Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    12-11-2021 06:59

General

  • Target

    014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1.exe

  • Size

    168KB

  • MD5

    247ced32c02a5b47685b995501feb6b2

  • SHA1

    73cac65d4e2e74b338bd419709d720dd346f675c

  • SHA256

    014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1

  • SHA512

    71635419450e8dad392708a2b1b2f65c68234578aa9f044bcc3d20110685523fc5ab608b62bd1c0689330bcd87f983f3a6841b671ca2a428a3be5d8c05a00773

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

http://nusurtal4f.net/

http://netomishnetojuk.net/

http://escalivrouter.net/

http://nick22doom4.net/

http://wrioshtivsio.su/

http://nusotiso4.su/

http://rickkhtovkka.biz/

http://palisotoliso.net/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

777666777

C2

93.115.20.139:28978

Extracted

Family

redline

Botnet

SuperStar

C2

185.215.113.29:36224

Extracted

Family

raccoon

Botnet

8dec62c1db2959619dca43e02fa46ad7bd606400

Attributes
  • url4cnc

    http://telegin.top/capibar

    http://ttmirror.top/capibar

    http://teletele.top/capibar

    http://telegalive.top/capibar

    http://toptelete.top/capibar

    http://telegraf.top/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

3b6a6d84cf71b37f32ee48af2d71d942e5728827

Attributes
  • url4cnc

    http://185.163.47.176/ramstickmas

    http://91.219.236.240/ramstickmas

    https://t.me/ramstickmas

rc4.plain
rc4.plain

Extracted

Family

redline

Botnet

ss1

C2

86.107.197.248:56626

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
  • suricata: ET MALWARE Known Sinkhole Response Header

    suricata: ET MALWARE Known Sinkhole Response Header

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1.exe
    "C:\Users\Admin\AppData\Local\Temp\014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Users\Admin\AppData\Local\Temp\014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1.exe
      "C:\Users\Admin\AppData\Local\Temp\014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2748
  • C:\Users\Admin\AppData\Local\Temp\EC84.exe
    C:\Users\Admin\AppData\Local\Temp\EC84.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\EC84.exe
      C:\Users\Admin\AppData\Local\Temp\EC84.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1388
  • C:\Users\Admin\AppData\Local\Temp\F33B.exe
    C:\Users\Admin\AppData\Local\Temp\F33B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:2180
  • C:\Users\Admin\AppData\Local\Temp\F5BD.exe
    C:\Users\Admin\AppData\Local\Temp\F5BD.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3928
  • C:\Users\Admin\AppData\Local\Temp\FABF.exe
    C:\Users\Admin\AppData\Local\Temp\FABF.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\FABF.exe
      C:\Users\Admin\AppData\Local\Temp\FABF.exe
      2⤵
      • Executes dropped EXE
      PID:368
  • C:\Users\Admin\AppData\Local\Temp\271.exe
    C:\Users\Admin\AppData\Local\Temp\271.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\271.exe
      C:\Users\Admin\AppData\Local\Temp\271.exe
      2⤵
      • Executes dropped EXE
      PID:1720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 908
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:868
  • C:\Users\Admin\AppData\Local\Temp\612C.exe
    C:\Users\Admin\AppData\Local\Temp\612C.exe
    1⤵
    • Executes dropped EXE
    PID:3932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 928
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:2020
  • C:\Users\Admin\AppData\Local\Temp\644A.exe
    C:\Users\Admin\AppData\Local\Temp\644A.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1312
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 556
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3048
  • C:\Users\Admin\AppData\Local\Temp\6F76.exe
    C:\Users\Admin\AppData\Local\Temp\6F76.exe
    1⤵
    • Executes dropped EXE
    PID:2252

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\271.exe
    MD5

    84dd06d1e6237944e337d213947e1949

    SHA1

    ee6f9e3a5c363d4ac4dcf449a3c1c590886fe8d5

    SHA256

    72f0a495127d1b3e3bbab9ab771ed6adeb94ca7663c282679b9d115e0de1af30

    SHA512

    13f6ff60279e089f3aefb6c57f760bc1377d0452baff33c707be5ff502df01258b5ed6527e729084549a0f50c0af95a412b583abc1779841d9c072f21bea32fb

