Analysis

  • max time kernel
    153s
  • max time network
    185s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    31-08-2021 12:53

General

  • Target

    bb7bb6a1db8768a0ab5bb4cf85f9a1aa.exe

  • Size

    234KB

  • MD5

    bb7bb6a1db8768a0ab5bb4cf85f9a1aa

  • SHA1

    20b76c0f2f987cb5974cd07eaa303c344703bcf7

  • SHA256

    8b00d26012b7c13819459fa567024ca068fed3aa0c0539c63ae73ebb00bca9a2

  • SHA512

    9a120461e3b37e1ec5d2986f1ac7cc224de3f7360432b1f8897782c6ae8783d8bd8152f1144781f460d80567827b1b3e4b66d1b91203d005224d53791407f394

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

fe582536ec580228180f270f7cb80a867860e010

Attributes
  • url4cnc

    https://telete.in/xylichanjk

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb7bb6a1db8768a0ab5bb4cf85f9a1aa.exe
    "C:\Users\Admin\AppData\Local\Temp\bb7bb6a1db8768a0ab5bb4cf85f9a1aa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\bb7bb6a1db8768a0ab5bb4cf85f9a1aa.exe
      "C:\Users\Admin\AppData\Local\Temp\bb7bb6a1db8768a0ab5bb4cf85f9a1aa.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2032
  • C:\Users\Admin\AppData\Local\Temp\AE2A.exe
    C:\Users\Admin\AppData\Local\Temp\AE2A.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:616
  • C:\Users\Admin\AppData\Local\Temp\AF24.exe
    C:\Users\Admin\AppData\Local\Temp\AF24.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system certificate store
    PID:584
  • C:\Users\Admin\AppData\Local\Temp\408.exe
    C:\Users\Admin\AppData\Local\Temp\408.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:904
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe" -start
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1812
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
        PID:1796
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:896
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:1380
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:1736
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:1684
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:2028
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:1572
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:1976
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:1316
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:1088

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                        MD5

                        bc382383b6c90d20dba3f58aa0f40ade

                        SHA1

                        b626e4d049d88702236910b302c955eecc8c7d5f

                        SHA256

                        bf25937b534e738f02e5ec01592dd9a72d79e67bc32f3a5e157a0608f5bbd117

                        SHA512

                        651e85acf56ec7bffdc10941ba3bcebea5aede44d479e4db5d61160de2b975c484499a95564adaf90f350d6a1bf3aa97774019f1464045114cbb97806fc76c2f

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                        MD5

                        a2981517afbb3ebe48d2168b07274f47

                        SHA1

                        78e0fa382ca97436ec5c43209a2e391b41d356ab

                        SHA256

                        f5ef795d1577213ce930034afc93387232cc95dfe53db40db0ed65fbb44bcfae

                        SHA512

                        4e939a2270036ebf0eaec96ba231eb38cb4e2389064a30e5f3b9e5e5581d363ab934431e69978e015f25f3352d17e3b3242d02357aa034838a94912fa8d6ba15

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                        MD5

                        2902de11e30dcc620b184e3bb0f0c1cb

                        SHA1

                        5d11d14a2558801a2688dc2d6dfad39ac294f222

                        SHA256

                        e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544

                        SHA512

                        efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                        MD5

                        0465994d32988b4ff5811340c4905188

                        SHA1

                        7b4043cbd9509bc78b08863ad22b720632686785

                        SHA256

                        b33b95c79ca7fc2da4e43282f29ec14db42bdafd53c8888de793cea52caa20bb

                        SHA512

                        04654263a6391c84e0fd230a992dbd107f905599a066d124055591ce19a9d74b61627bb9d4dc9df89f396b12f795b649f0331e4aad39304a5ad0e0bccc36ad43

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                        MD5

                        8ba7ca46f4eedbdcceb1f8543b38d77a

                        SHA1

                        554d1c4d204959a1c4eaa6e1a71eb46c680bc488

                        SHA256

                        dc81828d88cf57b9640b0a728769fa6e6e4c49f0c27c7ed51c972d186f63bf70

                        SHA512

                        97b16373e05772eeb67f9c4f6cc75d90f77c09ff6fb110abeb13871bd2c6c2cecc1b06a1295a564ff01b4ed4a3eecd2334cc3a3d062be6756b2164c34968d6cb

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                        MD5

                        bfa0db32e755599f088616b983f50d64

                        SHA1

                        476eb2694731bd96712612f09ca8778ffcc76342

                        SHA256

                        aab5c93f95092f0bb9466d50080aadb0a5a12e8bfdf97d2892809b7d78203d8e

                        SHA512

                        e97aa2e58c76c1b57095a6f59d88e4da7e8f4c0a35caaf2a91bd57dcce5e29f3afcbab17d82d80f07cede65b2274716595a0430d9ae749aae3c1db855d3f52ba

