Analysis

  • max time kernel
    151s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20/09/2021, 14:10

General

  • Target

    28ea220f0c8f906c66e1ab5657ca0260.exe

  • Size

    269KB

  • MD5

    28ea220f0c8f906c66e1ab5657ca0260

  • SHA1

    04d158591858f17abd9295f481c26ae7ef771e37

  • SHA256

    71bbaf19229855f0bfdebbe93d12b5f5fac6c0b542b5ca3b5a00d4b088ccdadc

  • SHA512

    aba54593ad2344b0c40e8942f1b4099c639eb443ec2a31c98813243bcc7f03fb192a879be7748d1681db889673e5e1e5d257d8256112359363daa0eacd945cb0

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://venerynnet1.top/

http://kevonahira2.top/

http://vegangelist3.top/

http://kingriffaele4.top/

http://arakeishant5.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Moneymaker

C2

185.244.217.166:56316

Extracted

Family

redline

Botnet

installbv

C2

80.85.137.89:17954

Extracted

Family

redline

Botnet

2k superstar

C2

91.142.77.155:5469

Signatures

  • MedusaLocker

    Ransomware with several variants first seen in September 2019.

  • MedusaLocker Payload 1 IoCs
  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Process spawned unexpected child process 10 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Deletes System State backups 3 TTPs 2 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Downloads MZ/PE file
  • Drops file in Drivers directory 12 IoCs
  • Executes dropped EXE 17 IoCs
  • Modifies extensions of user files 53 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 22 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 55 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 13 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
    "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe
      "C:\Users\Admin\AppData\Local\Temp\28ea220f0c8f906c66e1ab5657ca0260.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:892
  • C:\Users\Admin\AppData\Local\Temp\E8E4.exe
    C:\Users\Admin\AppData\Local\Temp\E8E4.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    PID:2480
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\E8E4.exe"
      2⤵
      • Enumerates connected drives
      PID:4924
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 10 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:5036
  • C:\Users\Admin\AppData\Local\Temp\FBB1.exe
    C:\Users\Admin\AppData\Local\Temp\FBB1.exe
    1⤵
    • Executes dropped EXE
    PID:3880
  • C:\Users\Admin\AppData\Local\Temp\AC6.exe
    C:\Users\Admin\AppData\Local\Temp\AC6.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3148
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB
      2⤵
      • Interacts with shadow copies
      PID:420
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:712
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:1452
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:2012
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:3164
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:3756
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:504
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:4164
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4336
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4672
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB
      2⤵
      • Enumerates connected drives
      • Interacts with shadow copies
      PID:4796
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded
      2⤵
      • Interacts with shadow copies
      PID:4924
    • C:\Windows\SYSTEM32\vssadmin.exe
      vssadmin.exe Delete Shadows /All /Quiet
      2⤵
      • Interacts with shadow copies
      PID:5052
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} recoveryenabled No
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:2860
    • C:\Windows\SYSTEM32\bcdedit.exe
      bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
      2⤵
      • Modifies boot configuration data using bcdedit
      PID:4276
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:4400
    • C:\Windows\SYSTEM32\wbadmin.exe
      wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest
      2⤵
      • Deletes System State backups
      • Drops file in Windows directory
      PID:4536
    • C:\Windows\System32\Wbem\wmic.exe
      wmic.exe SHADOWCOPY /nointeractive
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4752
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\AC6.exe >> NUL
      2⤵
        PID:4344
    • C:\Users\Admin\AppData\Local\Temp\115E.exe
      C:\Users\Admin\AppData\Local\Temp\115E.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3268
      • C:\ProgramData\ZZZZZ.exe
        "C:\ProgramData\ZZZZZ.exe"
        2⤵
          PID:488
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c start C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1044
            • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
              C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
              4⤵
              • Modifies WinLogon for persistence
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:2696
              • C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe
                "C:\Users\Admin\AppData\Roaming\DriverRealtekHDmaster.exe"
