Analysis

  • max time kernel
    151s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    13-10-2021 18:14

General

  • Target

    672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8.exe

  • Size

    310KB

  • MD5

    b9104a5c754e4959b435dbecc22e6e4b

  • SHA1

    6fdf844fd140e669b8eaaf7fc8970edff41abeaa

  • SHA256

    672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8

  • SHA512

    c93e0c1d6f59c0b25ccdcecdf44801c8643575874b66511e9ca31649e59eb55fc3fca4a3d6ca2dbdcc6845a73485644e5584f61895a2d134c30c3ce2f735db74

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://honawey7.xyz/

http://wijibui0.xyz/

http://hefahei6.xyz/

http://pipevai4.xyz/

http://nalirou7.xyz/

http://xacokuo8.xyz/

http://hajezey1.xyz/

http://gejajoo7.xyz/

http://sysaheu9.xyz/

http://rixoxeu9.xyz/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

w1

C2

109.234.34.165:12323

Extracted

Family

raccoon

Version

1.8.2

Botnet

fbe5e97e7d069407605ee9138022aa82166657e6

Attributes
  • url4cnc

    http://telemirror.top/stevuitreen

    http://tgmirror.top/stevuitreen

    http://telegatt.top/stevuitreen

    http://telegka.top/stevuitreen

    http://telegin.top/stevuitreen

    https://t.me/stevuitreen

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

MegaProliv2

C2

93.115.20.139:28978

Extracted

Family

raccoon

Botnet

7ebf9b416b72a203df65383eec899dc689d2c3d7

Attributes
  • url4cnc

    http://telegatt.top/agrybirdsgamerept

    http://telegka.top/agrybirdsgamerept

    http://telegin.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

huyzalupanew

C2

135.181.208.162:13904

Extracted

Family

redline

Botnet

@Nastya_ero

C2

45.14.49.66:21899

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 9 IoCs
  • ServHelper

    ServHelper is a backdoor written in Delphi and is associated with the hacking group TA505.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 1 IoCs
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Nirsoft 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Modifies RDP port number used by Windows 1 TTPs
  • Sets DLL path for service in the registry 2 TTPs
  • VMProtect packed file 6 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Windows security modification 2 TTPs 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8.exe
    "C:\Users\Admin\AppData\Local\Temp\672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8.exe
      "C:\Users\Admin\AppData\Local\Temp\672c2343ecbaba5e397027a9a13a04ef46e9d7036ae7a4ebf32336e3708d2af8.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:380
  • C:\Users\Admin\AppData\Local\Temp\DE6.exe
    C:\Users\Admin\AppData\Local\Temp\DE6.exe
    1⤵
    • Executes dropped EXE
    PID:3168
  • C:\Users\Admin\AppData\Local\Temp\17CB.exe
    C:\Users\Admin\AppData\Local\Temp\17CB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1384
  • C:\Users\Admin\AppData\Local\Temp\20B5.exe
    C:\Users\Admin\AppData\Local\Temp\20B5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -ep bypass & 'C:\Users\Admin\AppData\Local\Temp\\ready.ps1'
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3048
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vzjhxhyx\vzjhxhyx.cmdline"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES679F.tmp" "c:\Users\Admin\AppData\Local\Temp\vzjhxhyx\CSCA60F9A95F2644848932B6C4B6EF81FB4.TMP"
          4⤵
            PID:4228
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          3⤵
            PID:5072
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
            3⤵
              PID:4692
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
              3⤵
                PID:4252
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\system32\reg.exe" ADD "HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v PortNumber /t REG_DWORD /d 0x1C21 /f
                3⤵
                  PID:4284
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" add HKLM\system\currentcontrolset\services\TermService\parameters /v ServiceDLL /t REG_EXPAND_SZ /d C:\Windows\branding\mediasrv.png /f
                  3⤵
                  • Modifies registry key
                  PID:4316
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\system32\reg.exe" add "HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services" /v fEnableWddmDriver /t reg_dword /d 0 /f
                  3⤵
                    PID:4404
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\system32\net.exe" localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                    3⤵
                      PID:4716
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 localgroup Administrators "NT AUTHORITY\NETWORK SERVICE" /add
                        4⤵
                          PID:4876
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c cmd /c net start rdpdr
                        3⤵
                          PID:1736
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net start rdpdr
                            4⤵
                              PID:5036
                              • C:\Windows\SysWOW64\net.exe
                                net start rdpdr
                                5⤵
                                  PID:4604
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 start rdpdr
                                    6⤵
                                      PID:5044
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\system32\cmd.exe" /c cmd /c net start TermService
                                3⤵
                                  PID:5088
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c net start TermService
                                    4⤵
                                      PID:4128
                                      • C:\Windows\SysWOW64\net.exe
                                        net start TermService
                                        5⤵
                                          PID:1136
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 start TermService
                                            6⤵
                                              PID:4256
                                  • C:\Users\Admin\AppData\Local\Temp\247F.exe
                                    C:\Users\Admin\AppData\Local\Temp\247F.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of WriteProcessMemory
                                    PID:416
                                    • C:\Users\Admin\AppData\Local\Temp\247F.exe
                                      C:\Users\Admin\AppData\Local\Temp\247F.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:68
                                  • C:\Users\Admin\AppData\Local\Temp\2EB1.exe
                                    C:\Users\Admin\AppData\Local\Temp\2EB1.exe
                                    1⤵
                                    • Executes dropped EXE
                                    PID:1192
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 928
                                      2⤵
                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                      • Program crash
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1864
                                  • C:\Users\Admin\AppData\Local\Temp\352A.exe
                                    C:\Users\Admin\AppData\Local\Temp\352A.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2496
