Analysis

  • max time kernel
    157s
  • max time network
    178s
  • submitted
    01-01-1970 00:00

General

  • Target

    021347cdb984361ddd46204d744a12a1.exe

  • Size

    340KB

  • MD5

    021347cdb984361ddd46204d744a12a1

  • SHA1

    8579b430acf9c6f7f9186499cf3a5ee2031c95ca

  • SHA256

    eb8f89f434eb8bd8b40a2479555ae558e99009fa0d290df552fd69132b3782d2

  • SHA512

    0c039ea2ceb0aff3ba7e3e4170abf908228911b1b33fe36099d7e38bfcbccb2167a03146dcc4f33de714e96246e22d284600c240e2103d6ac4705a0c7b131952

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://xacokuo8.top/

http://hajezey1.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

11111

C2

93.115.20.139:28978

Extracted

Family

vidar

Version

41.6

Botnet

754

C2

https://mas.to/@lilocc

Attributes
  • profile_id

    754

Extracted

Family

redline

Botnet

Star3k

C2

185.244.181.71:2119

Extracted

Family

raccoon

Botnet

60e59be328fbd2ebac1839ea99411dccb00a6f49

Attributes
  • url4cnc

    http://telegin.top/agrybirdsgamerept

    http://ttmirror.top/agrybirdsgamerept

    http://teletele.top/agrybirdsgamerept

    http://telegalive.top/agrybirdsgamerept

    http://toptelete.top/agrybirdsgamerept

    http://telegraf.top/agrybirdsgamerept

    https://t.me/agrybirdsgamerept

rc4.plain
rc4.plain

Extracted

Family

raccoon

Botnet

04256a88c32735dbae9e9e965ae6cfecb37a8ec5

Attributes
  • url4cnc

    http://telegin.top/kaba4ello

    http://ttmirror.top/kaba4ello

    http://teletele.top/kaba4ello

    http://telegalive.top/kaba4ello

    http://toptelete.top/kaba4ello

    http://telegraf.top/kaba4ello

    https://t.me/kaba4ello

rc4.plain
rc4.plain

Signatures

  • Bazar Loader

    Detected loader normally used to deploy BazarBackdoor malware.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Bazar/Team9 Loader payload 2 IoCs
  • Vidar Stealer 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\021347cdb984361ddd46204d744a12a1.exe
    "C:\Users\Admin\AppData\Local\Temp\021347cdb984361ddd46204d744a12a1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\021347cdb984361ddd46204d744a12a1.exe
      "C:\Users\Admin\AppData\Local\Temp\021347cdb984361ddd46204d744a12a1.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:636
  • C:\Users\Admin\AppData\Local\Temp\4605.exe
    C:\Users\Admin\AppData\Local\Temp\4605.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\4605.exe
      C:\Users\Admin\AppData\Local\Temp\4605.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1856
  • C:\Users\Admin\AppData\Local\Temp\4E12.exe
    C:\Users\Admin\AppData\Local\Temp\4E12.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1764
  • C:\Users\Admin\AppData\Local\Temp\50B1.exe
    C:\Users\Admin\AppData\Local\Temp\50B1.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1080
  • C:\Users\Admin\AppData\Local\Temp\5D30.exe
    C:\Users\Admin\AppData\Local\Temp\5D30.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 892
      2⤵
      • Loads dropped DLL
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1948
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\64B0.dll
    1⤵
    • Loads dropped DLL
    PID:2000
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7AC023B5-329F-4C43-865A-A83C643F64EB} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Users\Admin\AppData\Roaming\duidbca
      C:\Users\Admin\AppData\Roaming\duidbca
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Users\Admin\AppData\Roaming\duidbca
        C:\Users\Admin\AppData\Roaming\duidbca
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1160
  • C:\Users\Admin\AppData\Local\Temp\95DE.exe
    C:\Users\Admin\AppData\Local\Temp\95DE.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:112
    • C:\Users\Admin\AppData\Local\Temp\9C36.exe
      C:\Users\Admin\AppData\Local\Temp\9C36.exe
      1⤵
      • Executes dropped EXE
      PID:1188
    • C:\Users\Admin\AppData\Local\Temp\A220.exe
      C:\Users\Admin\AppData\Local\Temp\A220.exe
      1⤵
      • Executes dropped EXE
      PID:1224