                5⤵
                • Modifies WinLogon for persistence
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Suspicious use of AdjustPrivilegeToken
                PID:4608
                • C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe
                  "C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4300
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c start C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1172
            • C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
              C:\Users\Admin\AppData\Local\Temp\DriverMaster.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2264
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                5⤵
                  PID:4416
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                    6⤵
                    • Creates scheduled task(s)
                    PID:4596
                • C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe
                  "C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4812
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"' & exit
                    6⤵
                      PID:4684
                      • C:\Windows\system32\schtasks.exe
                        schtasks /create /f /sc onlogon /rl highest /tn "EngineDriverMaster" /tr '"C:\Users\Admin\AppData\Local\Temp\EngineDriverMaster.exe"'
                        7⤵
                        • Creates scheduled task(s)
                        PID:4372
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
                      "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
                      6⤵
                      • Executes dropped EXE
                      PID:4548
            • C:\Users\Admin\AppData\Local\Temp\115E.exe
              "C:\Users\Admin\AppData\Local\Temp\115E.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1200
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2680
          • C:\Users\Admin\AppData\Local\Temp\1845.exe
            C:\Users\Admin\AppData\Local\Temp\1845.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1192
            • C:\Users\Admin\AppData\Local\Temp\1845.exe
              "C:\Users\Admin\AppData\Local\Temp\1845.exe"
              2⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3944
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 1908
              2⤵
              • Enumerates connected drives
              • Program crash
              • Suspicious use of AdjustPrivilegeToken
              PID:3756
          • C:\Users\Admin\AppData\Local\Temp\1DF3.exe
            C:\Users\Admin\AppData\Local\Temp\1DF3.exe
            1⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:3800
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /fdsfs
              2⤵
                PID:2864
              • C:\Users\Admin\AppData\Local\Temp\1DF3.exe
                "C:\Users\Admin\AppData\Local\Temp\1DF3.exe"
                2⤵
                • Executes dropped EXE
                PID:3016
            • C:\Users\Admin\AppData\Local\Temp\2B42.exe
              C:\Users\Admin\AppData\Local\Temp\2B42.exe
              1⤵
              • Executes dropped EXE
              PID:4216
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "E8E4" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\sa.9NBLGGH4VZW5_0_0010_.Public.InstallAgent\E8E4.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:4320
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\SoftwareDistribution\DataStore\Logs\dllhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:4520
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:4560
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\spoolsv.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:5028
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "EngineDriverMaster" /sc ONLOGON /tr "'C:\PerfLogs\EngineDriverMaster.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:5064
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Users\Public\Downloads\dwm.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:2304
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "AC6" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\115E\AC6.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Executes dropped EXE
              • Creates scheduled task(s)
              • Suspicious use of WriteProcessMemory
              PID:488
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "VSSVC" /sc ONLOGON /tr "'C:\Windows\System32\EditionUpgradeManagerObj\VSSVC.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:4212
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "vssadmin" /sc ONLOGON /tr "'C:\Boot\cs-CZ\vssadmin.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Creates scheduled task(s)
              PID:3932
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "AC6" /sc ONLOGON /tr "'C:\ProgramData\Mozilla\updates\308046B0AF4A39CB\AC6.exe'" /rl HIGHEST /f
              1⤵
              • Process spawned unexpected child process
              • Enumerates connected drives
              • Creates scheduled task(s)
              PID:4164

