Resubmissions

23-09-2021 21:08

210923-zyzyaafbfr 10

22-09-2021 10:40

210922-mqyzssehck 10

22-09-2021 05:21

210922-f114ksecck 10

21-09-2021 05:29

210921-f6zspsgdg2 10

20-09-2021 21:51

210920-1qj3jafed9 10

20-09-2021 19:44

210920-yftswafca9 10

20-09-2021 08:28

210920-kczcasgahr 10

20-09-2021 04:42

210920-fb3acafedj 10

20-09-2021 04:42

210920-fb2zksfecr 10

Analysis

  • max time kernel
    601s
  • max time network
    586s
  • platform
    windows7_x64
  • resource
    win7-de-20210916
  • submitted
    20-09-2021 04:42

General

  • Target

    setup_x86_x64_install.exe

  • Size

    4.0MB

  • MD5

    73491325fde5366b31c09da701d07dd6

  • SHA1

    a4e1ada57e590c2df30fc26fad5f3ca57ad922b1

  • SHA256

    56a461a6cc8ad9c10cdc1d19a12d5deceb9ebefb0c871a3fc2eb83c466947a11

  • SHA512

    28b5008c542e9c486529934f74774d6d2de4b98531483b24c3c7cf82bf2214b959a1feb0085014026dd278d2a18ac6ae8a0e5a7ebb36be28abf6dccbf2d38e88