  • C:\Users\Admin\AppData\Local\Temp\271.exe
    MD5

    84dd06d1e6237944e337d213947e1949

    SHA1

    ee6f9e3a5c363d4ac4dcf449a3c1c590886fe8d5

    SHA256

    72f0a495127d1b3e3bbab9ab771ed6adeb94ca7663c282679b9d115e0de1af30

    SHA512

    13f6ff60279e089f3aefb6c57f760bc1377d0452baff33c707be5ff502df01258b5ed6527e729084549a0f50c0af95a412b583abc1779841d9c072f21bea32fb

  • C:\Users\Admin\AppData\Local\Temp\271.exe
    MD5

    84dd06d1e6237944e337d213947e1949

    SHA1

    ee6f9e3a5c363d4ac4dcf449a3c1c590886fe8d5

    SHA256

    72f0a495127d1b3e3bbab9ab771ed6adeb94ca7663c282679b9d115e0de1af30

    SHA512

    13f6ff60279e089f3aefb6c57f760bc1377d0452baff33c707be5ff502df01258b5ed6527e729084549a0f50c0af95a412b583abc1779841d9c072f21bea32fb

  • C:\Users\Admin\AppData\Local\Temp\612C.exe
    MD5

    1472c1e48438d70f1c8ecc4823f7c302

    SHA1

    bd964115882092b6b1f8128a82fe3b331406b176

    SHA256

    c895a4aacca49a4cbd9eefd65d019ce0ed46480197f6aa2fa4a7e20f932c063f

    SHA512

    854424a8bafd11d01c98ba25ff39f7630005f26b6473847c4649c1911510a69ae8e55f98f0f0ca101b261478c193d29365f617afe38976a3b2685c8de4b7c99b

  • C:\Users\Admin\AppData\Local\Temp\612C.exe
    MD5

    1472c1e48438d70f1c8ecc4823f7c302

    SHA1

    bd964115882092b6b1f8128a82fe3b331406b176

    SHA256

    c895a4aacca49a4cbd9eefd65d019ce0ed46480197f6aa2fa4a7e20f932c063f

    SHA512

    854424a8bafd11d01c98ba25ff39f7630005f26b6473847c4649c1911510a69ae8e55f98f0f0ca101b261478c193d29365f617afe38976a3b2685c8de4b7c99b

  • C:\Users\Admin\AppData\Local\Temp\644A.exe
    MD5

    e0a7b683039209275c83affc28b69b9c

    SHA1

    fcfe89ff43cb4572b918f38be37bb335fc0131e2

    SHA256

    41d64240beae2d1348d23ddfe04388fc4db386d2ce5995b907605c5aa19c9691

    SHA512

    b0505121f4263208dd4bef7874f3ddb0ab31fe57b8beadafec39c18082382a37e199849e63dbf8be6e072e0b3fa10efd3d6bef5b7b4a648a94ea1f6f6e363400

  • C:\Users\Admin\AppData\Local\Temp\644A.exe
    MD5

    e0a7b683039209275c83affc28b69b9c

    SHA1

    fcfe89ff43cb4572b918f38be37bb335fc0131e2

    SHA256

    41d64240beae2d1348d23ddfe04388fc4db386d2ce5995b907605c5aa19c9691

    SHA512

    b0505121f4263208dd4bef7874f3ddb0ab31fe57b8beadafec39c18082382a37e199849e63dbf8be6e072e0b3fa10efd3d6bef5b7b4a648a94ea1f6f6e363400

  • C:\Users\Admin\AppData\Local\Temp\6F76.exe
    MD5

    59354bfd55b12bff79ba0ec273a2aa90

    SHA1

    dc1f7b2b8ab02872730830d9b0451c08b8b5b5c4

    SHA256

    adf0119917dadd42973492a6a59d7ece4931e334c692f5681647fc49354442a9

    SHA512

    51a678808e39752e6e14321c5ec590e240649fa3ca9aa87ad5396f071722d377e0912b3f87febe9ccc68aa68daa44923c97cd4f7999b4ba0cb003a02685cc3df

  • C:\Users\Admin\AppData\Local\Temp\6F76.exe
    MD5

    59354bfd55b12bff79ba0ec273a2aa90

    SHA1

    dc1f7b2b8ab02872730830d9b0451c08b8b5b5c4

    SHA256

    adf0119917dadd42973492a6a59d7ece4931e334c692f5681647fc49354442a9

    SHA512

    51a678808e39752e6e14321c5ec590e240649fa3ca9aa87ad5396f071722d377e0912b3f87febe9ccc68aa68daa44923c97cd4f7999b4ba0cb003a02685cc3df

