Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-08-2021 17:55

General

  • Target

    48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286.exe

  • Size

    140KB

  • MD5

    c9facdcf31e12cfacabdd7a50bc8e4c8

  • SHA1

    eb85d2228cab428c24ef6ccf615e998c29aa7650

  • SHA256

    48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286

  • SHA512

    d03166813301e05e88dc8b7a0604ea59f243d551b2d8b034075d1de4c79f3b8b2009ad96e7bd301a6e9d75bdea9036d1c4a74ace43e2e5ca549119c50c023c29

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 590$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? [email protected] TELEGRAM @ payfast290 Your personal ID: 83E-C4A-B39 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

95.217.117.91:21361

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286.exe
    "C:\Users\Admin\AppData\Local\Temp\48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Users\Admin\AppData\Local\Temp\48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286.exe
      "C:\Users\Admin\AppData\Local\Temp\48d81158ea4d8260ab5c9743eb37e81d184eecd48f5747a26f1689cc4bb0b286.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:3300
  • C:\Users\Admin\AppData\Local\Temp\83E.exe
    C:\Users\Admin\AppData\Local\Temp\83E.exe
    1⤵
    • Executes dropped EXE
    PID:1216
  • C:\Users\Admin\AppData\Local\Temp\8FB.exe
    C:\Users\Admin\AppData\Local\Temp\8FB.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
          PID:3744
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3872
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
          3⤵
            PID:580
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:3888
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
                PID:1540
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin delete shadows /all /quiet
                  4⤵
                  • Interacts with shadow copies
                  PID:3956
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 0
                3⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                PID:2844
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                3⤵
                  PID:2532
            • C:\Users\Admin\AppData\Local\Temp\DED.exe
              C:\Users\Admin\AppData\Local\Temp\DED.exe
              1⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              PID:2164
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:1104
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:3692
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3836
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:3180
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3880
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3960
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:1300
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                              PID:1796
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              1⤵
                                PID:1548
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1124
                              • C:\Windows\system32\vssvc.exe
                                C:\Windows\system32\vssvc.exe
                                1⤵
                                  PID:2864

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                  MD5

                                  5703edef7cb0f99305a6b18845e0443e

                                  SHA1

                                  fb6f022ebde210306e1a6575462d6451e98af454

                                  SHA256

                                  e4ce02059eb175c30879041d610db7b8798cdf57a4c67afc83c125c2db36e883

                                  SHA512

                                  4631853bda1498ff3cace6a348fd2d6770edd0fec166707c3afebff09644f34e29a7a6dd3e9cb167c40e8b5fa1fbbc80ba26d80b4d939daf56278c276b07ada4

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                  MD5

                                  888f7457c332ac5e1897316e159f58c1

                                  SHA1

                                  a3047c6e978158dfae29b5735e8131ec1b30703d

                                  SHA256

                                  c2c14652875bfeb1ed529202da6d45eb974acab193c005908cf90b8c5cf3dd41

                                  SHA512

                                  0abdc5f78ade2f56b0f1954adc0479b5dcc88d401bfac95754e7dd80adefe7375a426fd89f81b657ebe9c113092524dcbd1e80c39a4bec51ccd93bc0bc3a5aff

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                  MD5

                                  939460925953ce88e1086341b8a11bda

                                  SHA1

                                  06249b891050a9fac128ccfee943aeb5bede1c7b

                                  SHA256

                                  d4da3c5ff04a3b677eb77b1bfedc14e29ebd0d01c476d44a0b1a2366447ab016

                                  SHA512

                                  a8dc3eb58a4a550cc2551463a3d813396caf3f2b65f5b13c8e339a4a32652895ee15c23eb5ba833eca4e7c22331a622657cf5bd64098f0c54e43b4e92fe65f30

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                  MD5

                                  f68deee7f4563777db6716cbafaaa1c9

                                  SHA1

                                  fe831dfff5910e16eaa0c4dd186e38a75e94635b

                                  SHA256

                                  eb9ee58f723fdd77a413269bf2d0b268aa18476d3ac26a13d934f2298087c68f

                                  SHA512

                                  2b042e1bca90dd33848424a68343ab6dc498e0f30215fb6a81852a6f29722d49204e088f8220c86490defef5f15d8e36e7bac94785cb003f9cbc0e8e8b0795c8

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                  MD5

                                  b499c334a45544c71f82bae205519a39

                                  SHA1

                                  b8b11c0fc712f18611ed477ccbc5d3768dd4d68a

                                  SHA256

                                  ceb07d803dadfc50cce4861570bd3966b0bf0935e6f21a9e2ae18a6f416b8a97

                                  SHA512

                                  dcd435036ff33653aa002c4a4a0692cc663a30b5b4e8170610573f722fa17ddd9281da455f8b13140a0b66ab1abdfdb5c327a0c83ea1a9a6c90a20fc0075bfe5