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4605.exe
      MD5

      ddfe0f965124405521f188d7b1f31381

      SHA1

      05a1cd94fcd9cc2990019ff48bc9b38e4c890a45

      SHA256

      d3381b800db27bca475d65efd3a0089f7f9097acacb547a81a833c1d42071d62

      SHA512

      05ec0620f3ba88ea919e074d552fdbe3201dc22c8360f22930077d573748e7752d4a9426b5124521c37e927fcbce1b01617202d16001143dfc18df9427ae1a01

    • C:\Users\Admin\AppData\Local\Temp\4605.exe
      MD5

      ddfe0f965124405521f188d7b1f31381

      SHA1

      05a1cd94fcd9cc2990019ff48bc9b38e4c890a45

      SHA256

      d3381b800db27bca475d65efd3a0089f7f9097acacb547a81a833c1d42071d62

      SHA512

      05ec0620f3ba88ea919e074d552fdbe3201dc22c8360f22930077d573748e7752d4a9426b5124521c37e927fcbce1b01617202d16001143dfc18df9427ae1a01

    • C:\Users\Admin\AppData\Local\Temp\4605.exe
      MD5

      ddfe0f965124405521f188d7b1f31381

      SHA1

      05a1cd94fcd9cc2990019ff48bc9b38e4c890a45

      SHA256

      d3381b800db27bca475d65efd3a0089f7f9097acacb547a81a833c1d42071d62

      SHA512

      05ec0620f3ba88ea919e074d552fdbe3201dc22c8360f22930077d573748e7752d4a9426b5124521c37e927fcbce1b01617202d16001143dfc18df9427ae1a01

    • C:\Users\Admin\AppData\Local\Temp\4E12.exe
      MD5

      5aa36223a5f699ed0367927afac55685

      SHA1

      91b88a596e7a36b02d9d2a5ebe77c991b37c938d

      SHA256

      f48b54cfc0d0418200ec86e4b6d7e7b312cfee5ce301c10e4c4b279d554cc4e3

      SHA512

      01f956a0ebfef2627f5c84fd676438de660a62a7d513bcd6de6e5e6a4c439721814c2c9b1da806ca5dbcaa42836dd3375ffd931b6079bded6b4ad8ad11b92d46

    • C:\Users\Admin\AppData\Local\Temp\4E12.exe
      MD5

      5aa36223a5f699ed0367927afac55685

      SHA1

      91b88a596e7a36b02d9d2a5ebe77c991b37c938d

      SHA256

      f48b54cfc0d0418200ec86e4b6d7e7b312cfee5ce301c10e4c4b279d554cc4e3

      SHA512

      01f956a0ebfef2627f5c84fd676438de660a62a7d513bcd6de6e5e6a4c439721814c2c9b1da806ca5dbcaa42836dd3375ffd931b6079bded6b4ad8ad11b92d46

    • C:\Users\Admin\AppData\Local\Temp\50B1.exe
      MD5

      73252acb344040ddc5d9ce78a5d3a4c2

      SHA1

      3a16c3698ccf7940adfb2b2a9cc8c20b1ba1d015

      SHA256

      b8ac77c37de98099dcdc5924418d445f4b11ecf326edd41a2d49ed6efd2a07eb

      SHA512

      1541e3d7bd163a4c348c6e5c7098c6f3add62b1121296ca28934a69ad308c2e51ca6b841359010da96e71fa42fd6e09f7591448433dc3b01104007808427c3de

    • C:\Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • C:\Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • C:\Users\Admin\AppData\Local\Temp\64B0.dll
      MD5