  • C:\Users\Admin\AppData\Local\Temp\EC84.exe
    MD5

    247ced32c02a5b47685b995501feb6b2

    SHA1

    73cac65d4e2e74b338bd419709d720dd346f675c

    SHA256

    014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1

    SHA512

    71635419450e8dad392708a2b1b2f65c68234578aa9f044bcc3d20110685523fc5ab608b62bd1c0689330bcd87f983f3a6841b671ca2a428a3be5d8c05a00773

  • C:\Users\Admin\AppData\Local\Temp\EC84.exe
    MD5

    247ced32c02a5b47685b995501feb6b2

    SHA1

    73cac65d4e2e74b338bd419709d720dd346f675c

    SHA256

    014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1

    SHA512

    71635419450e8dad392708a2b1b2f65c68234578aa9f044bcc3d20110685523fc5ab608b62bd1c0689330bcd87f983f3a6841b671ca2a428a3be5d8c05a00773

  • C:\Users\Admin\AppData\Local\Temp\EC84.exe
    MD5

    247ced32c02a5b47685b995501feb6b2

    SHA1

    73cac65d4e2e74b338bd419709d720dd346f675c

    SHA256

    014a05cf66c094d54045fe684003fee46bb47043d2dffd994f527d6bfdda3dd1

    SHA512

    71635419450e8dad392708a2b1b2f65c68234578aa9f044bcc3d20110685523fc5ab608b62bd1c0689330bcd87f983f3a6841b671ca2a428a3be5d8c05a00773

  • C:\Users\Admin\AppData\Local\Temp\F33B.exe
    MD5

    605ade73eb76236d94daaea50024fe68

    SHA1

    b8f50f7fb8d667535d13c6209c4c7b0931ac910f

    SHA256

    b0a234a0ddd049c4ae39faf49146ae213163e1d930327b98f1521117f12e3022

    SHA512

    ea6611e9accf6323d6337292cbfa6edc4d08d7c0ed58b41d5a6274b2487ba34d6f80a6b931befb924cfdf22acde223a5a777142146c6001c6179e7a98bcf3926

  • C:\Users\Admin\AppData\Local\Temp\F33B.exe
    MD5

    605ade73eb76236d94daaea50024fe68

    SHA1

    b8f50f7fb8d667535d13c6209c4c7b0931ac910f

    SHA256

    b0a234a0ddd049c4ae39faf49146ae213163e1d930327b98f1521117f12e3022

    SHA512

    ea6611e9accf6323d6337292cbfa6edc4d08d7c0ed58b41d5a6274b2487ba34d6f80a6b931befb924cfdf22acde223a5a777142146c6001c6179e7a98bcf3926

  • C:\Users\Admin\AppData\Local\Temp\F5BD.exe
    MD5

    435b9c498c170c228aaa2006c59e91d0

    SHA1

    49a3706be6ce2bf71fa72402243737a8c2700396

    SHA256

    1dd7a2de3a100eb6258ba36d8714ab63494934bea8a7ec3756ef40c6655e155a

    SHA512

    2b3659d67c2e6e004378d539199d10c77ed6be6dd0ab9e71f8accc975d3fbf5cf7476cda5eb5e6bbcdeeb844f5c69d3b73223e8d35d4d334ade630244e185734

  • C:\Users\Admin\AppData\Local\Temp\F5BD.exe
    MD5

    435b9c498c170c228aaa2006c59e91d0

    SHA1

    49a3706be6ce2bf71fa72402243737a8c2700396

    SHA256

    1dd7a2de3a100eb6258ba36d8714ab63494934bea8a7ec3756ef40c6655e155a

    SHA512

    2b3659d67c2e6e004378d539199d10c77ed6be6dd0ab9e71f8accc975d3fbf5cf7476cda5eb5e6bbcdeeb844f5c69d3b73223e8d35d4d334ade630244e185734