Malware Config

Extracted

Family

vidar

Version

40.7

Botnet

706

C2

https://petrenko96.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

smokeloader

Version

2020

C2

http://varmisende.com/upload/

http://fernandomayol.com/upload/

http://nextlytm.com/upload/

http://people4jan.com/upload/

http://asfaltwerk.com/upload/

rc4.i32
rc4.i32

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 43 IoCs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:332
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
            PID:1164
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2084
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c Sun1917b8fb5f09db8.exe
            4⤵
            • Loads dropped DLL
            PID:1176
            • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun1917b8fb5f09db8.exe
              Sun1917b8fb5f09db8.exe
              5⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              PID:1624
              • C:\Users\Admin\Documents\uEHqH46JY2AXwVodITjTrtci.exe
                "C:\Users\Admin\Documents\uEHqH46JY2AXwVodITjTrtci.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2644
              • C:\Users\Admin\Documents\5FyZh8RfGBomtgKlpYsdUuGO.exe
                "C:\Users\Admin\Documents\5FyZh8RfGBomtgKlpYsdUuGO.exe"
                6⤵
                  PID:2860
                • C:\Users\Admin\Documents\lc7NWqleMZq61SctuQPG47wl.exe
                  "C:\Users\Admin\Documents\lc7NWqleMZq61SctuQPG47wl.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:2780
                • C:\Users\Admin\Documents\YnRpxov9VpxiUz4kdCxLc1q1.exe
                  "C:\Users\Admin\Documents\YnRpxov9VpxiUz4kdCxLc1q1.exe"
                  6⤵
                  • Executes dropped EXE
                  • Checks BIOS information in registry
                  • Checks whether UAC is enabled
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:1868
                • C:\Users\Admin\Documents\JrboPFp1ADnYdSl352ttKT97.exe
                  "C:\Users\Admin\Documents\JrboPFp1ADnYdSl352ttKT97.exe"
                  6⤵
                  • Executes dropped EXE
                  PID:2868
                • C:\Users\Admin\Documents\DPNtTmHqNR6IT0FrpxMYIdST.exe
                  "C:\Users\Admin\Documents\DPNtTmHqNR6IT0FrpxMYIdST.exe"
                  6⤵
                    PID:2840
                  • C:\Users\Admin\Documents\06UpNnKppD9f6mifnUfC4SHN.exe
                    "C:\Users\Admin\Documents\06UpNnKppD9f6mifnUfC4SHN.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:2600
                  • C:\Users\Admin\Documents\cifVmb8cqBdmuEiQQGG0Aahm.exe
                    "C:\Users\Admin\Documents\cifVmb8cqBdmuEiQQGG0Aahm.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:2852
                  • C:\Users\Admin\Documents\8knMcD4d4TD3o6tHaw5swUfC.exe
                    "C:\Users\Admin\Documents\8knMcD4d4TD3o6tHaw5swUfC.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:2820
                  • C:\Users\Admin\Documents\5_UIp46m_pG3U43CjD8WyKx4.exe
                    "C:\Users\Admin\Documents\5_UIp46m_pG3U43CjD8WyKx4.exe"
                    6⤵
                    • Executes dropped EXE
                    PID:3064
                  • C:\Users\Admin\Documents\5_yzPnmwSFHpyE1Mf6pl0rBN.exe
                    "C:\Users\Admin\Documents\5_yzPnmwSFHpyE1Mf6pl0rBN.exe"
                    6⤵
                      PID:988
                    • C:\Users\Admin\Documents\B7TZtHdofb4gO0rD6W76uXN3.exe
                      "C:\Users\Admin\Documents\B7TZtHdofb4gO0rD6W76uXN3.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:1408
                    • C:\Users\Admin\Documents\Ha9jg1e833b8C5W6qhHtLqAc.exe
                      "C:\Users\Admin\Documents\Ha9jg1e833b8C5W6qhHtLqAc.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:2988
                    • C:\Users\Admin\Documents\n5PhA52CggyvkHy7ITAvbzCR.exe
                      "C:\Users\Admin\Documents\n5PhA52CggyvkHy7ITAvbzCR.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:2920
                    • C:\Users\Admin\Documents\Onnt9ioD1ZDjDhx3XkV23oGX.exe
                      "C:\Users\Admin\Documents\Onnt9ioD1ZDjDhx3XkV23oGX.exe"
                      6⤵
                        PID:2384
                      • C:\Users\Admin\Documents\GKldwwP06JLlts2ATFRSHR8m.exe
                        "C:\Users\Admin\Documents\GKldwwP06JLlts2ATFRSHR8m.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:2408
                      • C:\Users\Admin\Documents\ptzD85XfJ9IkWDStC4oazvlX.exe
                        "C:\Users\Admin\Documents\ptzD85XfJ9IkWDStC4oazvlX.exe"
                        6⤵
                        • Executes dropped EXE
                        PID:1136
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Sun19262b9e49ad.exe
                    4⤵
                    • Loads dropped DLL
                    PID:1152
                    • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun19262b9e49ad.exe
                      Sun19262b9e49ad.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Modifies system certificate store
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2676
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c taskkill /f /im chrome.exe
                        6⤵
                          PID:2948
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /f /im chrome.exe
                            7⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3012
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sun193fda712d9f1.exe
                      4⤵
                      • Loads dropped DLL
                      PID:620
                      • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun193fda712d9f1.exe
                        Sun193fda712d9f1.exe
                        5⤵
                        • Executes dropped EXE
                        PID:332
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sun19e4ade31b2a.exe
                      4⤵
                      • Loads dropped DLL
                      PID:1516
                      • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun19e4ade31b2a.exe
                        Sun19e4ade31b2a.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:764
                        • C:\Users\Admin\AppData\Roaming\3900998.scr
                          "C:\Users\Admin\AppData\Roaming\3900998.scr" /S
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3024
                        • C:\Users\Admin\AppData\Roaming\6522054.scr
                          "C:\Users\Admin\AppData\Roaming\6522054.scr" /S
                          6⤵
                          • Executes dropped EXE
                          • Checks BIOS information in registry
                          • Loads dropped DLL
                          • Checks whether UAC is enabled
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:1364
                        • C:\Users\Admin\AppData\Roaming\2716230.scr
                          "C:\Users\Admin\AppData\Roaming\2716230.scr" /S
                          6⤵
                          • Executes dropped EXE
                          PID:3032
                        • C:\Users\Admin\AppData\Roaming\5315583.scr
                          "C:\Users\Admin\AppData\Roaming\5315583.scr" /S
                          6⤵
                          • Executes dropped EXE
                          • Checks BIOS information in registry
                          • Checks whether UAC is enabled
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1596
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c Sun1908b94df837b3158.exe
                      4⤵
                        PID:1364
                        • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun1908b94df837b3158.exe
                          Sun1908b94df837b3158.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:1296
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Sun19eb40faaaa9.exe
                        4⤵
                        • Loads dropped DLL
                        PID:1092
                        • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun19eb40faaaa9.exe
                          Sun19eb40faaaa9.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:1928
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 956