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                  MD5

                                  d1cae9e4b78de40ef8cd32ab87b40684

                                  SHA1

                                  812735eca784f38ecae57dac4d65f42f20315000

                                  SHA256

                                  8ecfcda581332a45f3fabe6fa83cbf576991f78407b58ac41e1f07cb3feb6451

                                  SHA512

                                  ac0733e84550c01ddd033f443e7329d9503c32b0df05f4b8e8c60d49fa546f7458b5476b910e2aa140ae7f1855b299c2e51c081109978e903b434ee6c68d1a8c

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\XFH4EEJ2.htm

                                  MD5

                                  b1cd7c031debba3a5c77b39b6791c1a7

                                  SHA1

                                  e5d91e14e9c685b06f00e550d9e189deb2075f76

                                  SHA256

                                  57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                  SHA512

                                  d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                • C:\Users\Admin\AppData\Local\Temp\83E.exe

                                  MD5

                                  90a4117c429afee1aeebc7588c4d3ea5

                                  SHA1

                                  25a2cfd6c0b66c3b5b2b3125d771824bdafe3138

                                  SHA256

                                  883486f3967d164f35a1760ae98fd10b7023c31afcf7388b82e11132816db603

                                  SHA512

                                  ed4f02aaa0b8035bb9ec068b33f5e6e24a66a98649a00f748f37ca9e13d283c6641c7cb7f20dde009b14841bd4eaedd3c1caef261bfe31cf5ce4dad63b11d933

                                • C:\Users\Admin\AppData\Local\Temp\83E.exe

                                  MD5

                                  90a4117c429afee1aeebc7588c4d3ea5

                                  SHA1

                                  25a2cfd6c0b66c3b5b2b3125d771824bdafe3138

                                  SHA256

                                  883486f3967d164f35a1760ae98fd10b7023c31afcf7388b82e11132816db603

                                  SHA512

                                  ed4f02aaa0b8035bb9ec068b33f5e6e24a66a98649a00f748f37ca9e13d283c6641c7cb7f20dde009b14841bd4eaedd3c1caef261bfe31cf5ce4dad63b11d933

                                • C:\Users\Admin\AppData\Local\Temp\8FB.exe

                                  MD5

                                  e70ceaf1fc7771d3d791aedc0c2068a7

                                  SHA1

                                  97912679527c910bdf4c97265656f4c2527245db

                                  SHA256

                                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                  SHA512

                                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                • C:\Users\Admin\AppData\Local\Temp\8FB.exe

                                  MD5

                                  e70ceaf1fc7771d3d791aedc0c2068a7

                                  SHA1

                                  97912679527c910bdf4c97265656f4c2527245db

                                  SHA256

                                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                  SHA512

                                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                • C:\Users\Admin\AppData\Local\Temp\DED.exe

                                  MD5

                                  146018469ce8690f4da893e0269a1ae7

                                  SHA1

                                  94ec664dff33827c42cce634dea676b56e4cfb89

                                  SHA256

                                  01c0aadd0d9b47985b070d6ab49bc0e7977c632a3c5843efe249a6586f951e09

                                  SHA512

                                  8a03bd9719f39f6f99a1f522783cda64680609602c8571dd664c10d73f6336a09ddc3d3d242a1b6f7183f21766b6529a2ea2dd7d6ff54eab07dbe418dfc0c0f4

                                • C:\Users\Admin\AppData\Local\Temp\DED.exe

                                  MD5

                                  146018469ce8690f4da893e0269a1ae7

                                  SHA1

                                  94ec664dff33827c42cce634dea676b56e4cfb89

                                  SHA256

                                  01c0aadd0d9b47985b070d6ab49bc0e7977c632a3c5843efe249a6586f951e09

                                  SHA512

                                  8a03bd9719f39f6f99a1f522783cda64680609602c8571dd664c10d73f6336a09ddc3d3d242a1b6f7183f21766b6529a2ea2dd7d6ff54eab07dbe418dfc0c0f4

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                  MD5

                                  e70ceaf1fc7771d3d791aedc0c2068a7

                                  SHA1

                                  97912679527c910bdf4c97265656f4c2527245db

                                  SHA256

                                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                  SHA512

                                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                  MD5

                                  e70ceaf1fc7771d3d791aedc0c2068a7

                                  SHA1

                                  97912679527c910bdf4c97265656f4c2527245db

                                  SHA256

                                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                  SHA512

                                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                  MD5

                                  e70ceaf1fc7771d3d791aedc0c2068a7

                                  SHA1

                                  97912679527c910bdf4c97265656f4c2527245db

                                  SHA256

                                  0e7b9aae7306cdb8cca2a7fa6552fd6cd03f3e2ab2e2d4ae51dfe325ff2016e5

                                  SHA512

                                  6a4c8a424e87f4a622aa20e4fd37060919cf686c32c0432eea026c12af372ffc6714c6baff46d0590a78fddf62ea7ca3eac3240846e1781d090d3867cfc2cd58

