              PID:5532
                          • C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe
                            "C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe" /VERYSILENT /id=535
                            8⤵
                              PID:2892
                              • C:\Users\Admin\AppData\Local\Temp\is-PF1OI.tmp\vict.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-PF1OI.tmp\vict.tmp" /SL5="$70320,870426,780800,C:\Users\Admin\AppData\Local\Temp\rdnmzyf5fba\vict.exe" /VERYSILENT /id=535
                                9⤵
                                  PID:5516
                                  • C:\Users\Admin\AppData\Local\Temp\is-M85HO.tmp\win1host.exe
                                    "C:\Users\Admin\AppData\Local\Temp\is-M85HO.tmp\win1host.exe" 535
                                    10⤵
                                      PID:4308
                                • C:\Users\Admin\AppData\Local\Temp\renkyejjtne\03f4ocgyy03.exe
                                  "C:\Users\Admin\AppData\Local\Temp\renkyejjtne\03f4ocgyy03.exe" /ustwo INSTALL
                                  8⤵
                                    PID:796
                                  • C:\Users\Admin\AppData\Local\Temp\rqtroxorax0\app.exe
                                    "C:\Users\Admin\AppData\Local\Temp\rqtroxorax0\app.exe" /8-23
                                    8⤵
                                      PID:5480
                                    • C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe
                                      "C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe"
                                      8⤵
                                        PID:5708
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\eor4vstoqmi\kx5xbl14fdr.exe"
                                          9⤵
                                            PID:2128
                                            • C:\Windows\SysWOW64\PING.EXE
                                              ping 1.1.1.1 -n 1 -w 3000
                                              10⤵
                                              • Runs ping.exe
                                              PID:5792
                                        • C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe
                                          "C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                          8⤵
                                            PID:5832
                                            • C:\Users\Admin\AppData\Local\Temp\is-396UQ.tmp\IBInstaller_97039.tmp
                                              "C:\Users\Admin\AppData\Local\Temp\is-396UQ.tmp\IBInstaller_97039.tmp" /SL5="$4035E,14574851,721408,C:\Users\Admin\AppData\Local\Temp\gjwnpb0klj4\IBInstaller_97039.exe" /VERYSILENT /PASSWORD=kSWIzY9AFOirvP3TueIs97039 -token mtn1co3fo4gs5vwq
                                              9⤵
                                                PID:5900
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd.exe" /c expand C:\Users\Admin\AppData\Local\Temp\is-8GSBL.tmp\{app}\microsoft.cab -F:* %ProgramData%
                                                  10⤵
                                                    PID:6100
                                                    • C:\Windows\SysWOW64\expand.exe
                                                      expand C:\Users\Admin\AppData\Local\Temp\is-8GSBL.tmp\{app}\microsoft.cab -F:* C:\ProgramData
                                                      11⤵
                                                        PID:1556
                                                • C:\Users\Admin\AppData\Local\Temp\so2sdkb24tv\y2nlglkxokc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\so2sdkb24tv\y2nlglkxokc.exe" /quiet SILENT=1 AF=756
                                                  8⤵
                                                    PID:5956
                                                  • C:\Users\Admin\AppData\Local\Temp\rx1ze05qlcw\cpyrix.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\rx1ze05qlcw\cpyrix.exe" /VERYSILENT
                                                    8⤵
                                                      PID:6048
                                                    • C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe" /silent /subid=482
                                                      8⤵
                                                        PID:5400
                                                        • C:\Users\Admin\AppData\Local\Temp\is-Q77IR.tmp\vpn.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-Q77IR.tmp\vpn.tmp" /SL5="$3029A,15170975,270336,C:\Users\Admin\AppData\Local\Temp\23jb1k0qlzl\vpn.exe" /silent /subid=482
                                                          9⤵
                                                            PID:6128
                                                        • C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe" /VERYSILENT
                                                          8⤵
                                                            PID:2256
                                                            • C:\Users\Admin\AppData\Local\Temp\is-8UIIB.tmp\jmuhpugujhr.tmp
                                                              "C:\Users\Admin\AppData\Local\Temp\is-8UIIB.tmp\jmuhpugujhr.tmp" /SL5="$40436,2592217,780800,C:\Users\Admin\AppData\Local\Temp\yzzkj2rf0gk\jmuhpugujhr.exe" /VERYSILENT
                                                              9⤵
                                                                PID:3400
                                                      • C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe" ll
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:1824
                                                        • C:\Users\Admin\AppData\Local\Temp\is-56QO3.tmp\setups.tmp
                                                          "C:\Users\Admin\AppData\Local\Temp\is-56QO3.tmp\setups.tmp" /SL5="$401A0,635399,250368,C:\Users\Admin\AppData\Local\Temp\IT0NABSNGK\setups.exe" ll
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Checks computer location settings
                                                          • Loads dropped DLL
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:4652
                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall20.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Modifies system certificate store
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2896
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd.exe /c taskkill /f /im chrome.exe
