Analysis

  • max time kernel
    152s
  • max time network
    189s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    28-09-2021 19:03

General

  • Target

    9b9465b2396acfbee88f8baa1bd8df0e.exe

  • Size

    233KB

  • MD5

    9b9465b2396acfbee88f8baa1bd8df0e

  • SHA1

    612cee81384a4447684ba7ebcf2ea4d9a1389f5f

  • SHA256

    8a71d3f03b8e26b7a415d61e50f6b7ddd12651ace3c70e11e48518d94fca60eb

  • SHA512

    b701ec8532d1f814b36a480829b10d3e771bddf57f60ec12fe53678e8d6f373a83aad9904fe9833d4898b3f0b4eb638e9de5b9367867d5a88cbc84a0af65f187

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Extracted

Family

redline

C2

92.246.89.6:38437

Extracted

Family

redline

Botnet

z0rm1onbuild

C2

45.156.21.209:56326

Extracted

Family

raccoon

Botnet

a72c96f6762e4258a13dee8bc0dd14557df18467

Attributes
  • url4cnc

    https://t.me/h_wacel1new_1

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4

Attributes
  • url4cnc

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

777777

C2

193.56.146.60:18243

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 9 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 7 IoCs
  • XMRig Miner Payload 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 26 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 31 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 8 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 11 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b9465b2396acfbee88f8baa1bd8df0e.exe
    "C:\Users\Admin\AppData\Local\Temp\9b9465b2396acfbee88f8baa1bd8df0e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\9b9465b2396acfbee88f8baa1bd8df0e.exe
      "C:\Users\Admin\AppData\Local\Temp\9b9465b2396acfbee88f8baa1bd8df0e.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1524
  • C:\Users\Admin\AppData\Local\Temp\5714.exe
    C:\Users\Admin\AppData\Local\Temp\5714.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Users\Admin\AppData\Local\Temp\5714.exe
      C:\Users\Admin\AppData\Local\Temp\5714.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1736
  • C:\Users\Admin\AppData\Local\Temp\5F6E.exe
    C:\Users\Admin\AppData\Local\Temp\5F6E.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\5F6E.exe
      C:\Users\Admin\AppData\Local\Temp\5F6E.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
  • C:\Users\Admin\AppData\Local\Temp\7521.exe
    C:\Users\Admin\AppData\Local\Temp\7521.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1608
  • C:\Users\Admin\AppData\Local\Temp\8B9E.exe
    C:\Users\Admin\AppData\Local\Temp\8B9E.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\8B9E.exe
      "C:\Users\Admin\AppData\Local\Temp\8B9E.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:984
  • C:\Users\Admin\AppData\Local\Temp\9743.exe
    C:\Users\Admin\AppData\Local\Temp\9743.exe
    1⤵
    • Executes dropped EXE
    PID:1292
  • C:\Users\Admin\AppData\Local\Temp\A1A0.exe
    C:\Users\Admin\AppData\Local\Temp\A1A0.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    PID:1892
  • C:\Users\Admin\AppData\Local\Temp\AC7A.exe
    C:\Users\Admin\AppData\Local\Temp\AC7A.exe
    1⤵
    • Executes dropped EXE
    PID:1820
  • C:\Users\Admin\AppData\Local\Temp\B4A5.exe
    C:\Users\Admin\AppData\Local\Temp\B4A5.exe
    1⤵
    • Executes dropped EXE
    PID:1500
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rcrwwbko\
      2⤵
        PID:1644
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qtmusucm.exe" C:\Windows\SysWOW64\rcrwwbko\
        2⤵
          PID:1888
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create rcrwwbko binPath= "C:\Windows\SysWOW64\rcrwwbko\qtmusucm.exe /d\"C:\Users\Admin\AppData\Local\Temp\B4A5.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1332
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description rcrwwbko "wifi internet conection"
            2⤵
              PID:1100
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start rcrwwbko
              2⤵
                PID:1364
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1040
              • C:\Users\Admin\AppData\Local\Temp\C2C9.exe
                C:\Users\Admin\AppData\Local\Temp\C2C9.exe
                1⤵
                • Executes dropped EXE
                PID:1488
              • C:\Users\Admin\AppData\Local\Temp\D235.exe
                C:\Users\Admin\AppData\Local\Temp\D235.exe
                1⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of AdjustPrivilegeToken
                PID:1896
              • C:\Windows\SysWOW64\rcrwwbko\qtmusucm.exe
                C:\Windows\SysWOW64\rcrwwbko\qtmusucm.exe /d"C:\Users\Admin\AppData\Local\Temp\B4A5.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:1876
