Analysis

  • max time kernel
    146s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    24-08-2021 07:27

General

  • Target

    eb7b5911cfc0a95a5066f39ed22aee0a.exe

  • Size

    150KB

  • MD5

    eb7b5911cfc0a95a5066f39ed22aee0a

  • SHA1

    afadeda0c47ebf866bc55fc6b78d69d475d5f333

  • SHA256

    67ebaa4e613b155a8584614552de369a48d854f8b38e9c6f6319d71f287ea0f9

  • SHA512

    c2b29799397f485edcbe2180ef3b11b35296f84774aba2ed0752e7e883f1de824b406b285cd44beb10bf061d37a3107d2015b2b37e0ad66373dc50bbc24442fe

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

40.1

Botnet

824

C2

https://eduarroma.tumblr.com/

Attributes
  • profile_id

    824

Extracted

Family

redline

Botnet

@Rarenut0

C2

185.230.143.48:14462

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb7b5911cfc0a95a5066f39ed22aee0a.exe
    "C:\Users\Admin\AppData\Local\Temp\eb7b5911cfc0a95a5066f39ed22aee0a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Local\Temp\eb7b5911cfc0a95a5066f39ed22aee0a.exe
      "C:\Users\Admin\AppData\Local\Temp\eb7b5911cfc0a95a5066f39ed22aee0a.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1448
  • C:\Users\Admin\AppData\Local\Temp\E9A4.exe
    C:\Users\Admin\AppData\Local\Temp\E9A4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:756
  • C:\Users\Admin\AppData\Local\Temp\EACD.exe
    C:\Users\Admin\AppData\Local\Temp\EACD.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:568
  • C:\Users\Admin\AppData\Local\Temp\EC73.exe
    C:\Users\Admin\AppData\Local\Temp\EC73.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:576
  • C:\Users\Admin\AppData\Local\Temp\ED3F.exe
    C:\Users\Admin\AppData\Local\Temp\ED3F.exe
    1⤵
    • Executes dropped EXE
    PID:1840
  • C:\Users\Admin\AppData\Local\Temp\F5A9.exe
    C:\Users\Admin\AppData\Local\Temp\F5A9.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:968
  • C:\Users\Admin\AppData\Local\Temp\F971.exe
    C:\Users\Admin\AppData\Local\Temp\F971.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1504
  • C:\Users\Admin\AppData\Local\Temp\FB08.exe
    C:\Users\Admin\AppData\Local\Temp\FB08.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\nvikbudg\
      2⤵
        PID:1912
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\fssqpqdd.exe" C:\Windows\SysWOW64\nvikbudg\
        2⤵
          PID:564
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create nvikbudg binPath= "C:\Windows\SysWOW64\nvikbudg\fssqpqdd.exe /d\"C:\Users\Admin\AppData\Local\Temp\FB08.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1532
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description nvikbudg "wifi internet conection"
            2⤵
              PID:2012
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start nvikbudg
              2⤵
                PID:1992
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1644
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:924
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:2024
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:1640
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1744
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:1048
                        • C:\Windows\SysWOW64\nvikbudg\fssqpqdd.exe
                          C:\Windows\SysWOW64\nvikbudg\fssqpqdd.exe /d"C:\Users\Admin\AppData\Local\Temp\FB08.exe"
                          1⤵
                            PID:1656
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              2⤵
                                PID:1652
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              1⤵
                                PID:1456

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Persistence

                              New Service

                              1
                              T1050

                              Modify Existing Service

                              1
                              T1031

                              Privilege Escalation

                              New Service

                              1
                              T1050

                              Defense Evasion

                              Virtualization/Sandbox Evasion

                              1
                              T1497

                              Install Root Certificate

                              1
                              T1130

                              Modify Registry

                              1
                              T1112

                              Credential Access

                              Credentials in Files

                              1
                              T1081

                              Discovery

                              Query Registry

                              3
                              T1012

                              Virtualization/Sandbox Evasion

                              1
                              T1497

                              System Information Discovery

                              4
                              T1082

                              Peripheral Device Discovery

                              1
                              T1120

                              Collection

                              Data from Local System

                              1
                              T1005

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\E9A4.exe
                                MD5

                                a69e12607d01237460808fa1709e5e86

                                SHA1

                                4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                                SHA256

                                188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                                SHA512

                                7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                              • C:\Users\Admin\AppData\Local\Temp\EACD.exe
                                MD5