      69783ceed907d4a147fe1ad425dc4ead

      SHA1

      106c93e08687d395d714e31e17f1d664d13fac08

      SHA256

      407661b1fdb6728528ecda377547d3ccd725a6742080c980fbe8219500cf4d70

      SHA512

      5fd780e5cc6e33e944d04f8b2a7612aed4d1365f07707fb8aa3063a7f98b1c1175988562a11c07c12b541e652e515799a08aa382cb66f8f134c876cd65e48b51

    • C:\Users\Admin\AppData\Local\Temp\95DE.exe
      MD5

      8682566a4d3d0456a96c4051c688980a

      SHA1

      44315e10bd6343c1fcd6c3c24b8a11fb30a38eb0

      SHA256

      2348092074326bf8906488be1a794367095a1fd830dccaaa84bd1f3844b66095

      SHA512

      625032d5844f0a099a2da3a14c3a22380b8e85345b2a717cdb67b24b46aadc655394719f6bedb3c0312e91492f7d78afce845e66b48648230da0790aaa8fc628

    • C:\Users\Admin\AppData\Local\Temp\9C36.exe
      MD5

      8eb7f0e2ac52f6e99dea4a7175aa2c27

      SHA1

      5b49d9943b2300e405ff52d174eddc8757f2a694

      SHA256

      3b34ce61962f6f1a5022b093944f499efdbbd255aeecf23c5f246a7a5a9e362c

      SHA512

      f76cb1916fc4438d537fdd08c8da4207a86359d6c5513da17122472dabd5e40326013d5f53224c61a2de0c9a3a63636a470204ed4515db88ae2bdb26fb610be7

    • C:\Users\Admin\AppData\Local\Temp\A220.exe
      MD5

      ee4ae4e32eb534119f5b7b30b9cb6d78

      SHA1

      f4e4c24dc29425ddcda55a800e54038d3af669c4

      SHA256

      3deef042d8a0e2d0a57c67efbf88b8fdca77454b23fcb32a44a2bca6370ecc3d

      SHA512

      13e810d9ad717a6c34092a975adf0781b21286f0543164c5fcb1cc2d64f8b7d8639e7bf72075b83fbb6b762b9c47ff53bdb39b0118310b6e803e7321024662e0

    • C:\Users\Admin\AppData\Roaming\duidbca
      MD5

      021347cdb984361ddd46204d744a12a1

      SHA1

      8579b430acf9c6f7f9186499cf3a5ee2031c95ca

      SHA256

      eb8f89f434eb8bd8b40a2479555ae558e99009fa0d290df552fd69132b3782d2

      SHA512

      0c039ea2ceb0aff3ba7e3e4170abf908228911b1b33fe36099d7e38bfcbccb2167a03146dcc4f33de714e96246e22d284600c240e2103d6ac4705a0c7b131952

    • C:\Users\Admin\AppData\Roaming\duidbca
      MD5

      021347cdb984361ddd46204d744a12a1

      SHA1

      8579b430acf9c6f7f9186499cf3a5ee2031c95ca

      SHA256

      eb8f89f434eb8bd8b40a2479555ae558e99009fa0d290df552fd69132b3782d2

      SHA512

      0c039ea2ceb0aff3ba7e3e4170abf908228911b1b33fe36099d7e38bfcbccb2167a03146dcc4f33de714e96246e22d284600c240e2103d6ac4705a0c7b131952

    • C:\Users\Admin\AppData\Roaming\duidbca
      MD5

      021347cdb984361ddd46204d744a12a1

      SHA1

      8579b430acf9c6f7f9186499cf3a5ee2031c95ca

      SHA256

      eb8f89f434eb8bd8b40a2479555ae558e99009fa0d290df552fd69132b3782d2

      SHA512

      0c039ea2ceb0aff3ba7e3e4170abf908228911b1b33fe36099d7e38bfcbccb2167a03146dcc4f33de714e96246e22d284600c240e2103d6ac4705a0c7b131952

