Analysis

  • max time kernel
    71s
  • max time network
    73s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    30-06-2021 09:04

Errors

Reason
Remote task has failed: Machine shutdown

General

  • Target

    DC2AD73D29C4F13A9DA18F327625A6C7.exe

  • Size

    3.1MB

  • MD5

    dc2ad73d29c4f13a9da18f327625a6c7

  • SHA1

    4987698425e4e43a34312cfed51de09dea333f16

  • SHA256

    5f48c241c815060c266f3ad4eaf267ecb0026af7369a91125b87c7e079ca3aa4

  • SHA512

    7f02a08c918f079ac8eae9fcf422f8eea27d0f08761a4168ee11139c675196055f583711326625e76def63211d3c28273c05e4f3a7bd2be33471ce39000b886e

Malware Config

Extracted

Family

redline

Botnet

ServAni

C2

87.251.71.195:82

Extracted

Family

smokeloader

Version

2020

C2

http://ppcspb.com/upload/

http://mebbing.com/upload/

http://twcamel.com/upload/

http://howdycash.com/upload/

http://lahuertasonora.com/upload/

http://kpotiques.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 8 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 9 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 9 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 13 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s WpnService
    1⤵
      PID:2724
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Browser
      1⤵
        PID:2616
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
        1⤵
          PID:2432
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
          1⤵
            PID:2400
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
            1⤵
              PID:1944
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s SENS
              1⤵
                PID:1416
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                1⤵
                  PID:1340
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s Themes
                  1⤵
                    PID:1256
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                    1⤵
                      PID:1152
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                      1⤵
                      • Drops file in System32 directory
                      PID:1036
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
                      1⤵
                        PID:336
                      • C:\Users\Admin\AppData\Local\Temp\DC2AD73D29C4F13A9DA18F327625A6C7.exe
                        "C:\Users\Admin\AppData\Local\Temp\DC2AD73D29C4F13A9DA18F327625A6C7.exe"
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3904
                        • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\setup_install.exe
                          "C:\Users\Admin\AppData\Local\Temp\7zS04F70334\setup_install.exe"
                          2⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2196
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c arnatic_1.exe
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2756
                            • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_1.exe
                              arnatic_1.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Checks processor information in registry
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2100
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c taskkill /im arnatic_1.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_1.exe" & del C:\ProgramData\*.dll & exit
                                5⤵
                                  PID:4856
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /im arnatic_1.exe /f
                                    6⤵
                                    • Kills process with taskkill
                                    PID:4896
                                  • C:\Windows\SysWOW64\timeout.exe
                                    timeout /t 6
                                    6⤵
                                    • Delays execution with timeout.exe
                                    PID:4492
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_2.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4076
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_2.exe
                                arnatic_2.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Checks SCSI registry key(s)
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                PID:1228
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_3.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3676
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_3.exe
                                arnatic_3.exe
                                4⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                • Modifies registry class
                                PID:3988
                                • C:\Windows\SysWOW64\rUNdlL32.eXe
                                  "C:\Windows\system32\rUNdlL32.eXe" "C:\Users\Admin\AppData\Local\Temp\axhub.dll",axhub
                                  5⤵
                                  • Loads dropped DLL
                                  • Modifies registry class
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4336
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_4.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3660
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_4.exe
                                arnatic_4.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:2416
                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3588
                                • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                                  C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3400
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_5.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3720
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_5.exe
                                arnatic_5.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:3964
                                • C:\Users\Admin\AppData\Roaming\6926373.exe
                                  "C:\Users\Admin\AppData\Roaming\6926373.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3044
                                • C:\Users\Admin\AppData\Roaming\5896969.exe
                                  "C:\Users\Admin\AppData\Roaming\5896969.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  PID:2752
                                  • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                    "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4540
                                • C:\Users\Admin\AppData\Roaming\4754201.exe
                                  "C:\Users\Admin\AppData\Roaming\4754201.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4116
                                • C:\Users\Admin\AppData\Roaming\4475270.exe
                                  "C:\Users\Admin\AppData\Roaming\4475270.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4168
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_6.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3376
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_6.exe
                                arnatic_6.exe
                                4⤵
                                • Executes dropped EXE
                                PID:908
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c arnatic_7.exe
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3292
                              • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_7.exe
                                arnatic_7.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Suspicious use of WriteProcessMemory
                                PID:3928
                                • C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_7.exe
                                  C:\Users\Admin\AppData\Local\Temp\7zS04F70334\arnatic_7.exe
                                  5⤵
                                  • Executes dropped EXE
                                  PID:3936
                        • \??\c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                          1⤵
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:684
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                            2⤵
                            • Drops file in System32 directory
                            • Checks processor information in registry
                            • Modifies data under HKEY_USERS
                            • Modifies registry class
                            PID:4512
                        • C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                          C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:4384
                          • C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                            C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                            2⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:3680
                            • C:\Windows\SysWOW64\icacls.exe
                              icacls "C:\Users\Admin\AppData\Local\43bf8dc4-fbbd-4305-8e64-eca5fe7f12f6" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                              3⤵
                              • Modifies file permissions
                              PID:3968
                            • C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                              "C:\Users\Admin\AppData\Local\Temp\F5B0.exe" --Admin IsNotAutoStart IsNotTask
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:4548
                              • C:\Users\Admin\AppData\Local\Temp\F5B0.exe
                                "C:\Users\Admin\AppData\Local\Temp\F5B0.exe" --Admin IsNotAutoStart IsNotTask
                                4⤵
                                • Executes dropped EXE
                                PID:4172
                                • C:\Users\Admin\AppData\Local\9cda6816-94e3-46c9-ae7e-3caad4f3ba2a\build2.exe
                                  "C:\Users\Admin\AppData\Local\9cda6816-94e3-46c9-ae7e-3caad4f3ba2a\build2.exe"
                                  5⤵
                                  • Executes dropped EXE
                                  PID:4528
                        • C:\Users\Admin\AppData\Local\Temp\FDDF.exe
                          C:\Users\Admin\AppData\Local\Temp\FDDF.exe
                          1⤵
                          • Executes dropped EXE
                          PID:4232
                        • C:\Users\Admin\AppData\Local\Temp\ED8.exe
                          C:\Users\Admin\AppData\Local\Temp\ED8.exe
                          1⤵
                          • Executes dropped EXE
                          • Writes to the Master Boot Record (MBR)
                          PID:1168