  • C:\Users\Admin\AppData\Local\Temp\FABF.exe
    MD5

    55f767f7c0930ba7602b4ec5cedda1c6

    SHA1

    593a04410c61a7e24a12cbec2bf1acdedd41f158

    SHA256

    1a9d9e4662641473521f34ea5c9082fdd523927075aade87d334b602943d3bc3

    SHA512

    5b51a7039cbea2e911564ee62d6956ac5494197d80421b4ec26cbae642c7a2516fa3551e7cf50d720ffcb39119bc54fbf63adc4ff6ac700a1d33b1f10d1a621c

  • C:\Users\Admin\AppData\Local\Temp\FABF.exe
    MD5

    55f767f7c0930ba7602b4ec5cedda1c6

    SHA1

    593a04410c61a7e24a12cbec2bf1acdedd41f158

    SHA256

    1a9d9e4662641473521f34ea5c9082fdd523927075aade87d334b602943d3bc3

    SHA512

    5b51a7039cbea2e911564ee62d6956ac5494197d80421b4ec26cbae642c7a2516fa3551e7cf50d720ffcb39119bc54fbf63adc4ff6ac700a1d33b1f10d1a621c

  • C:\Users\Admin\AppData\Local\Temp\FABF.exe
    MD5

    55f767f7c0930ba7602b4ec5cedda1c6

    SHA1

    593a04410c61a7e24a12cbec2bf1acdedd41f158

    SHA256

    1a9d9e4662641473521f34ea5c9082fdd523927075aade87d334b602943d3bc3

    SHA512

    5b51a7039cbea2e911564ee62d6956ac5494197d80421b4ec26cbae642c7a2516fa3551e7cf50d720ffcb39119bc54fbf63adc4ff6ac700a1d33b1f10d1a621c

  • \Users\Admin\AppData\Local\Temp\1105.tmp
    MD5

    50741b3f2d7debf5d2bed63d88404029

    SHA1

    56210388a627b926162b36967045be06ffb1aad3

    SHA256

    f2f8732ae464738372ff274b7e481366cecdd2337210d4a3cbcd089c958a730c

    SHA512

    fac6bfe35b1ee08b3d42d330516a260d9cdb4a90bbb0491411a583029b92a59d20af3552372ea8fb3f59442b3945bf524ef284127f397ae7179467080be8e9b3

  • memory/368-172-0x0000000004BB4000-0x0000000004BB6000-memory.dmp
    Filesize

    8KB

  • memory/368-152-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/368-164-0x00000000050C0000-0x00000000050C1000-memory.dmp
    Filesize

    4KB

  • memory/368-163-0x0000000002600000-0x000000000261B000-memory.dmp
    Filesize

    108KB

  • memory/368-162-0x0000000004BB3000-0x0000000004BB4000-memory.dmp
    Filesize

    4KB

  • memory/368-171-0x00000000057E0000-0x00000000057E1000-memory.dmp
    Filesize

    4KB

  • memory/368-161-0x0000000004BB2000-0x0000000004BB3000-memory.dmp
    Filesize

    4KB

  • memory/368-165-0x0000000004B00000-0x0000000004B01000-memory.dmp
    Filesize

    4KB

  • memory/368-155-0x00000000024B0000-0x00000000024CC000-memory.dmp
    Filesize

    112KB

  • memory/368-160-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
    Filesize

    4KB

  • memory/368-159-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
    Filesize

    4KB

  • memory/368-158-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/368-166-0x00000000056D0000-0x00000000056D1000-memory.dmp
    Filesize

    4KB

  • memory/368-153-0x000000000040CD2F-mapping.dmp
  • memory/368-167-0x0000000004B30000-0x0000000004B31000-memory.dmp
    Filesize

    4KB

  • memory/1216-185-0x00000000048C0000-0x0000000004923000-memory.dmp
    Filesize

    396KB

  • memory/1216-181-0x0000000000400000-0x0000000002BB3000-memory.dmp
    Filesize

    39.7MB

  • memory/1216-186-0x0000000004940000-0x00000000049B0000-memory.dmp
    Filesize

    448KB

  • memory/1216-177-0x0000000004820000-0x00000000048A3000-memory.dmp
    Filesize

    524KB

  • memory/1216-176-0x0000000002C66000-0x0000000002CDE000-memory.dmp
    Filesize

    480KB

  • memory/1216-168-0x0000000000000000-mapping.dmp
  • memory/1284-126-0x0000000000440000-0x00000000004EE000-memory.dmp
    Filesize