                                01ff144b49f948b06c93a24f6924afd9

                                SHA1

                                bb44f0dd41b0a971d0cc1c1b4069ce802f79e73d

                                SHA256

                                106f44512e66537d4e5f1b0b08c561951882eb3bdf5e648cebb4c5a9a2ba3c8a

                                SHA512

                                3a37b3b38d56c1eedb25f510fff5192aacb3be5a99b439d254a3b6f15e6d016c2686c8c72d82aa383147f4d0dbbdb1bbf9f4464c2013f5ca47a67327e12c4286

                              • C:\Users\Admin\AppData\Local\Temp\EC73.exe
                                MD5

                                68d5331a8418c4089bb7c0f524c77728

                                SHA1

                                9ff36fb8f4132b44af8483bf6ca8ce82b9be8236

                                SHA256

                                6004220aa5d81f1b80c49ca0e18f8332292ae4e2b09898469c04cf96460359b1

                                SHA512

                                ba859c3d25a4bf4c321e9869f147800c6767ae9b51cf145317f83eb25d7d66adfedaafb668a312b9ffd15f05f076efe309abf11f7be21cd1ffd5b7920b797a2f

                              • C:\Users\Admin\AppData\Local\Temp\EC73.exe
                                MD5

                                68d5331a8418c4089bb7c0f524c77728

                                SHA1

                                9ff36fb8f4132b44af8483bf6ca8ce82b9be8236

                                SHA256

                                6004220aa5d81f1b80c49ca0e18f8332292ae4e2b09898469c04cf96460359b1

                                SHA512

                                ba859c3d25a4bf4c321e9869f147800c6767ae9b51cf145317f83eb25d7d66adfedaafb668a312b9ffd15f05f076efe309abf11f7be21cd1ffd5b7920b797a2f

                              • C:\Users\Admin\AppData\Local\Temp\ED3F.exe
                                MD5

                                bf40705cba9708182b61956985895005

                                SHA1

                                174c659e0d225b1ea0eb5a7e8d30911d17ad06a4

                                SHA256

                                6325c9ffbedd8d4a4d676d6dc5e790e6d99a65f1e3c621df7ec275ab7b047565

                                SHA512

                                f01c4764675238503776b00b0b72e0727c531908499043b4043029f495dc2f8c19db281c98ec00fdc74e5a67ecfbc7f04a2c10fefb0ba03e5d28b9d8de292600

                              • C:\Users\Admin\AppData\Local\Temp\F5A9.exe
                                MD5

                                9aa6dd10e0bfb49baa17f04f44b9dcd3

                                SHA1

                                09ad5a6ae8a6396e7bdf783cd124417cd7515c7a

                                SHA256

                                a07cf8a0e1fadc8ab20dbe35341f1febb3a0b2e42c8f5991c0cc397b130d7621

                                SHA512

                                601f36f703ee396dba325349aa25440270c1cee6e069146c1ed7f03e96fe5fc30dead138e7f3b713549b815635e64aa97a10054e71a415690e622c417bbfbb4d

                              • C:\Users\Admin\AppData\Local\Temp\F971.exe
                                MD5

                                59c5becf1794c98cbe8da8e501f55da5

                                SHA1

                                e6ce9bb8ac54cc504f93e8dba8632d09d653d986

                                SHA256

                                dd0c4b523a427f5e2ea23d010d114e7fe32392768ed0e43c0b61de0d5584ae17

                                SHA512

                                3e23f98583e71e79f511b32b8281abe72aae426111929de195ca4f8949b9cf169e0d74fd2eebf91e92b323cc3e8de3fad55ca370fc2694f1bc2a9ffc8e4e7455

                              • C:\Users\Admin\AppData\Local\Temp\FB08.exe
                                MD5

                                dbcb6648538148af9e93dc2d1e1aaab5

                                SHA1

                                0069f5233f6fac388829a9cac40f44bef6f91d6c

                                SHA256

                                afc3a8e66189c025e075512800be3d4dac3ba03afb5d6fe3b8bd56aa59c941f5

                                SHA512

                                bf571eccd9258280f48763e0d4a21f6c8ca7569cc226fb3ee5d7ce51a28be14925557505773063b151f0faedd0fa07980a940983f168e1340615ebc674abe16d

                              • C:\Users\Admin\AppData\Local\Temp\FB08.exe
                                MD5

                                dbcb6648538148af9e93dc2d1e1aaab5

                                SHA1

                                0069f5233f6fac388829a9cac40f44bef6f91d6c

                                SHA256

                                afc3a8e66189c025e075512800be3d4dac3ba03afb5d6fe3b8bd56aa59c941f5

                                SHA512

                                bf571eccd9258280f48763e0d4a21f6c8ca7569cc226fb3ee5d7ce51a28be14925557505773063b151f0faedd0fa07980a940983f168e1340615ebc674abe16d