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • memory/336-245-0x0000013CDAFD0000-0x0000013CDB041000-memory.dmp

                          Filesize

                          452KB

                        • memory/684-261-0x0000027457E10000-0x0000027457E81000-memory.dmp

                          Filesize

                          452KB

                        • memory/1036-271-0x000002736CD30000-0x000002736CDA1000-memory.dmp

                          Filesize

                          452KB

                        • memory/1152-268-0x00000161BBC40000-0x00000161BBCB1000-memory.dmp

                          Filesize

                          452KB

                        • memory/1168-338-0x0000000004810000-0x000000000487B000-memory.dmp

                          Filesize

                          428KB

                        • memory/1168-337-0x0000000004760000-0x00000000047C0000-memory.dmp

                          Filesize

                          384KB

                        • memory/1168-339-0x0000000000400000-0x0000000004427000-memory.dmp

                          Filesize

                          64.2MB

                        • memory/1228-291-0x0000000000900000-0x00000000009AE000-memory.dmp

                          Filesize

                          696KB

                        • memory/1228-292-0x0000000000400000-0x00000000008FA000-memory.dmp

                          Filesize

                          5.0MB

                        • memory/1256-280-0x0000025F77C40000-0x0000025F77CB1000-memory.dmp

                          Filesize

                          452KB

                        • memory/1340-278-0x000001EC08A60000-0x000001EC08AD1000-memory.dmp

                          Filesize

                          452KB

                        • memory/1416-275-0x000001E759440000-0x000001E7594B1000-memory.dmp

                          Filesize

                          452KB

                        • memory/1944-283-0x000001B65A240000-0x000001B65A2B1000-memory.dmp

                          Filesize

                          452KB

                        • memory/2100-290-0x0000000000400000-0x0000000000950000-memory.dmp

                          Filesize

                          5.3MB

                        • memory/2100-289-0x0000000002680000-0x000000000271D000-memory.dmp

                          Filesize

                          628KB

                        • memory/2196-128-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                          Filesize

                          1.5MB

                        • memory/2196-147-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/2196-150-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/2196-127-0x000000006B440000-0x000000006B4CF000-memory.dmp

                          Filesize

                          572KB

                        • memory/2196-145-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/2196-143-0x0000000064940000-0x0000000064959000-memory.dmp

                          Filesize

                          100KB

                        • memory/2196-129-0x000000006B280000-0x000000006B2A6000-memory.dmp

                          Filesize

                          152KB

                        • memory/2196-130-0x0000000000400000-0x000000000051E000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/2400-259-0x000002695A3A0000-0x000002695A411000-memory.dmp