                                • memory/580-192-0x0000000000000000-mapping.dmp

                                • memory/740-116-0x0000000001D70000-0x0000000001E1E000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/1104-126-0x0000000000000000-mapping.dmp

                                • memory/1104-129-0x0000000000680000-0x00000000006F4000-memory.dmp

                                  Filesize

                                  464KB

                                • memory/1104-131-0x0000000000610000-0x000000000067B000-memory.dmp

                                  Filesize

                                  428KB

                                • memory/1216-174-0x0000000007060000-0x0000000007061000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-154-0x0000000003D60000-0x0000000003D7E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/1216-162-0x0000000006540000-0x0000000006541000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-163-0x0000000006542000-0x0000000006543000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-161-0x0000000006A50000-0x0000000006A51000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-153-0x0000000006550000-0x0000000006551000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-167-0x0000000006360000-0x0000000006361000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-151-0x0000000003B70000-0x0000000003B8F000-memory.dmp

                                  Filesize

                                  124KB

                                • memory/1216-168-0x0000000006390000-0x0000000006391000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-170-0x00000000064A0000-0x00000000064A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-173-0x0000000006544000-0x0000000006546000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1216-146-0x0000000001D90000-0x0000000001EDA000-memory.dmp

                                  Filesize

                                  1.3MB

                                • memory/1216-147-0x0000000000400000-0x0000000001D89000-memory.dmp

                                  Filesize

                                  25.5MB

                                • memory/1216-164-0x0000000006543000-0x0000000006544000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1216-118-0x0000000000000000-mapping.dmp

                                • memory/1300-166-0x00000000009C0000-0x00000000009C9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1300-152-0x0000000000000000-mapping.dmp

                                • memory/1300-165-0x00000000009D0000-0x00000000009D4000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/1540-195-0x0000000000000000-mapping.dmp

                                • memory/1548-175-0x0000000000000000-mapping.dmp

                                • memory/1548-177-0x0000000001100000-0x0000000001109000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1548-176-0x0000000001110000-0x0000000001115000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/1796-169-0x0000000000000000-mapping.dmp

                                • memory/1796-172-0x0000000000FA0000-0x0000000000FA9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1796-171-0x0000000000FB0000-0x0000000000FB5000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/2164-198-0x0000000007820000-0x0000000007821000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-189-0x0000000007C30000-0x0000000007C31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-180-0x0000000001100000-0x0000000001101000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-178-0x0000000077D80000-0x0000000077F0E000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/2164-187-0x0000000005A60000-0x0000000006066000-memory.dmp

                                  Filesize

                                  6.0MB

                                • memory/2164-188-0x0000000007530000-0x0000000007531000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-202-0x0000000007500000-0x0000000007501000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-190-0x0000000007700000-0x0000000007701000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2164-124-0x0000000000000000-mapping.dmp

                                • memory/2164-203-0x0000000008160000-0x0000000008161000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2532-193-0x0000000000000000-mapping.dmp

                                • memory/2536-117-0x0000000000710000-0x0000000000726000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/2844-196-0x0000000000000000-mapping.dmp

                                • memory/3180-136-0x0000000000000000-mapping.dmp

                                • memory/3180-137-0x0000000000330000-0x0000000000339000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3180-138-0x0000000000320000-0x000000000032F000-memory.dmp

                                  Filesize

                                  60KB

                                • memory/3300-114-0x0000000000400000-0x0000000000409000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3300-115-0x0000000000402FAB-mapping.dmp

                                • memory/3692-130-0x0000000000BC0000-0x0000000000BC7000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/3692-128-0x0000000000000000-mapping.dmp

                                • memory/3692-132-0x0000000000BB0000-0x0000000000BBC000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/3744-191-0x0000000000000000-mapping.dmp

                                • memory/3836-135-0x0000000000570000-0x000000000057B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/3836-133-0x0000000000000000-mapping.dmp

                                • memory/3836-134-0x0000000000580000-0x0000000000587000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/3872-201-0x0000000000000000-mapping.dmp

                                • memory/3880-140-0x0000000000180000-0x0000000000185000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3880-139-0x0000000000000000-mapping.dmp

                                • memory/3880-141-0x0000000000170000-0x0000000000179000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3888-194-0x0000000000000000-mapping.dmp

                                • memory/3908-121-0x0000000000000000-mapping.dmp

                                • memory/3956-200-0x0000000000000000-mapping.dmp

                                • memory/3960-149-0x00000000009E0000-0x00000000009EC000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/3960-142-0x0000000000000000-mapping.dmp

                                • memory/3960-148-0x00000000009F0000-0x00000000009F6000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/4024-143-0x0000000000000000-mapping.dmp