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/796-114-0x0000000000030000-0x0000000000039000-memory.dmp

              Filesize

              36KB

            • memory/892-115-0x0000000000400000-0x0000000000408000-memory.dmp

              Filesize

              32KB

            • memory/1192-145-0x00000000002F0000-0x00000000002F1000-memory.dmp

              Filesize

              4KB

            • memory/1192-152-0x00000000050C0000-0x00000000050C1000-memory.dmp

              Filesize

              4KB

            • memory/1192-173-0x0000000004BD0000-0x0000000004BFF000-memory.dmp

              Filesize

              188KB

            • memory/1192-147-0x0000000004B30000-0x0000000004B31000-memory.dmp

              Filesize

              4KB

            • memory/1200-207-0x00000000051E0000-0x00000000051E1000-memory.dmp

              Filesize

              4KB

            • memory/1200-202-0x00000000050E0000-0x00000000056E6000-memory.dmp

              Filesize

              6.0MB

            • memory/1200-184-0x00000000056F0000-0x00000000056F1000-memory.dmp

              Filesize

              4KB

            • memory/1200-189-0x0000000005140000-0x0000000005141000-memory.dmp

              Filesize

              4KB

            • memory/1200-194-0x0000000005270000-0x0000000005271000-memory.dmp

              Filesize

              4KB

            • memory/1200-158-0x0000000000400000-0x0000000000422000-memory.dmp

              Filesize

              136KB

            • memory/2264-170-0x0000000000680000-0x0000000000681000-memory.dmp

              Filesize

              4KB

            • memory/2264-193-0x000000001C7A0000-0x000000001C989000-memory.dmp

              Filesize

              1.9MB

            • memory/2264-212-0x0000000002D60000-0x0000000002D61000-memory.dmp

              Filesize

              4KB

            • memory/2264-211-0x000000001C990000-0x000000001CB77000-memory.dmp

              Filesize

              1.9MB

            • memory/2264-206-0x0000000002D90000-0x0000000002D92000-memory.dmp

              Filesize

              8KB

            • memory/2480-122-0x0000000000400000-0x0000000004605000-memory.dmp

              Filesize

              66.0MB

            • memory/2480-121-0x0000000006570000-0x000000000A64F000-memory.dmp

              Filesize

              64.9MB

            • memory/2696-167-0x0000000000020000-0x0000000000021000-memory.dmp

              Filesize

              4KB

            • memory/2696-180-0x00000000021B0000-0x00000000021B2000-memory.dmp

              Filesize

              8KB

            • memory/3024-117-0x00000000005D0000-0x00000000005E5000-memory.dmp

              Filesize

              84KB

            • memory/3148-131-0x00007FF71F080000-0x00007FF71F8F8000-memory.dmp

              Filesize

              8.5MB

            • memory/3268-157-0x0000000006660000-0x000000000667D000-memory.dmp

              Filesize

              116KB

            • memory/3268-137-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

              Filesize

              4KB

            • memory/3268-138-0x0000000005A10000-0x0000000005A11000-memory.dmp

              Filesize

              4KB

            • memory/3268-140-0x0000000005490000-0x0000000005491000-memory.dmp

              Filesize

              4KB

            • memory/3268-139-0x0000000005510000-0x0000000005511000-memory.dmp

              Filesize

              4KB

            • memory/3800-190-0x00000000058E0000-0x00000000058E1000-memory.dmp

              Filesize

              4KB

            • memory/3800-182-0x0000000000F00000-0x0000000000F01000-memory.dmp

              Filesize

              4KB

            • memory/3800-200-0x00000000056E0000-0x0000000005BDE000-memory.dmp

              Filesize

              5.0MB

            • memory/3880-126-0x0000000000560000-0x00000000006AA000-memory.dmp

              Filesize

              1.3MB

            • memory/3880-127-0x0000000000400000-0x0000000000494000-memory.dmp

              Filesize

              592KB

            • memory/3944-201-0x00000000052A0000-0x00000000058A6000-memory.dmp

              Filesize

              6.0MB

            • memory/3944-181-0x0000000000400000-0x0000000000422000-memory.dmp

              Filesize

              136KB

            • memory/3944-203-0x00000000053A0000-0x00000000053A1000-memory.dmp

              Filesize

              4KB

            • memory/4216-225-0x0000000002270000-0x000000000228F000-memory.dmp

              Filesize

              124KB

            • memory/4216-233-0x0000000000400000-0x0000000000467000-memory.dmp

              Filesize

              412KB

            • memory/4216-252-0x0000000004CE4000-0x0000000004CE6000-memory.dmp

              Filesize

              8KB

            • memory/4216-238-0x0000000004CE3000-0x0000000004CE4000-memory.dmp

              Filesize

              4KB

            • memory/4216-232-0x0000000000470000-0x00000000005BA000-memory.dmp

              Filesize

              1.3MB

            • memory/4216-231-0x0000000002310000-0x000000000232E000-memory.dmp

              Filesize

              120KB

            • memory/4216-236-0x0000000004CE2000-0x0000000004CE3000-memory.dmp

              Filesize

              4KB

            • memory/4216-234-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

              Filesize

              4KB

            • memory/4300-276-0x0000000001160000-0x0000000001167000-memory.dmp

              Filesize

              28KB

            • memory/4300-289-0x0000000001455000-0x0000000001457000-memory.dmp

              Filesize

              8KB

            • memory/4300-287-0x0000000001454000-0x0000000001455000-memory.dmp

              Filesize

              4KB

            • memory/4300-286-0x0000000001452000-0x0000000001454000-memory.dmp

              Filesize

              8KB

            • memory/4300-263-0x0000000001450000-0x0000000001452000-memory.dmp

              Filesize

              8KB

            • memory/4300-279-0x0000000001130000-0x0000000001132000-memory.dmp

              Filesize

              8KB

            • memory/4300-280-0x0000000001190000-0x0000000001192000-memory.dmp

              Filesize

              8KB

            • memory/4300-275-0x0000000001120000-0x0000000001126000-memory.dmp

              Filesize

              24KB

            • memory/4300-277-0x00000000013B0000-0x00000000013B6000-memory.dmp

              Filesize

              24KB

            • memory/4548-278-0x000000001CAE0000-0x000000001CAE2000-memory.dmp

              Filesize

              8KB

            • memory/4548-272-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

              Filesize

              4KB

            • memory/4608-239-0x000000001B020000-0x000000001B022000-memory.dmp

              Filesize

              8KB

            • memory/4812-264-0x000000001CDB0000-0x000000001CDB2000-memory.dmp

              Filesize

              8KB