    • \Users\Admin\AppData\Local\Temp\1105.tmp
      MD5

      d124f55b9393c976963407dff51ffa79

      SHA1

      2c7bbedd79791bfb866898c85b504186db610b5d

      SHA256

      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

      SHA512

      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

    • \Users\Admin\AppData\Local\Temp\4605.exe
      MD5

      ddfe0f965124405521f188d7b1f31381

      SHA1

      05a1cd94fcd9cc2990019ff48bc9b38e4c890a45

      SHA256

      d3381b800db27bca475d65efd3a0089f7f9097acacb547a81a833c1d42071d62

      SHA512

      05ec0620f3ba88ea919e074d552fdbe3201dc22c8360f22930077d573748e7752d4a9426b5124521c37e927fcbce1b01617202d16001143dfc18df9427ae1a01

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\5D30.exe
      MD5

      e6904455750065e6351626c373eba2bb

      SHA1

      e2917ff943628d8e9a715c1fadf20688d3e6396e

      SHA256

      18d00aa5277e0aa198dcc2a3bc8cee034cb5e9c808b8220fe46fd18acc5f3010

      SHA512

      838d884ebabda35d4580d9cee1845115d93e5725a3d159a034364f5576baed4ccbf182a42892b8109779d22e52e11db8b57174c2babf7f3787fdf5933e9d3878

    • \Users\Admin\AppData\Local\Temp\64B0.dll
      MD5

      69783ceed907d4a147fe1ad425dc4ead

      SHA1

      106c93e08687d395d714e31e17f1d664d13fac08

      SHA256

      407661b1fdb6728528ecda377547d3ccd725a6742080c980fbe8219500cf4d70

      SHA512

      5fd780e5cc6e33e944d04f8b2a7612aed4d1365f07707fb8aa3063a7f98b1c1175988562a11c07c12b541e652e515799a08aa382cb66f8f134c876cd65e48b51

    • memory/112-153-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/112-152-0x0000000000418D32-mapping.dmp
    • memory/112-146-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/112-154-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/112-156-0x0000000000400000-0x0000000000401000-memory.dmp
      Filesize

      4KB

    • memory/112-147-0x0000000000400000-0x0000000000420000-memory.dmp
      Filesize

      128KB

    • memory/112-159-0x00000000022D0000-0x00000000022D1000-memory.dmp
      Filesize

      4KB

    • memory/636-57-0x00000000767F1000-0x00000000767F3000-memory.dmp
      Filesize

      8KB

    • memory/636-55-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/636-56-0x0000000000402E0C-mapping.dmp
    • memory/1080-79-0x00000000002A0000-0x00000000002A8000-memory.dmp
      Filesize

      32KB

    • memory/1080-67-0x0000000000000000-mapping.dmp
    • memory/1080-80-0x00000000002B0000-0x00000000002B9000-memory.dmp
      Filesize

      36KB

    • memory/1080-85-0x0000000000400000-0x0000000002EFA000-memory.dmp
      Filesize

      43.0MB

    • memory/1100-102-0x00000000002ED000-0x00000000002FD000-memory.dmp
      Filesize

      64KB

    • memory/1100-91-0x0000000000000000-mapping.dmp
    • memory/1160-54-0x000000000024D000-0x000000000025E000-memory.dmp
      Filesize

      68KB

    • memory/1160-58-0x00000000003A0000-0x00000000003A9000-memory.dmp
      Filesize

      36KB

    • memory/1160-104-0x0000000000402E0C-mapping.dmp
    • memory/1188-139-0x0000000000000000-mapping.dmp
    • memory/1188-158-0x0000000000400000-0x0000000002BED000-memory.dmp
      Filesize

      39.9MB

    • memory/1188-143-0x000000000304D000-0x000000000309C000-memory.dmp
      Filesize