                              • C:\Users\Admin\AppData\Local\Temp\fssqpqdd.exe
                                MD5

                                c439c55c1fb3fca789329fd9467eff5b

                                SHA1

                                1ceb3ecba4169af6f174b44cdad10493c1869a31

                                SHA256

                                a2cf6d0974221c12e8dfca73d4d1b44add5a549f1a86f35f77f239af0a8d7f38

                                SHA512

                                fa94751465d76bdbacb8243fe2c31eec65bf8b2a81433d7ad9ee0eaad0125503e344779b55b1e1c985ca7be4b328a8a879e555b14701d16692a091b63ef66b39

                              • C:\Windows\SysWOW64\nvikbudg\fssqpqdd.exe
                                MD5

                                e24e196047a46a52eab792b226157d88

                                SHA1

                                d888ad917bee207d5f8765d05c94bb4cead13ed5

                                SHA256

                                1ba8b38ddfa8806d55db1b169512510dc68dafa48bb8644df9882850345c5206

                                SHA512

                                854488778e56726372e1187b050dd95a354ed5ffc192f36a8991b8da9a5884df31fddb326b1b1930fe875e92e038478f267a4afcdeb0a0132ef144f7fa3575da

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\freebl3.dll
                                MD5

                                60acd24430204ad2dc7f148b8cfe9bdc

                                SHA1

                                989f377b9117d7cb21cbe92a4117f88f9c7693d9

                                SHA256

                                9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                                SHA512

                                626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\mozglue.dll
                                MD5

                                eae9273f8cdcf9321c6c37c244773139

                                SHA1

                                8378e2a2f3635574c106eea8419b5eb00b8489b0

                                SHA256

                                a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                                SHA512

                                06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\msvcp140.dll
                                MD5

                                109f0f02fd37c84bfc7508d4227d7ed5

                                SHA1

                                ef7420141bb15ac334d3964082361a460bfdb975

                                SHA256

                                334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                                SHA512

                                46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\nss3.dll
                                MD5

                                02cc7b8ee30056d5912de54f1bdfc219

                                SHA1

                                a6923da95705fb81e368ae48f93d28522ef552fb

                                SHA256

                                1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                                SHA512

                                0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\softokn3.dll
                                MD5

                                4e8df049f3459fa94ab6ad387f3561ac

                                SHA1

                                06ed392bc29ad9d5fc05ee254c2625fd65925114

                                SHA256

                                25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                                SHA512

                                3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                              • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\vcruntime140.dll
                                MD5

                                7587bf9cb4147022cd5681b015183046

                                SHA1

                                f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                                SHA256

                                c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                                SHA512

                                0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                              • \Users\Admin\AppData\LocalLow\sqlite3.dll
                                MD5

                                f964811b68f9f1487c2b41e1aef576ce

                                SHA1

                                b423959793f14b1416bc3b7051bed58a1034025f

                                SHA256

                                83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                                SHA512

                                565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                              • \Users\Admin\AppData\Local\Temp\876504d2-be03-42d9-b2f9-6ed891d3a9d2\ .dll
                                MD5

                                e8641f344213ca05d8b5264b5f4e2dee

                                SHA1

                                96729e31f9b805800b2248fd22a4b53e226c8309

                                SHA256

                                85e82b9e9200e798e8f434459eacee03ed9818cc6c9a513fe083e72d48884e24

                                SHA512

                                3130f32c100ecb97083ad8ac4c67863e9ceed3a9b06fc464d1aeeaec389f74c8bf56f4ce04f6450fd2cc0fa861d085101c433cfa4bec3095f8ebeeb53b739109

                              • memory/564-115-0x0000000000000000-mapping.dmp
                              • memory/568-81-0x0000000000330000-0x00000000003BF000-memory.dmp
                                Filesize

                                572KB

                              • memory/568-87-0x0000000000400000-0x0000000002CFA000-memory.dmp
                                Filesize

                                41.0MB

                              • memory/568-69-0x0000000000000000-mapping.dmp
                              • memory/576-74-0x0000000000230000-0x0000000000231000-memory.dmp
                                Filesize

                                4KB

                              • memory/576-80-0x000000001A580000-0x000000001A582000-memory.dmp
                                Filesize

                                8KB

                              • memory/576-71-0x0000000000000000-mapping.dmp
                              • memory/576-77-0x000007FEF3C30000-0x000007FEF3D5C000-memory.dmp
                                Filesize