                                                        5⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:4452
                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                          taskkill /f /im chrome.exe
                                                          6⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2056
                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Full Program Features.exe"
                                                      4⤵
                                                        PID:1328
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Program Files\unins.vbs"
                                                          5⤵
                                                            PID:2508
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              "C:\Windows\System32\rundll32.exe" "C:\Program Files\unins0000.dll",install
                                                              6⤵
                                                                PID:4496
                                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                                                            4⤵
                                                              PID:2556
                                                              • C:\Users\Admin\AppData\Roaming\B740.tmp.exe
                                                                "C:\Users\Admin\AppData\Roaming\B740.tmp.exe"
                                                                5⤵
                                                                  PID:3996
                                                                  • C:\Users\Admin\AppData\Roaming\B740.tmp.exe
                                                                    "C:\Users\Admin\AppData\Roaming\B740.tmp.exe"
                                                                    6⤵
                                                                      PID:2100
                                                                  • C:\Users\Admin\AppData\Roaming\B898.tmp.exe
                                                                    "C:\Users\Admin\AppData\Roaming\B898.tmp.exe"
                                                                    5⤵
                                                                      PID:3796
                                                                      • C:\Windows\system32\msiexec.exe
                                                                        -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.work@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                                                                        6⤵
                                                                          PID:196
                                                                        • C:\Windows\system32\msiexec.exe
                                                                          -o pool.supportxmr.com:8080 -u 47wDrszce6VbnMB4zhhEA1Gr3EzwHx2eS6QzC5sFoq8iGdMjnzX8bnEjBdQHsAuW8C1SNgxyGa4DQTVnQ9jfhRod73np5P8 --cpu-max-threads-hint 50 -r 9999
                                                                          6⤵
                                                                            PID:4684
                                                                        • C:\Users\Admin\AppData\Roaming\BA01.tmp.exe
                                                                          "C:\Users\Admin\AppData\Roaming\BA01.tmp.exe"
                                                                          5⤵
                                                                            PID:4532
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"
                                                                            5⤵
                                                                              PID:2460
                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                ping 127.0.0.1
                                                                                6⤵
                                                                                • Runs ping.exe
                                                                                PID:4928
                                                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"
                                                                            4⤵
                                                                              PID:3888
                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                        1⤵
                                                                        • Drops file in Windows directory
                                                                        • Modifies Internet Explorer settings
                                                                        • Modifies registry class
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:4172
                                                                      • C:\Windows\system32\browser_broker.exe
                                                                        C:\Windows\system32\browser_broker.exe -Embedding
                                                                        1⤵
                                                                        • Modifies Internet Explorer settings
                                                                        PID:2196
                                                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                        1⤵
                                                                          PID:2012
                                                                        • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                          "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                          1⤵
                                                                            PID:3916
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                            1⤵
                                                                              PID:4828
                                                                            • C:\Windows\system32\werfault.exe
                                                                              werfault.exe /h /shared Global\145e37ed40c949b9b95db58ae047445e /t 3960 /p 3916
                                                                              1⤵
                                                                                PID:5320