      316KB

    • memory/1188-145-0x0000000002E50000-0x0000000002EDE000-memory.dmp
      Filesize

      568KB

    • memory/1224-160-0x0000000002CFD000-0x0000000002D4C000-memory.dmp
      Filesize

      316KB

    • memory/1224-162-0x0000000000320000-0x00000000003AE000-memory.dmp
      Filesize

      568KB

    • memory/1224-141-0x0000000000000000-mapping.dmp
    • memory/1224-163-0x0000000000400000-0x0000000002BED000-memory.dmp
      Filesize

      39.9MB

    • memory/1288-96-0x0000000003AB0000-0x0000000003AC6000-memory.dmp
      Filesize

      88KB

    • memory/1288-117-0x0000000003F70000-0x0000000003F86000-memory.dmp
      Filesize

      88KB

    • memory/1288-101-0x0000000003E60000-0x0000000003E76000-memory.dmp
      Filesize

      88KB

    • memory/1288-59-0x0000000002A80000-0x0000000002A96000-memory.dmp
      Filesize

      88KB

    • memory/1464-60-0x0000000000000000-mapping.dmp
    • memory/1464-69-0x00000000002AD000-0x00000000002BE000-memory.dmp
      Filesize

      68KB

    • memory/1496-125-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/1496-118-0x0000000000000000-mapping.dmp
    • memory/1496-123-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/1496-124-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/1496-121-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1496-127-0x00000000001E0000-0x00000000001E1000-memory.dmp
      Filesize

      4KB

    • memory/1496-128-0x00000000001E0000-0x00000000001E1000-memory.dmp
      Filesize

      4KB

    • memory/1496-130-0x00000000001F0000-0x00000000001F1000-memory.dmp
      Filesize

      4KB

    • memory/1496-131-0x00000000001F0000-0x00000000001F1000-memory.dmp
      Filesize

      4KB

    • memory/1496-133-0x0000000000200000-0x0000000000201000-memory.dmp
      Filesize

      4KB

    • memory/1496-134-0x0000000000200000-0x0000000000201000-memory.dmp
      Filesize

      4KB

    • memory/1496-136-0x0000000000210000-0x0000000000211000-memory.dmp
      Filesize

      4KB

    • memory/1496-137-0x0000000000210000-0x0000000000211000-memory.dmp
      Filesize

      4KB

    • memory/1496-138-0x0000000000400000-0x0000000000A9C000-memory.dmp
      Filesize

      6.6MB

    • memory/1496-120-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1496-122-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/1764-77-0x00000000002A0000-0x00000000002A3000-memory.dmp
      Filesize

      12KB

    • memory/1764-62-0x0000000000000000-mapping.dmp
    • memory/1764-78-0x00000000049B0000-0x00000000049B1000-memory.dmp
      Filesize

      4KB

    • memory/1764-94-0x00000000005D0000-0x00000000005EA000-memory.dmp
      Filesize

      104KB

    • memory/1764-93-0x0000000000310000-0x000000000032E000-memory.dmp
      Filesize

      120KB

    • memory/1764-65-0x0000000000C00000-0x0000000000C01000-memory.dmp
      Filesize

      4KB

    • memory/1856-74-0x0000000000402E0C-mapping.dmp
    • memory/1940-83-0x0000000000000000-mapping.dmp
    • memory/1940-100-0x0000000000400000-0x0000000002F6F000-memory.dmp
      Filesize

      43.4MB

    • memory/1940-99-0x0000000004810000-0x00000000048E6000-memory.dmp
      Filesize

      856KB

    • memory/1940-98-0x00000000002B0000-0x000000000032C000-memory.dmp
      Filesize

      496KB

    • memory/1948-107-0x0000000000000000-mapping.dmp
    • memory/1948-116-0x0000000000990000-0x0000000000991000-memory.dmp
      Filesize

      4KB

    • memory/2000-87-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp
      Filesize

      8KB

    • memory/2000-86-0x0000000000000000-mapping.dmp