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  PID:932
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2704
              • C:\Users\Admin\AppData\Local\Temp\E3B4.exe
                C:\Users\Admin\AppData\Local\Temp\E3B4.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1644
                • C:\Users\Admin\AppData\Local\Temp\is-T2D1D.tmp\E3B4.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-T2D1D.tmp\E3B4.tmp" /SL5="$A00A8,4275279,831488,C:\Users\Admin\AppData\Local\Temp\E3B4.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1552
                  • C:\Users\Admin\AppData\Local\Temp\E3B4.exe
                    "C:\Users\Admin\AppData\Local\Temp\E3B4.exe" /VERYSILENT
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2064
                    • C:\Users\Admin\AppData\Local\Temp\is-N9IIQ.tmp\E3B4.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-N9IIQ.tmp\E3B4.tmp" /SL5="$20186,4275279,831488,C:\Users\Admin\AppData\Local\Temp\E3B4.exe" /VERYSILENT
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of FindShellTrayWindow
                      PID:2104
                      • C:\Users\Admin\AppData\Roaming\Audio Graph Wrapper for Windows\audiograph.exe
                        "C:\Users\Admin\AppData\Roaming\Audio Graph Wrapper for Windows\audiograph.exe"
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:2588
              • C:\Users\Admin\AppData\Local\Temp\F409.exe
                C:\Users\Admin\AppData\Local\Temp\F409.exe
                1⤵
                • Executes dropped EXE
                PID:2128
              • C:\Users\Admin\AppData\Local\Temp\24D.exe
                C:\Users\Admin\AppData\Local\Temp\24D.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:2200
                • C:\Users\Admin\AppData\Local\Temp\3efca567-1155-489d-a9d1-f9fd94524088\AdvancedRun.exe
                  "C:\Users\Admin\AppData\Local\Temp\3efca567-1155-489d-a9d1-f9fd94524088\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\3efca567-1155-489d-a9d1-f9fd94524088\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2480
                  • C:\Users\Admin\AppData\Local\Temp\3efca567-1155-489d-a9d1-f9fd94524088\AdvancedRun.exe
                    "C:\Users\Admin\AppData\Local\Temp\3efca567-1155-489d-a9d1-f9fd94524088\AdvancedRun.exe" /SpecialRun 4101d8 2480
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2532
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\24D.exe" -Force
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2828
                • C:\Users\Admin\AppData\Local\Temp\24D.exe
                  "C:\Users\Admin\AppData\Local\Temp\24D.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2936
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 1784
                  2⤵
                  • Loads dropped DLL
                  • Program crash
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3044
              • C:\Users\Admin\AppData\Local\Temp\2336.exe
                C:\Users\Admin\AppData\Local\Temp\2336.exe
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates connected drives
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                PID:2796
                • C:\Windows\SysWOW64\msiexec.exe
                  "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management 1.7.3.2\install\97C955F\adv.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\2336.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1632862917 " AI_EUIMSI=""
                  2⤵
                  • Blocklisted process makes network request
                  • Enumerates connected drives
                  • Suspicious use of FindShellTrayWindow
                  PID:1580
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Blocklisted process makes network request
                • Enumerates connected drives
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                PID:2076
                • C:\Windows\syswow64\MsiExec.exe
                  C:\Windows\syswow64\MsiExec.exe -Embedding A7D7D0DC561847002446B699128654F4 C
                  2⤵
                  • Loads dropped DLL
                  PID:1060
                • C:\Windows\syswow64\MsiExec.exe
                  C:\Windows\syswow64\MsiExec.exe -Embedding 5EC0DB011527DCC1FC18A58659DFA017
                  2⤵
                  • Loads dropped DLL
                  PID:1156
                • C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe
                  "C:\Users\Admin\AppData\Roaming\DB Software Laboratory\Svn Syncronize Management\disksyncer.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2488