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v6

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • memory/60-106-0x0000029ED9A30000-0x0000029ED9A97000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/196-155-0x0000000140000000-0x0000000140383000-memory.dmp

                                                                                Filesize

                                                                                3.5MB

                                                                              • memory/196-159-0x0000000140000000-0x0000000140383000-memory.dmp

                                                                                Filesize

                                                                                3.5MB

                                                                              • memory/796-186-0x0000000001C10000-0x0000000001C11000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/796-188-0x0000000001C10000-0x0000000001C5C000-memory.dmp

                                                                                Filesize

                                                                                304KB

                                                                              • memory/796-192-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                Filesize

                                                                                320KB

                                                                              • memory/1036-129-0x0000023AAB250000-0x0000023AAB2B7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/1092-123-0x0000020E867E0000-0x0000020E86847000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/1200-138-0x00000221F53D0000-0x00000221F5437000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/1304-140-0x000001C581EA0000-0x000001C581F07000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/1444-132-0x0000022F05640000-0x0000022F056A7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/1824-45-0x0000000000401000-0x000000000040C000-memory.dmp

                                                                                Filesize

                                                                                44KB

                                                                              • memory/1848-136-0x000001F2051D0000-0x000001F205237000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2100-135-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                Filesize

                                                                                312KB

                                                                              • memory/2100-113-0x0000000000400000-0x000000000044E000-memory.dmp

                                                                                Filesize

                                                                                312KB

                                                                              • memory/2452-109-0x0000029307B10000-0x0000029307B77000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2488-105-0x0000022AFEEB0000-0x0000022AFEF17000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2556-101-0x0000000000400000-0x0000000000448000-memory.dmp

                                                                                Filesize

                                                                                288KB

                                                                              • memory/2556-67-0x0000000000640000-0x000000000064D000-memory.dmp

                                                                                Filesize

                                                                                52KB

                                                                              • memory/2696-95-0x0000022289960000-0x00000222899C7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2760-126-0x00000000010A0000-0x00000000010A2000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/2760-125-0x0000000002910000-0x00000000032B0000-memory.dmp

                                                                                Filesize

                                                                                9.6MB

                                                                              • memory/2796-142-0x000001D0759A0000-0x000001D075A07000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2812-144-0x00000262CF580000-0x00000262CF5E7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/2824-28-0x0000000002660000-0x00000000027FC000-memory.dmp

                                                                                Filesize

                                                                                1.6MB

                                                                              • memory/2892-173-0x0000000000401000-0x00000000004B7000-memory.dmp

                                                                                Filesize

                                                                                728KB

                                                                              • memory/3400-232-0x00000000009C0000-0x00000000009C1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/3996-130-0x0000000001B30000-0x0000000001B77000-memory.dmp

                                                                                Filesize

                                                                                284KB

                                                                              • memory/3996-111-0x0000000001E10000-0x0000000001E11000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4004-24-0x00007FFCF2620000-0x00007FFCF300C000-memory.dmp

                                                                                Filesize

                                                                                9.9MB

                                                                              • memory/4004-26-0x0000000000940000-0x0000000000941000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4004-30-0x000000001B580000-0x000000001B582000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/4496-87-0x00000000011D0000-0x0000000001226000-memory.dmp

                                                                                Filesize

                                                                                344KB

                                                                              • memory/4496-83-0x0000000000B40000-0x0000000000B7A000-memory.dmp

                                                                                Filesize

                                                                                232KB

                                                                              • memory/4508-43-0x0000000002690000-0x0000000003030000-memory.dmp

                                                                                Filesize

                                                                                9.6MB

                                                                              • memory/4508-46-0x0000000000980000-0x0000000000982000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/4532-185-0x0000000007540000-0x000000000C9BC000-memory.dmp

                                                                                Filesize

                                                                                84.5MB

                                                                              • memory/4652-53-0x00000000032B1000-0x00000000032DC000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/4652-57-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4652-56-0x00000000032F1000-0x00000000032F8000-memory.dmp

                                                                                Filesize

                                                                                28KB

                                                                              • memory/4652-49-0x0000000003141000-0x0000000003143000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/4684-175-0x000001EB11630000-0x000001EB11650000-memory.dmp

                                                                                Filesize

                                                                                128KB

                                                                              • memory/4684-160-0x000001EB115F0000-0x000001EB11604000-memory.dmp

                                                                                Filesize

                                                                                80KB

                                                                              • memory/4684-161-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                Filesize