                          Filesize

                          452KB

                        • memory/2432-253-0x00000191CCA70000-0x00000191CCAE1000-memory.dmp

                          Filesize

                          452KB

                        • memory/2616-242-0x0000017417D80000-0x0000017417DF1000-memory.dmp

                          Filesize

                          452KB

                        • memory/2664-284-0x000001FF5F760000-0x000001FF5F7D1000-memory.dmp

                          Filesize

                          452KB

                        • memory/2724-282-0x000001BFD3A00000-0x000001BFD3A71000-memory.dmp

                          Filesize

                          452KB

                        • memory/2752-191-0x0000000002A10000-0x0000000002A11000-memory.dmp

                          Filesize

                          4KB

                        • memory/2752-203-0x0000000007B10000-0x0000000007B11000-memory.dmp

                          Filesize

                          4KB

                        • memory/2752-211-0x0000000002950000-0x0000000002951000-memory.dmp

                          Filesize

                          4KB

                        • memory/2752-181-0x00000000008C0000-0x00000000008C1000-memory.dmp

                          Filesize

                          4KB

                        • memory/2752-197-0x00000000028C0000-0x00000000028D0000-memory.dmp

                          Filesize

                          64KB

                        • memory/2996-296-0x0000000000950000-0x0000000000966000-memory.dmp

                          Filesize

                          88KB

                        • memory/3044-200-0x0000000004810000-0x0000000004841000-memory.dmp

                          Filesize

                          196KB

                        • memory/3044-187-0x0000000004F70000-0x0000000004F71000-memory.dmp

                          Filesize

                          4KB

                        • memory/3044-217-0x0000000004870000-0x0000000004871000-memory.dmp

                          Filesize

                          4KB

                        • memory/3044-175-0x0000000000680000-0x0000000000681000-memory.dmp

                          Filesize

                          4KB

                        • memory/3044-205-0x0000000009640000-0x0000000009641000-memory.dmp

                          Filesize

                          4KB

                        • memory/3044-182-0x0000000000E50000-0x0000000000E51000-memory.dmp

                          Filesize

                          4KB

                        • memory/3680-323-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3928-166-0x0000000000970000-0x0000000000971000-memory.dmp

                          Filesize

                          4KB

                        • memory/3936-196-0x0000000000400000-0x000000000041E000-memory.dmp

                          Filesize

                          120KB

                        • memory/3936-229-0x0000000005370000-0x0000000005371000-memory.dmp

                          Filesize

                          4KB

                        • memory/3936-223-0x0000000005310000-0x0000000005311000-memory.dmp

                          Filesize

                          4KB

                        • memory/3936-243-0x0000000005580000-0x0000000005581000-memory.dmp

                          Filesize

                          4KB

                        • memory/3964-168-0x000000001B470000-0x000000001B472000-memory.dmp

                          Filesize

                          8KB

                        • memory/3964-157-0x00000000008B0000-0x00000000008B1000-memory.dmp

                          Filesize

                          4KB

                        • memory/3964-164-0x0000000000DD0000-0x0000000000DE6000-memory.dmp

                          Filesize

                          88KB

                        • memory/4116-257-0x0000000007750000-0x0000000007751000-memory.dmp

                          Filesize

                          4KB

                        • memory/4116-218-0x00000000077A0000-0x00000000077A1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4116-215-0x0000000007700000-0x0000000007701000-memory.dmp

                          Filesize

                          4KB

                        • memory/4116-201-0x0000000004BA0000-0x0000000004BC4000-memory.dmp

                          Filesize

                          144KB

                        • memory/4116-189-0x0000000000A80000-0x0000000000A81000-memory.dmp

                          Filesize

                          4KB

                        • memory/4116-210-0x0000000007D70000-0x0000000007D71000-memory.dmp

                          Filesize

                          4KB

                        • memory/4168-209-0x0000000004F70000-0x0000000004F71000-memory.dmp

                          Filesize

                          4KB

                        • memory/4168-225-0x00000000026D0000-0x0000000002711000-memory.dmp

                          Filesize

                          260KB

                        • memory/4168-198-0x00000000027D0000-0x00000000027D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4168-193-0x00000000006D0000-0x00000000006D1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4168-232-0x0000000002750000-0x0000000002751000-memory.dmp

                          Filesize

                          4KB

                        • memory/4172-332-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4232-327-0x00000000046F0000-0x0000000004711000-memory.dmp

                          Filesize

                          132KB

                        • memory/4232-330-0x0000000008B00000-0x0000000008B01000-memory.dmp

                          Filesize

                          4KB

                        • memory/4232-331-0x0000000008B02000-0x0000000008B03000-memory.dmp

                          Filesize

                          4KB

                        • memory/4232-335-0x0000000008B04000-0x0000000008B06000-memory.dmp

                          Filesize

                          8KB

                        • memory/4232-334-0x0000000008B03000-0x0000000008B04000-memory.dmp

                          Filesize

                          4KB

                        • memory/4232-333-0x0000000004780000-0x00000000047AF000-memory.dmp

                          Filesize

                          188KB

                        • memory/4232-329-0x0000000000400000-0x00000000043EB000-memory.dmp

                          Filesize

                          63.9MB

                        • memory/4336-231-0x0000000004E5B000-0x0000000004F5C000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4336-247-0x0000000004F90000-0x0000000004FED000-memory.dmp

                          Filesize

                          372KB

                        • memory/4384-321-0x0000000004460000-0x00000000045AA000-memory.dmp

                          Filesize

                          1.3MB

                        • memory/4384-322-0x0000000004A60000-0x0000000004B7B000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4512-300-0x0000024DABBA0000-0x0000024DABBBB000-memory.dmp

                          Filesize

                          108KB

                        • memory/4512-301-0x0000024DAE500000-0x0000024DAE606000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/4512-239-0x0000024DABAA0000-0x0000024DABB11000-memory.dmp

                          Filesize

                          452KB

                        • memory/4512-236-0x0000024DAB910000-0x0000024DAB95C000-memory.dmp

                          Filesize

                          304KB

                        • memory/4540-273-0x0000000004840000-0x0000000004841000-memory.dmp

                          Filesize

                          4KB

                        • memory/4548-326-0x00000000049F0000-0x0000000004A81000-memory.dmp

                          Filesize

                          580KB