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 676
                                      2⤵
                                      • Program crash
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3780
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 1212
                                      2⤵
                                      • Program crash
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3156
                                  • C:\Users\Admin\AppData\Local\Temp\3E43.exe
                                    C:\Users\Admin\AppData\Local\Temp\3E43.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:848
                                  • C:\Users\Admin\AppData\Local\Temp\46EF.exe
                                    C:\Users\Admin\AppData\Local\Temp\46EF.exe
                                    1⤵
                                      PID:1212
                                      • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                        "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of WriteProcessMemory
                                        PID:3864
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
                                          3⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:4000
                                          • C:\Windows\SysWOW64\reg.exe
                                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\603c0340b4\
                                            4⤵
                                              PID:3516
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN sqtvvs.exe /TR "C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe" /F
                                            3⤵
                                            • Creates scheduled task(s)
                                            PID:3620
                                      • C:\Users\Admin\AppData\Local\Temp\4B84.exe
                                        C:\Users\Admin\AppData\Local\Temp\4B84.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Windows security modification
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:364
                                        • C:\Users\Admin\AppData\Local\Temp\db56c3fe-c279-437e-885f-188719f147dd\AdvancedRun.exe
                                          "C:\Users\Admin\AppData\Local\Temp\db56c3fe-c279-437e-885f-188719f147dd\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\db56c3fe-c279-437e-885f-188719f147dd\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
                                          2⤵
                                            PID:1732
                                            • C:\Users\Admin\AppData\Local\Temp\db56c3fe-c279-437e-885f-188719f147dd\AdvancedRun.exe
                                              "C:\Users\Admin\AppData\Local\Temp\db56c3fe-c279-437e-885f-188719f147dd\AdvancedRun.exe" /SpecialRun 4101d8 1732
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4048
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\4B84.exe" -Force
                                            2⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2472
                                          • C:\Users\Admin\AppData\Local\Temp\4B84.exe
                                            "C:\Users\Admin\AppData\Local\Temp\4B84.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of WriteProcessMemory
                                            PID:1212
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 2244
                                            2⤵
                                            • Program crash
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4164
                                        • C:\Users\Admin\AppData\Local\Temp\4FFA.exe
                                          C:\Users\Admin\AppData\Local\Temp\4FFA.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:3420
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                            2⤵
                                              PID:4540
                                          • C:\Users\Admin\AppData\Local\Temp\5C01.exe
                                            C:\Users\Admin\AppData\Local\Temp\5C01.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:2784
                                            • C:\Users\Admin\AppData\Local\Temp\1_1.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1_1.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Checks BIOS information in registry
                                              • Checks whether UAC is enabled
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1208
                                            • C:\Users\Admin\AppData\Local\Temp\ins.exe
                                              "C:\Users\Admin\AppData\Local\Temp\ins.exe"
                                              2⤵
                                              • Executes dropped EXE
                                              • Checks BIOS information in registry
                                              • Identifies Wine through registry keys
                                              • Loads dropped DLL
                                              • Checks whether UAC is enabled
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:1788
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1356
                                                3⤵
                                                • Program crash
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4748
                                          • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                            C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:496
                                          • C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                            C:\Users\Admin\AppData\Local\Temp\603c0340b4\sqtvvs.exe
                                            1⤵
                                            • Executes dropped EXE
                                            PID:4700

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • memory/68-165-0x0000000000400000-0x0000000000422000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/68-181-0x0000000004C60000-0x0000000005266000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/364-250-0x0000000004D60000-0x0000000004D61000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/364-233-0x00000000002A0000-0x00000000002A1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/380-116-0x0000000000400000-0x0000000000409000-memory.dmp

                                            Filesize

                                            36KB

                                          • memory/416-152-0x00000000005B0000-0x00000000005B1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/416-157-0x0000000002920000-0x0000000002996000-memory.dmp

                                            Filesize

                                            472KB

                                          • memory/416-156-0x0000000005410000-0x0000000005411000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/416-155-0x0000000002960000-0x0000000002961000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/416-154-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-178-0x0000000000400000-0x0000000000841000-memory.dmp