                                                                                7.0MB

                                                                              • memory/4684-157-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                Filesize

                                                                                7.0MB

                                                                              • memory/4684-163-0x0000000140000000-0x000000014070A000-memory.dmp

                                                                                Filesize

                                                                                7.0MB

                                                                              • memory/4696-2-0x00000000028F0000-0x00000000028F1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/4700-152-0x0000000002490000-0x0000000002E30000-memory.dmp

                                                                                Filesize

                                                                                9.6MB

                                                                              • memory/4700-154-0x0000000002480000-0x0000000002482000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/4748-91-0x000001F276B50000-0x000001F276BB7000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/4748-84-0x000001F276A90000-0x000001F276AD4000-memory.dmp

                                                                                Filesize

                                                                                272KB

                                                                              • memory/4828-162-0x0000025A64500000-0x0000025A64603000-memory.dmp

                                                                                Filesize

                                                                                1.0MB

                                                                              • memory/4828-102-0x0000025A62100000-0x0000025A62167000-memory.dmp

                                                                                Filesize

                                                                                412KB

                                                                              • memory/5164-176-0x0000000000401000-0x000000000040B000-memory.dmp

                                                                                Filesize

                                                                                40KB

                                                                              • memory/5400-219-0x0000000000401000-0x0000000000417000-memory.dmp

                                                                                Filesize

                                                                                88KB

                                                                              • memory/5480-187-0x0000000002570000-0x0000000002571000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5480-191-0x0000000000400000-0x0000000000D24000-memory.dmp

                                                                                Filesize

                                                                                9.1MB

                                                                              • memory/5480-190-0x0000000000400000-0x0000000000D24000-memory.dmp

                                                                                Filesize

                                                                                9.1MB

                                                                              • memory/5480-193-0x0000000002570000-0x0000000002E7A000-memory.dmp

                                                                                Filesize

                                                                                9.0MB

                                                                              • memory/5516-180-0x0000000000900000-0x0000000000901000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-200-0x0000000003B00000-0x0000000003B01000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-205-0x0000000003B50000-0x0000000003B51000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-197-0x0000000003AE0000-0x0000000003AE1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-195-0x0000000003AC0000-0x0000000003AC1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-199-0x0000000003AF0000-0x0000000003AF1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-201-0x0000000003B10000-0x0000000003B11000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-202-0x0000000003B20000-0x0000000003B21000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-204-0x0000000003B40000-0x0000000003B41000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-182-0x0000000005000000-0x0000000005001000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-207-0x0000000003B60000-0x0000000003B61000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-184-0x0000000003AB0000-0x0000000003AB1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-208-0x0000000003B70000-0x0000000003B71000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-210-0x0000000003B80000-0x0000000003B81000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-183-0x0000000005010000-0x0000000005011000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-211-0x0000000003B90000-0x0000000003B91000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-212-0x0000000003BA0000-0x0000000003BA1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-181-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-203-0x0000000003B30000-0x0000000003B31000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-196-0x0000000003AD0000-0x0000000003AD1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/5532-179-0x0000000003931000-0x000000000395C000-memory.dmp

                                                                                Filesize

                                                                                172KB

                                                                              • memory/5832-209-0x0000000000401000-0x00000000004A9000-memory.dmp

                                                                                Filesize

                                                                                672KB

                                                                              • memory/5900-215-0x00000000006D0000-0x00000000006D1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/6128-224-0x0000000000610000-0x0000000000611000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/6128-222-0x0000000003291000-0x0000000003476000-memory.dmp

                                                                                Filesize

                                                                                1.9MB

                                                                              • memory/6128-225-0x00000000037A0000-0x00000000037A1000-memory.dmp

                                                                                Filesize

                                                                                4KB

                                                                              • memory/6128-227-0x0000000005281000-0x0000000005289000-memory.dmp

                                                                                Filesize

                                                                                32KB

                                                                              • memory/6128-229-0x0000000005521000-0x000000000552D000-memory.dmp

                                                                                Filesize

                                                                                48KB

                                                                              • memory/6128-231-0x0000000005270000-0x0000000005271000-memory.dmp

                                                                                Filesize

                                                                                4KB