    696KB

  • memory/1284-127-0x00000000005A0000-0x00000000005A9000-memory.dmp
    Filesize

    36KB

  • memory/1284-123-0x0000000000000000-mapping.dmp
  • memory/1312-260-0x00000000007C0000-0x00000000007E0000-memory.dmp
    Filesize

    128KB

  • memory/1312-284-0x0000000008FF0000-0x0000000008FF1000-memory.dmp
    Filesize

    4KB

  • memory/1312-265-0x00000000007D8EFA-mapping.dmp
  • memory/1312-287-0x0000000009C90000-0x0000000009C91000-memory.dmp
    Filesize

    4KB

  • memory/1312-286-0x000000000A290000-0x000000000A291000-memory.dmp
    Filesize

    4KB

  • memory/1312-285-0x0000000009C10000-0x0000000009C11000-memory.dmp
    Filesize

    4KB

  • memory/1312-267-0x0000000000610000-0x0000000000611000-memory.dmp
    Filesize

    4KB

  • memory/1312-269-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/1312-266-0x0000000000610000-0x0000000000611000-memory.dmp
    Filesize

    4KB

  • memory/1312-268-0x0000000000610000-0x0000000000611000-memory.dmp
    Filesize

    4KB

  • memory/1312-277-0x0000000000610000-0x0000000000611000-memory.dmp
    Filesize

    4KB

  • memory/1388-129-0x0000000000402DC6-mapping.dmp
  • memory/1720-187-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1720-188-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1720-189-0x0000000000590000-0x00000000006DA000-memory.dmp
    Filesize

    1.3MB

  • memory/1720-190-0x0000000000710000-0x000000000079E000-memory.dmp
    Filesize

    568KB

  • memory/1720-182-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1720-191-0x0000000000400000-0x0000000000491000-memory.dmp
    Filesize

    580KB

  • memory/1720-183-0x0000000000402998-mapping.dmp
  • memory/2180-138-0x0000000002360000-0x000000000237B000-memory.dmp
    Filesize

    108KB

  • memory/2180-136-0x0000000000950000-0x0000000000951000-memory.dmp
    Filesize

    4KB

  • memory/2180-179-0x000000001D140000-0x000000001D141000-memory.dmp
    Filesize

    4KB

  • memory/2180-175-0x00000000023C0000-0x00000000023C1000-memory.dmp
    Filesize

    4KB

  • memory/2180-174-0x000000001B940000-0x000000001B941000-memory.dmp
    Filesize

    4KB

  • memory/2180-131-0x0000000000000000-mapping.dmp
  • memory/2180-134-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/2180-180-0x000000001D840000-0x000000001D841000-memory.dmp
    Filesize

    4KB

  • memory/2180-137-0x000000001AF00000-0x000000001AF02000-memory.dmp
    Filesize

    8KB

  • memory/2180-144-0x0000000002400000-0x0000000002401000-memory.dmp
    Filesize

    4KB

  • memory/2180-142-0x000000001BA50000-0x000000001BA51000-memory.dmp
    Filesize

    4KB

  • memory/2180-143-0x00000000023A0000-0x00000000023A1000-memory.dmp
    Filesize

    4KB

  • memory/2252-254-0x0000000000000000-mapping.dmp
  • memory/2252-257-0x0000000000940000-0x000000000100A000-memory.dmp
    Filesize

    6.8MB

  • memory/2288-205-0x00000000027F0000-0x00000000027F1000-memory.dmp
    Filesize

    4KB

  • memory/2288-227-0x00000000027B0000-0x00000000027B1000-memory.dmp
    Filesize

    4KB

  • memory/2288-199-0x0000000000400000-0x00000000007AF000-memory.dmp
    Filesize

    3.7MB

  • memory/2288-200-0x0000000000400000-0x00000000007AF000-memory.dmp
    Filesize

    3.7MB

  • memory/2288-201-0x0000000002310000-0x0000000002370000-memory.dmp
    Filesize

    384KB

  • memory/2288-202-0x0000000000400000-0x00000000007AF000-memory.dmp
    Filesize

    3.7MB

  • memory/2288-203-0x0000000002830000-0x0000000002831000-memory.dmp
    Filesize

    4KB

  • memory/2288-195-0x0000000000000000-mapping.dmp
  • memory/2288-204-0x0000000002840000-0x0000000002841000-memory.dmp
    Filesize