                                            Filesize

                                            4.3MB

                                          • memory/620-180-0x0000000003010000-0x0000000003011000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-189-0x00000000055C3000-0x00000000055C4000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-148-0x0000000000CFE000-0x0000000001104000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/620-187-0x00000000055C2000-0x00000000055C3000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-194-0x0000000008260000-0x0000000008261000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-162-0x00000000059E0000-0x0000000005DDF000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/620-193-0x00000000055C4000-0x00000000055C5000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-168-0x0000000005520000-0x0000000005521000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-179-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-176-0x0000000001110000-0x0000000001512000-memory.dmp

                                            Filesize

                                            4.0MB

                                          • memory/848-214-0x0000000006170000-0x000000000618C000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/848-213-0x00000000056A0000-0x00000000056C1000-memory.dmp

                                            Filesize

                                            132KB

                                          • memory/848-199-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/848-201-0x00000000056E0000-0x00000000056E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/848-207-0x0000000005640000-0x00000000056DC000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/1192-184-0x0000000001700000-0x000000000184A000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/1192-161-0x0000000001A46000-0x0000000001A95000-memory.dmp

                                            Filesize

                                            316KB

                                          • memory/1192-191-0x0000000000400000-0x00000000016FF000-memory.dmp

                                            Filesize

                                            19.0MB

                                          • memory/1208-317-0x0000000005380000-0x0000000005381000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1208-306-0x0000000077590000-0x000000007771E000-memory.dmp

                                            Filesize

                                            1.6MB

                                          • memory/1212-222-0x0000000001000000-0x0000000001699000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/1212-337-0x0000000004FF0000-0x00000000055F6000-memory.dmp

                                            Filesize

                                            6.0MB

                                          • memory/1384-138-0x0000000002973000-0x0000000002974000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-137-0x0000000002972000-0x0000000002973000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-144-0x0000000002974000-0x0000000002975000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-143-0x0000000005870000-0x0000000005871000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-142-0x0000000005830000-0x0000000005831000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-128-0x0000000000740000-0x0000000000771000-memory.dmp

                                            Filesize

                                            196KB

                                          • memory/1384-133-0x0000000000890000-0x00000000008AC000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/1384-141-0x0000000005720000-0x0000000005721000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-140-0x0000000002930000-0x0000000002931000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-139-0x0000000005110000-0x0000000005111000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1384-136-0x0000000002970000-0x0000000002971000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/1680-115-0x00000000018E6000-0x00000000018F6000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/1680-118-0x00000000017A0000-0x00000000018EA000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/1788-307-0x0000000077590000-0x000000007771E000-memory.dmp

                                            Filesize

                                            1.6MB

                                          • memory/1788-309-0x0000000000400000-0x000000000071C000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1788-314-0x0000000002800000-0x0000000002801000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2472-335-0x0000000006952000-0x0000000006953000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2472-445-0x0000000006953000-0x0000000006954000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2472-332-0x0000000006950000-0x0000000006951000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2472-411-0x000000007E430000-0x000000007E431000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2496-195-0x0000000002A20000-0x0000000002A21000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2496-202-0x0000000002850000-0x000000000286C000-memory.dmp

                                            Filesize

                                            112KB

                                          • memory/2496-209-0x0000000002A22000-0x0000000002A23000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2496-183-0x0000000000BF0000-0x0000000000C21000-memory.dmp

                                            Filesize

                                            196KB

                                          • memory/2496-210-0x0000000002A23000-0x0000000002A24000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2496-212-0x0000000002A24000-0x0000000002A25000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3028-119-0x0000000001060000-0x0000000001076000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/3048-228-0x0000000000940000-0x0000000000941000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-227-0x0000000000940000-0x0000000000941000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-343-0x00000000047E3000-0x00000000047E4000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-231-0x0000000004700000-0x0000000004701000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-235-0x0000000006EA0000-0x0000000006EA1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-245-0x00000000047E0000-0x00000000047E1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3048-247-0x00000000047E2000-0x00000000047E3000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3168-135-0x0000000000400000-0x00000000016FF000-memory.dmp

                                            Filesize

                                            19.0MB

                                          • memory/3168-124-0x0000000003300000-0x000000000338E000-memory.dmp

                                            Filesize

                                            568KB

                                          • memory/4252-1185-0x0000000006822000-0x0000000006823000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4252-1184-0x0000000006820000-0x0000000006821000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4252-1277-0x000000007EA90000-0x000000007EA91000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4540-373-0x00000000054D0000-0x00000000059CE000-memory.dmp

                                            Filesize

                                            5.0MB

                                          • memory/4692-927-0x00000000046F0000-0x00000000046F1000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4692-943-0x000000007EB80000-0x000000007EB81000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/4692-928-0x00000000046F2000-0x00000000046F3000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5072-766-0x000000007E960000-0x000000007E961000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5072-447-0x0000000004750000-0x0000000004751000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/5072-449-0x0000000004752000-0x0000000004753000-memory.dmp

                                            Filesize

                                            4KB