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        MD5

                        4c613811b600dc8dfae7777a0f7aaede

                        SHA1

                        cb943b056210dde6d0d503797a9b2d810b24ac96

                        SHA256

                        4283f146b12c868323ffaf4b205e34d4c67b244af5c2164aedc3f933cbb96a8a

                        SHA512

                        0031e2c398a2ac6fba62e15afdea2339f41c9c03e141993c390798a5b390b76f41518f1a9aabedac17e4a5044767b2ae43a5e5fa1746ce0f630532c0cddcb7eb

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                        MD5

                        2cd3bc424bffd83c2b20082037111ffc

                        SHA1

                        e284c21789dc7e7e7e34826e2ff4027443e0a62f

                        SHA256

                        e6deb1897bcd21dbe7421c7d074ebf9053fd55d57601f203a93cd9aed9b419fe

                        SHA512

                        79e42f783917ce72ae7d0f60cedc4dc29cb981c7c8e4248d3e9f0a1299204d7d5203b2e997b500ca863bc0ef39f79fe169ab4e932a7a68b66efcd73bc4f1f735

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D4X32ZLU\WD2I9418.htm

                        MD5

                        8615e70875c2cc0b9db16027b9adf11d

                        SHA1

                        4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

                        SHA256

                        da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

                        SHA512

                        cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L1Y3K90W\WVBRFXJE.htm

                        MD5

                        b1cd7c031debba3a5c77b39b6791c1a7

                        SHA1

                        e5d91e14e9c685b06f00e550d9e189deb2075f76

                        SHA256

                        57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                        SHA512

                        d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                      • C:\Users\Admin\AppData\Local\Temp\408.exe

                        MD5

                        bdfde890a781bf135e6eb4339ff9424f

                        SHA1

                        a5bfca4601242d3ff52962432efb15ab9202217f

                        SHA256

                        b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                        SHA512

                        7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                      • C:\Users\Admin\AppData\Local\Temp\408.exe

                        MD5

                        bdfde890a781bf135e6eb4339ff9424f

                        SHA1

                        a5bfca4601242d3ff52962432efb15ab9202217f

                        SHA256

                        b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                        SHA512

                        7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                      • C:\Users\Admin\AppData\Local\Temp\AE2A.exe

                        MD5

                        a69e12607d01237460808fa1709e5e86

                        SHA1

                        4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                        SHA256

                        188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                        SHA512

                        7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                      • C:\Users\Admin\AppData\Local\Temp\AF24.exe

                        MD5

                        f52e01c8df6f5fd0a097e77ada54cb76

                        SHA1

                        3dfe423233006adfee17956c02cf39ca62ce7224

                        SHA256

                        4b81258bd67a304cfaafe0f8cb22b2e1c6f565519a772ef59a15f361914f93f8

                        SHA512

                        0ee2a3fcd5fef502f5c38acd209d5e14d8787c233c3b897aec3bb7240b4e656057a72438e3e6abccf8e9d046d7c6be7aaf4a9aa329222108a455a345cb3f1aff

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe

                        MD5

                        bdfde890a781bf135e6eb4339ff9424f

                        SHA1

                        a5bfca4601242d3ff52962432efb15ab9202217f

                        SHA256

                        b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                        SHA512

                        7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\freebl3.dll

                        MD5

                        60acd24430204ad2dc7f148b8cfe9bdc

                        SHA1

                        989f377b9117d7cb21cbe92a4117f88f9c7693d9

                        SHA256

                        9876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97

                        SHA512

                        626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\mozglue.dll

                        MD5

                        eae9273f8cdcf9321c6c37c244773139

                        SHA1

                        8378e2a2f3635574c106eea8419b5eb00b8489b0

                        SHA256

                        a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc

                        SHA512

                        06e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\msvcp140.dll

                        MD5

                        109f0f02fd37c84bfc7508d4227d7ed5

                        SHA1

                        ef7420141bb15ac334d3964082361a460bfdb975

                        SHA256

                        334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                        SHA512

                        46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\nss3.dll

                        MD5

                        02cc7b8ee30056d5912de54f1bdfc219

                        SHA1

                        a6923da95705fb81e368ae48f93d28522ef552fb

                        SHA256

                        1989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5

                        SHA512

                        0d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\softokn3.dll

                        MD5

                        4e8df049f3459fa94ab6ad387f3561ac

                        SHA1

                        06ed392bc29ad9d5fc05ee254c2625fd65925114

                        SHA256

                        25a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871

                        SHA512

                        3dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6

                      • \Users\Admin\AppData\LocalLow\aD1rF3aM8r\vcruntime140.dll

                        MD5

                        7587bf9cb4147022cd5681b015183046

                        SHA1

                        f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                        SHA256

                        c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                        SHA512