                            6⤵
                            • Loads dropped DLL
                            • Program crash
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2796
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c Sun191101c1aaa.exe
                        4⤵
                          PID:1684
                          • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun191101c1aaa.exe
                            Sun191101c1aaa.exe
                            5⤵
                            • Executes dropped EXE
                            PID:1912
                            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                              "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
                              6⤵
                              • Loads dropped DLL
                              PID:1696
                              • C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe
                                "C:\Users\Admin\AppData\Local\Temp\Chrome 5.exe"
                                7⤵
                                • Executes dropped EXE
                                PID:1496
                              • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
                                "C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2224
                                • C:\ProgramData\306998.exe
                                  "C:\ProgramData\306998.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  PID:1828
                                • C:\ProgramData\2809076.exe
                                  "C:\ProgramData\2809076.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  PID:2848
                                • C:\ProgramData\2044999.exe
                                  "C:\ProgramData\2044999.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  PID:2128
                                • C:\ProgramData\1715135.exe
                                  "C:\ProgramData\1715135.exe"
                                  8⤵
                                  • Executes dropped EXE
                                  • Checks BIOS information in registry
                                  • Checks whether UAC is enabled
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:2096
                              • C:\Users\Admin\AppData\Local\Temp\2.exe
                                "C:\Users\Admin\AppData\Local\Temp\2.exe"
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2080
                                • C:\Windows\system32\WerFault.exe
                                  C:\Windows\system32\WerFault.exe -u -p 2080 -s 1420
                                  8⤵
                                  • Program crash
                                  PID:2884
                              • C:\Users\Admin\AppData\Local\Temp\setup.exe
                                "C:\Users\Admin\AppData\Local\Temp\setup.exe"
                                7⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1720
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit
                                  8⤵
                                    PID:2388
                                • C:\Users\Admin\AppData\Local\Temp\udptest.exe
                                  "C:\Users\Admin\AppData\Local\Temp\udptest.exe"
                                  7⤵
                                  • Executes dropped EXE
                                  PID:1704
                                • C:\Users\Admin\AppData\Local\Temp\5.exe
                                  "C:\Users\Admin\AppData\Local\Temp\5.exe"
                                  7⤵
                                    PID:2716
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun1905815e51282417.exe
                              4⤵
                              • Loads dropped DLL
                              PID:796
                              • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun1905815e51282417.exe
                                Sun1905815e51282417.exe
                                5⤵
                                • Executes dropped EXE
                                PID:1368
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun198361825f4.exe
                              4⤵
                              • Loads dropped DLL
                              PID:1100
                              • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun198361825f4.exe
                                Sun198361825f4.exe
                                5⤵
                                • Executes dropped EXE
                                PID:2156
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun1966fb31dd5a07.exe
                              4⤵
                              • Loads dropped DLL
                              PID:1592
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun195a1614ec24e6a.exe
                              4⤵
                              • Loads dropped DLL
                              PID:1628
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c Sun19de8ff4b6aefeb8.exe /mixone
                              4⤵
                              • Loads dropped DLL
                              PID:1604
                      • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun19de8ff4b6aefeb8.exe
                        Sun19de8ff4b6aefeb8.exe /mixone
                        1⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:1988
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c taskkill /im "Sun19de8ff4b6aefeb8.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun19de8ff4b6aefeb8.exe" & exit
                          2⤵
                            PID:2432
                        • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun1966fb31dd5a07.exe
                          Sun1966fb31dd5a07.exe
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:2140
                          • C:\Users\Admin\AppData\Local\Temp\is-GDEQC.tmp\Sun1966fb31dd5a07.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-GDEQC.tmp\Sun1966fb31dd5a07.tmp" /SL5="$50134,247014,163328,C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun1966fb31dd5a07.exe"
                            2⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            PID:2244
                            • C:\Users\Admin\AppData\Local\Temp\is-HDTR1.tmp\Ze2ro.exe
                              "C:\Users\Admin\AppData\Local\Temp\is-HDTR1.tmp\Ze2ro.exe" /S /UID=burnerch2
                              3⤵
                              • Drops file in Drivers directory
                              • Executes dropped EXE
                              • Drops file in Program Files directory
                              PID:2572
                              • C:\Program Files\Common Files\LRETETGRKJ\ultramediaburner.exe
                                "C:\Program Files\Common Files\LRETETGRKJ\ultramediaburner.exe" /VERYSILENT
                                4⤵
                                  PID:2260
                          • C:\Users\Admin\AppData\Local\Temp\7zS83216BD2\Sun195a1614ec24e6a.exe
                            Sun195a1614ec24e6a.exe
                            1⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2064
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {1559396C-DDAA-4BA0-A409-26A2BA908436} S-1-5-21-2375386074-2889020035-839874990-1000:AFOWCZMM\Admin:Interactive:[1]
                            1⤵
                              PID:3208
                              • C:\Users\Admin\AppData\Roaming\cirtswu
                                C:\Users\Admin\AppData\Roaming\cirtswu
                                2⤵
                                • Executes dropped EXE
                                PID:3320
                            • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                              "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ua /installsource core
                              1⤵
                                PID:3264
                              • C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
                                "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /svc
                                1⤵
                                  PID:3420