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/932-153-0x00000000000C0000-0x00000000000D5000-memory.dmp

                Filesize

                84KB

              • memory/984-107-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/984-112-0x0000000004860000-0x0000000004861000-memory.dmp

                Filesize

                4KB

              • memory/984-110-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/1100-105-0x0000000000630000-0x000000000064D000-memory.dmp

                Filesize

                116KB

              • memory/1100-100-0x0000000000370000-0x0000000000371000-memory.dmp

                Filesize

                4KB

              • memory/1100-98-0x00000000000A0000-0x00000000000A1000-memory.dmp

                Filesize

                4KB

              • memory/1100-102-0x0000000074D90000-0x0000000074E10000-memory.dmp

                Filesize

                512KB

              • memory/1204-64-0x0000000002AB0000-0x0000000002AC6000-memory.dmp

                Filesize

                88KB

              • memory/1204-81-0x0000000002B20000-0x0000000002B36000-memory.dmp

                Filesize

                88KB

              • memory/1204-65-0x0000000002EB0000-0x0000000002EC0000-memory.dmp

                Filesize

                64KB

              • memory/1292-117-0x0000000000400000-0x00000000004F1000-memory.dmp

                Filesize

                964KB

              • memory/1292-116-0x0000000000500000-0x0000000000590000-memory.dmp

                Filesize

                576KB

              • memory/1488-137-0x0000000000220000-0x00000000002B0000-memory.dmp

                Filesize

                576KB

              • memory/1488-138-0x0000000000400000-0x00000000008AB000-memory.dmp

                Filesize

                4.7MB

              • memory/1500-129-0x0000000000020000-0x0000000000033000-memory.dmp

                Filesize

                76KB

              • memory/1500-130-0x0000000000400000-0x000000000086B000-memory.dmp

                Filesize

                4.4MB

              • memory/1524-60-0x0000000000400000-0x0000000000409000-memory.dmp

                Filesize

                36KB

              • memory/1524-62-0x0000000075801000-0x0000000075803000-memory.dmp

                Filesize

                8KB

              • memory/1552-167-0x0000000000240000-0x0000000000241000-memory.dmp

                Filesize

                4KB

              • memory/1608-93-0x00000000053E0000-0x00000000053E1000-memory.dmp

                Filesize

                4KB

              • memory/1608-86-0x00000000011D0000-0x00000000011D1000-memory.dmp

                Filesize

                4KB

              • memory/1620-88-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/1620-91-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/1620-94-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

                Filesize

                4KB

              • memory/1644-162-0x0000000000400000-0x00000000004D8000-memory.dmp

                Filesize

                864KB

              • memory/1684-79-0x0000000000690000-0x0000000000691000-memory.dmp

                Filesize

                4KB

              • memory/1684-77-0x0000000001040000-0x0000000001041000-memory.dmp

                Filesize

                4KB

              • memory/1804-63-0x0000000000020000-0x0000000000029000-memory.dmp

                Filesize

                36KB

              • memory/1820-124-0x0000000000400000-0x0000000000457000-memory.dmp

                Filesize

                348KB

              • memory/1820-123-0x0000000000260000-0x0000000000296000-memory.dmp

                Filesize

                216KB

              • memory/1876-152-0x0000000000400000-0x000000000086B000-memory.dmp

                Filesize

                4.4MB

              • memory/1892-118-0x0000000000020000-0x000000000002D000-memory.dmp

                Filesize

                52KB

              • memory/1892-119-0x0000000000400000-0x0000000002B90000-memory.dmp

                Filesize

                39.6MB

              • memory/1896-147-0x0000000000E90000-0x0000000000E91000-memory.dmp

                Filesize

                4KB

              • memory/1896-149-0x0000000005370000-0x0000000005371000-memory.dmp

                Filesize

                4KB

              • memory/2064-173-0x0000000000400000-0x00000000004D8000-memory.dmp

                Filesize

                864KB

              • memory/2076-241-0x000007FEFBD61000-0x000007FEFBD63000-memory.dmp

                Filesize

                8KB

              • memory/2104-189-0x000000006B771000-0x000000006B773000-memory.dmp

                Filesize

                8KB

              • memory/2128-183-0x0000000000400000-0x0000000000C64000-memory.dmp

                Filesize

                8.4MB

              • memory/2128-182-0x0000000001430000-0x0000000001832000-memory.dmp

                Filesize

                4.0MB

              • memory/2200-188-0x0000000005670000-0x00000000056E9000-memory.dmp

                Filesize

                484KB

              • memory/2200-187-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                Filesize

                4KB

              • memory/2200-185-0x00000000011E0000-0x00000000011E1000-memory.dmp

                Filesize

                4KB

              • memory/2588-295-0x0000000008402000-0x0000000008403000-memory.dmp

                Filesize

                4KB

              • memory/2588-293-0x0000000002ED0000-0x0000000005FD0000-memory.dmp

                Filesize

                49.0MB

              • memory/2588-296-0x0000000008404000-0x0000000008405000-memory.dmp

                Filesize

                4KB

              • memory/2588-294-0x0000000008401000-0x0000000008402000-memory.dmp

                Filesize

                4KB

              • memory/2704-207-0x0000000000170000-0x0000000000261000-memory.dmp

                Filesize

                964KB

              • memory/2828-227-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                Filesize

                4KB

              • memory/2828-256-0x0000000005690000-0x0000000005691000-memory.dmp

                Filesize

                4KB

              • memory/2828-243-0x0000000002810000-0x0000000002811000-memory.dmp

                Filesize

                4KB

              • memory/2828-222-0x0000000000890000-0x0000000000891000-memory.dmp

                Filesize

                4KB

              • memory/2828-232-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

                Filesize

                4KB

              • memory/2828-240-0x0000000000B70000-0x0000000000B71000-memory.dmp

                Filesize

                4KB

              • memory/2828-234-0x0000000004AA2000-0x0000000004AA3000-memory.dmp

                Filesize

                4KB

              • memory/2828-258-0x000000007EF30000-0x000000007EF31000-memory.dmp

                Filesize

                4KB

              • memory/2936-230-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/2936-233-0x0000000004980000-0x0000000004981000-memory.dmp

                Filesize

                4KB

              • memory/2936-224-0x0000000000400000-0x0000000000422000-memory.dmp

                Filesize

                136KB

              • memory/3044-244-0x0000000000910000-0x0000000000928000-memory.dmp

                Filesize

                96KB