                                1.2MB

                              • memory/576-112-0x0000000000530000-0x000000000054B000-memory.dmp
                                Filesize

                                108KB

                              • memory/756-65-0x0000000000000000-mapping.dmp
                              • memory/924-98-0x0000000000000000-mapping.dmp
                              • memory/924-104-0x00000000739C1000-0x00000000739C3000-memory.dmp
                                Filesize

                                8KB

                              • memory/924-106-0x0000000000190000-0x0000000000204000-memory.dmp
                                Filesize

                                464KB

                              • memory/924-107-0x0000000000080000-0x00000000000EB000-memory.dmp
                                Filesize

                                428KB

                              • memory/952-121-0x0000000000400000-0x0000000002CB9000-memory.dmp
                                Filesize

                                40.7MB

                              • memory/952-93-0x0000000000000000-mapping.dmp
                              • memory/952-110-0x0000000000220000-0x0000000000233000-memory.dmp
                                Filesize

                                76KB

                              • memory/968-96-0x0000000000F00000-0x0000000000F01000-memory.dmp
                                Filesize

                                4KB

                              • memory/968-109-0x0000000005100000-0x0000000005101000-memory.dmp
                                Filesize

                                4KB

                              • memory/968-84-0x0000000000000000-mapping.dmp
                              • memory/1048-144-0x0000000000080000-0x0000000000089000-memory.dmp
                                Filesize

                                36KB

                              • memory/1048-143-0x0000000000090000-0x0000000000095000-memory.dmp
                                Filesize

                                20KB

                              • memory/1048-137-0x0000000000000000-mapping.dmp
                              • memory/1220-64-0x00000000029D0000-0x00000000029E6000-memory.dmp
                                Filesize

                                88KB

                              • memory/1448-61-0x0000000000402FAB-mapping.dmp
                              • memory/1448-62-0x0000000075631000-0x0000000075633000-memory.dmp
                                Filesize

                                8KB

                              • memory/1448-60-0x0000000000400000-0x0000000000409000-memory.dmp
                                Filesize

                                36KB

                              • memory/1456-145-0x0000000000000000-mapping.dmp
                              • memory/1504-101-0x0000000001220000-0x0000000001221000-memory.dmp
                                Filesize

                                4KB

                              • memory/1504-91-0x0000000000000000-mapping.dmp
                              • memory/1504-108-0x0000000005220000-0x0000000005221000-memory.dmp
                                Filesize

                                4KB

                              • memory/1532-123-0x0000000000000000-mapping.dmp
                              • memory/1640-122-0x0000000071EB1000-0x0000000071EB3000-memory.dmp
                                Filesize

                                8KB

                              • memory/1640-118-0x0000000000000000-mapping.dmp
                              • memory/1640-130-0x0000000000080000-0x000000000008B000-memory.dmp
                                Filesize

                                44KB

                              • memory/1640-129-0x0000000000090000-0x0000000000097000-memory.dmp
                                Filesize

                                28KB

                              • memory/1644-141-0x0000000000000000-mapping.dmp
                              • memory/1652-147-0x0000000000089A6B-mapping.dmp
                              • memory/1652-146-0x0000000000080000-0x0000000000095000-memory.dmp
                                Filesize

                                84KB

                              • memory/1744-131-0x0000000000070000-0x0000000000079000-memory.dmp
                                Filesize

                                36KB

                              • memory/1744-133-0x0000000000060000-0x000000000006F000-memory.dmp
                                Filesize

                                60KB

                              • memory/1744-127-0x0000000000000000-mapping.dmp
                              • memory/1824-63-0x0000000000220000-0x000000000022A000-memory.dmp
                                Filesize

                                40KB

                              • memory/1840-79-0x0000000000000000-mapping.dmp
                              • memory/1840-89-0x0000000000400000-0x0000000002402000-memory.dmp
                                Filesize

                                32.0MB

                              • memory/1840-88-0x0000000002670000-0x000000000270D000-memory.dmp
                                Filesize

                                628KB

                              • memory/1912-114-0x0000000000000000-mapping.dmp
                              • memory/1992-136-0x0000000000000000-mapping.dmp
                              • memory/2012-132-0x0000000000000000-mapping.dmp
                              • memory/2024-117-0x0000000000070000-0x0000000000077000-memory.dmp
                                Filesize

                                28KB

                              • memory/2024-111-0x0000000000000000-mapping.dmp
                              • memory/2024-119-0x0000000000060000-0x000000000006C000-memory.dmp
                                Filesize

                                48KB