    4KB

  • memory/2288-207-0x0000000002820000-0x0000000002821000-memory.dmp
    Filesize

    4KB

  • memory/2288-206-0x0000000002860000-0x0000000002861000-memory.dmp
    Filesize

    4KB

  • memory/2288-208-0x0000000002810000-0x0000000002811000-memory.dmp
    Filesize

    4KB

  • memory/2288-209-0x0000000002880000-0x0000000002881000-memory.dmp
    Filesize

    4KB

  • memory/2288-210-0x0000000002850000-0x0000000002851000-memory.dmp
    Filesize

    4KB

  • memory/2288-211-0x0000000003520000-0x0000000003521000-memory.dmp
    Filesize

    4KB

  • memory/2288-212-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-213-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-214-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-215-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-216-0x0000000002410000-0x0000000002411000-memory.dmp
    Filesize

    4KB

  • memory/2288-218-0x00000000023D0000-0x00000000023D1000-memory.dmp
    Filesize

    4KB

  • memory/2288-219-0x00000000023F0000-0x00000000023F1000-memory.dmp
    Filesize

    4KB

  • memory/2288-221-0x0000000002670000-0x0000000002671000-memory.dmp
    Filesize

    4KB

  • memory/2288-222-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-220-0x0000000002440000-0x0000000002441000-memory.dmp
    Filesize

    4KB

  • memory/2288-217-0x0000000002420000-0x0000000002421000-memory.dmp
    Filesize

    4KB

  • memory/2288-223-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-225-0x0000000002790000-0x0000000002791000-memory.dmp
    Filesize

    4KB

  • memory/2288-226-0x0000000002740000-0x0000000002741000-memory.dmp
    Filesize

    4KB

  • memory/2288-198-0x0000000000400000-0x00000000007AF000-memory.dmp
    Filesize

    3.7MB

  • memory/2288-229-0x0000000002760000-0x0000000002761000-memory.dmp
    Filesize

    4KB

  • memory/2288-228-0x0000000002770000-0x0000000002771000-memory.dmp
    Filesize

    4KB

  • memory/2288-224-0x0000000002780000-0x0000000002781000-memory.dmp
    Filesize

    4KB

  • memory/2288-231-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-230-0x00000000027D0000-0x00000000027D1000-memory.dmp
    Filesize

    4KB

  • memory/2288-233-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-232-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-235-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-234-0x0000000003510000-0x0000000003511000-memory.dmp
    Filesize

    4KB

  • memory/2288-237-0x00000000028E0000-0x00000000028E1000-memory.dmp
    Filesize

    4KB

  • memory/2288-236-0x00000000023C0000-0x00000000023C1000-memory.dmp
    Filesize

    4KB

  • memory/2288-238-0x00000000028F0000-0x00000000028F1000-memory.dmp
    Filesize

    4KB

  • memory/2604-146-0x0000000000000000-mapping.dmp
  • memory/2604-156-0x00000000004C0000-0x000000000056E000-memory.dmp
    Filesize

    696KB

  • memory/2604-157-0x0000000002080000-0x00000000020B0000-memory.dmp
    Filesize

    192KB

  • memory/2680-120-0x00000000004D0000-0x000000000061A000-memory.dmp
    Filesize

    1.3MB

  • memory/2680-121-0x00000000004D0000-0x000000000061A000-memory.dmp
    Filesize

    1.3MB

  • memory/2748-119-0x0000000000402DC6-mapping.dmp
  • memory/2748-118-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3040-122-0x0000000000CD0000-0x0000000000CE6000-memory.dmp
    Filesize

    88KB

  • memory/3040-173-0x0000000002C90000-0x0000000002CA6000-memory.dmp
    Filesize

    88KB

  • memory/3040-178-0x0000000002DD0000-0x0000000002DE6000-memory.dmp
    Filesize

    88KB

  • memory/3928-139-0x0000000000000000-mapping.dmp
  • memory/3928-150-0x0000000000640000-0x0000000000649000-memory.dmp
    Filesize

    36KB

  • memory/3928-151-0x0000000000400000-0x0000000000439000-memory.dmp
    Filesize

    228KB

  • memory/3928-149-0x0000000000620000-0x0000000000628000-memory.dmp
    Filesize

    32KB

  • memory/3932-192-0x0000000000000000-mapping.dmp