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • memory/332-54-0x00000000753A1000-0x00000000753A3000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/764-189-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/764-203-0x0000000000350000-0x0000000000351000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/764-208-0x000000001AEC0000-0x000000001AEC2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/836-88-0x0000000064940000-0x0000000064959000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/836-105-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/836-108-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                  Filesize

                                  152KB

                                • memory/836-84-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/836-85-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                  Filesize

                                  152KB

                                • memory/836-98-0x0000000064940000-0x0000000064959000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/836-104-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                  Filesize

                                  572KB

                                • memory/836-86-0x0000000064940000-0x0000000064959000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/836-83-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                  Filesize

                                  572KB

                                • memory/836-95-0x0000000064940000-0x0000000064959000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1296-187-0x0000000000240000-0x0000000000249000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1296-188-0x0000000000400000-0x000000000044D000-memory.dmp

                                  Filesize

                                  308KB

                                • memory/1412-199-0x0000000003B50000-0x0000000003B65000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/1496-269-0x00000000006D0000-0x00000000006DA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/1496-225-0x000000013F090000-0x000000013F091000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1624-196-0x0000000004160000-0x00000000042A0000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/1696-219-0x0000000000910000-0x0000000000911000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1928-183-0x0000000001E50000-0x0000000001F24000-memory.dmp

                                  Filesize

                                  848KB

                                • memory/1928-184-0x0000000000400000-0x00000000004D7000-memory.dmp

                                  Filesize

                                  860KB

                                • memory/1988-186-0x0000000000400000-0x0000000000466000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/1988-185-0x0000000000320000-0x0000000000368000-memory.dmp

                                  Filesize

                                  288KB

                                • memory/2064-193-0x0000000001010000-0x0000000001011000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2064-210-0x00000000005A0000-0x00000000005A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2080-232-0x00000000008D0000-0x00000000008D1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2080-238-0x000000001B1B0000-0x000000001B1B2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2084-216-0x0000000002010000-0x0000000002C5A000-memory.dmp

                                  Filesize

                                  12.3MB

                                • memory/2084-209-0x0000000002010000-0x0000000002C5A000-memory.dmp

                                  Filesize

                                  12.3MB

                                • memory/2084-197-0x0000000002010000-0x0000000002C5A000-memory.dmp

                                  Filesize

                                  12.3MB

                                • memory/2140-179-0x0000000000400000-0x000000000042E000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/2156-205-0x0000000000140000-0x000000000014B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/2156-190-0x0000000000360000-0x0000000000361000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2156-204-0x000000001AD70000-0x000000001AD72000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2224-231-0x0000000000130000-0x0000000000131000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2224-235-0x0000000000270000-0x0000000000271000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2224-250-0x000000001B090000-0x000000001B092000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2244-182-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2572-198-0x00000000003D0000-0x00000000003D2000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/2572-236-0x000000001C840000-0x000000001CB3F000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/2796-226-0x0000000000250000-0x00000000002D0000-memory.dmp

                                  Filesize

                                  512KB

                                • memory/3024-229-0x00000000011A0000-0x00000000011A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3024-223-0x0000000000740000-0x0000000000741000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3024-221-0x00000000012C0000-0x00000000012C1000-memory.dmp

                                  Filesize

                                  4KB