                        0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                      • \Users\Admin\AppData\LocalLow\sqlite3.dll

                        MD5

                        f964811b68f9f1487c2b41e1aef576ce

                        SHA1

                        b423959793f14b1416bc3b7051bed58a1034025f

                        SHA256

                        83bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7

                        SHA512

                        565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4

                      • \Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe

                        MD5

                        bdfde890a781bf135e6eb4339ff9424f

                        SHA1

                        a5bfca4601242d3ff52962432efb15ab9202217f

                        SHA256

                        b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                        SHA512

                        7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                      • \Users\Admin\AppData\Roaming\Microsoft\Windows\spoolsv.exe

                        MD5

                        bdfde890a781bf135e6eb4339ff9424f

                        SHA1

                        a5bfca4601242d3ff52962432efb15ab9202217f

                        SHA256

                        b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                        SHA512

                        7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                      • memory/584-69-0x0000000000000000-mapping.dmp

                      • memory/584-73-0x0000000000400000-0x0000000000570000-memory.dmp

                        Filesize

                        1.4MB

                      • memory/584-72-0x0000000000220000-0x00000000002AF000-memory.dmp

                        Filesize

                        572KB

                      • memory/616-65-0x0000000000000000-mapping.dmp

                      • memory/896-88-0x0000000000310000-0x000000000037B000-memory.dmp

                        Filesize

                        428KB

                      • memory/896-87-0x0000000000380000-0x00000000003F4000-memory.dmp

                        Filesize

                        464KB

                      • memory/896-86-0x0000000074C21000-0x0000000074C23000-memory.dmp

                        Filesize

                        8KB

                      • memory/896-84-0x0000000000000000-mapping.dmp

                      • memory/904-81-0x0000000000000000-mapping.dmp

                      • memory/1088-126-0x0000000000000000-mapping.dmp

                      • memory/1088-138-0x00000000000D0000-0x00000000000D5000-memory.dmp

                        Filesize

                        20KB

                      • memory/1088-139-0x00000000000C0000-0x00000000000C9000-memory.dmp

                        Filesize

                        36KB

                      • memory/1208-64-0x0000000002B60000-0x0000000002B76000-memory.dmp

                        Filesize

                        88KB

                      • memory/1316-114-0x0000000000070000-0x0000000000075000-memory.dmp

                        Filesize

                        20KB

                      • memory/1316-113-0x0000000000000000-mapping.dmp

                      • memory/1316-115-0x0000000000060000-0x0000000000069000-memory.dmp

                        Filesize

                        36KB

                      • memory/1380-90-0x0000000000070000-0x0000000000077000-memory.dmp

                        Filesize

                        28KB

                      • memory/1380-91-0x0000000000060000-0x000000000006C000-memory.dmp

                        Filesize

                        48KB

                      • memory/1380-89-0x0000000000000000-mapping.dmp

                      • memory/1572-107-0x00000000000E0000-0x00000000000EC000-memory.dmp

                        Filesize

                        48KB

                      • memory/1572-105-0x0000000000000000-mapping.dmp

                      • memory/1572-106-0x00000000000F0000-0x00000000000F6000-memory.dmp

                        Filesize

                        24KB

                      • memory/1652-63-0x0000000000220000-0x000000000022A000-memory.dmp

                        Filesize

                        40KB

                      • memory/1684-99-0x0000000000060000-0x000000000006F000-memory.dmp

                        Filesize

                        60KB

                      • memory/1684-97-0x0000000000000000-mapping.dmp

                      • memory/1684-98-0x0000000000070000-0x0000000000079000-memory.dmp

                        Filesize

                        36KB

                      • memory/1736-92-0x0000000000000000-mapping.dmp

                      • memory/1736-95-0x00000000000D0000-0x00000000000D7000-memory.dmp

                        Filesize

                        28KB

                      • memory/1736-94-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

                        Filesize

                        8KB

                      • memory/1736-96-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1796-137-0x00000000000E0000-0x00000000000E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1796-122-0x0000000000000000-mapping.dmp

                      • memory/1812-119-0x0000000000000000-mapping.dmp

                      • memory/1976-111-0x0000000000090000-0x0000000000094000-memory.dmp

                        Filesize

                        16KB

                      • memory/1976-112-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/1976-108-0x0000000000000000-mapping.dmp

                      • memory/2028-104-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/2028-103-0x0000000000090000-0x0000000000095000-memory.dmp

                        Filesize

                        20KB

                      • memory/2028-100-0x0000000000000000-mapping.dmp

                      • memory/2032-61-0x0000000000402FAB-mapping.dmp

                      • memory/2032-62-0x0000000076641000-0x0000000076643000-memory.dmp

                        Filesize

                        8KB

                      • memory/2032-60-0x0000000000400000-0x0000000000409000-memory.dmp

                        Filesize

                        36KB