Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    24-11-2021 03:37

General

  • Target

    ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b.exe

  • Size

    150KB

  • MD5

    11a916f9500bd66cf55448d7bf6f7cb2

  • SHA1

    258f7f70f43535da8b3c6396f40de4b3a82a5dfb

  • SHA256

    ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

  • SHA512

    95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://nalirou70.top/

http://xacokuo80.top/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

tofsee

C2

quadoil.ru

lakeflex.ru

Extracted

Family

redline

C2

185.159.80.90:38655

Extracted

Family

redline

Botnet

@123

C2

141.95.82.50:63652

Extracted

Family

redline

Botnet

BADMAN2020

C2

147.124.208.247:34932

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 6 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 3 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b.exe
    "C:\Users\Admin\AppData\Local\Temp\ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b.exe
      "C:\Users\Admin\AppData\Local\Temp\ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4356
  • C:\Users\Admin\AppData\Local\Temp\EDDB.exe
    C:\Users\Admin\AppData\Local\Temp\EDDB.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Users\Admin\AppData\Local\Temp\EDDB.exe
      C:\Users\Admin\AppData\Local\Temp\EDDB.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:360
  • C:\Users\Admin\AppData\Local\Temp\F1B5.exe
    C:\Users\Admin\AppData\Local\Temp\F1B5.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3160
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\zyrmrrs\
      2⤵
        PID:652
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exe" C:\Windows\SysWOW64\zyrmrrs\
        2⤵
          PID:480
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create zyrmrrs binPath= "C:\Windows\SysWOW64\zyrmrrs\wpdphbdq.exe /d\"C:\Users\Admin\AppData\Local\Temp\F1B5.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:1580
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description zyrmrrs "wifi internet conection"
            2⤵
              PID:2428
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start zyrmrrs
              2⤵
                PID:2680
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:3928
              • C:\Users\Admin\AppData\Local\Temp\F436.exe
                C:\Users\Admin\AppData\Local\Temp\F436.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3772
                • C:\Users\Admin\AppData\Local\Temp\F436.exe
                  C:\Users\Admin\AppData\Local\Temp\F436.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1252
              • C:\Windows\SysWOW64\zyrmrrs\wpdphbdq.exe
                C:\Windows\SysWOW64\zyrmrrs\wpdphbdq.exe /d"C:\Users\Admin\AppData\Local\Temp\F1B5.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3836
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious use of SetThreadContext
                  • Modifies data under HKEY_USERS
                  • Suspicious use of WriteProcessMemory
                  PID:4204
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4168
              • C:\Users\Admin\AppData\Local\Temp\4E9C.exe
                C:\Users\Admin\AppData\Local\Temp\4E9C.exe
                1⤵
                • Executes dropped EXE
                • Checks SCSI registry key(s)
                • Suspicious behavior: MapViewOfSection
                PID:1008
              • C:\Users\Admin\AppData\Local\Temp\52C3.exe
                C:\Users\Admin\AppData\Local\Temp\52C3.exe
                1⤵
                • Executes dropped EXE
                PID:1200
              • C:\Users\Admin\AppData\Local\Temp\5DC1.exe
                C:\Users\Admin\AppData\Local\Temp\5DC1.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:1772
              • C:\Users\Admin\AppData\Local\Temp\67E4.exe
                C:\Users\Admin\AppData\Local\Temp\67E4.exe
                1⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Checks whether UAC is enabled
                • Suspicious use of AdjustPrivilegeToken
                PID:5064
              • C:\Users\Admin\AppData\Roaming\bjgfefs
                C:\Users\Admin\AppData\Roaming\bjgfefs
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:3720
                • C:\Users\Admin\AppData\Roaming\bjgfefs
                  C:\Users\Admin\AppData\Roaming\bjgfefs
                  2⤵
                  • Executes dropped EXE
                  • Checks SCSI registry key(s)
                  • Suspicious behavior: MapViewOfSection
                  PID:2120

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              New Service

              1
              T1050

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Privilege Escalation

              New Service

              1
              T1050

              Defense Evasion

              Disabling Security Tools

              1
              T1089

              Modify Registry

              2
              T1112

              Virtualization/Sandbox Evasion

              1
              T1497

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              4
              T1012

              Virtualization/Sandbox Evasion

              1
              T1497

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\F436.exe.log
                MD5

                41fbed686f5700fc29aaccf83e8ba7fd

                SHA1

                5271bc29538f11e42a3b600c8dc727186e912456

                SHA256

                df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437

                SHA512

                234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034

              • C:\Users\Admin\AppData\Local\Temp\4E9C.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\4E9C.exe
                MD5

                03651bfa0fa57d86e5a612e0cc81bc09

                SHA1

                67738024bea02128f0d7a9939e193dc706bcd0d8

                SHA256

                48183fd297159559ea5ca3f626bf6ade7bdbaeefec816116a30da7969642ce6b

                SHA512

                b9efdef3230478dc4691034bc7e556c313c536115166e4493f7754755d6ab9515c771f51620a5bf5c21bf19b42eb77d95bd040b0f1d3205c715cb21175cffbd4

              • C:\Users\Admin\AppData\Local\Temp\52C3.exe
                MD5

                b25fdabef081394cfc659b7f9574e323

                SHA1

                84c00d9786f82767814033f70401cb193e0024c0

                SHA256

                ebc4acabf30b159e1a855e529b5c045fa7af9356e70433fa3ce8ce9599b151e6

                SHA512

                42dae5ed2501280d02102d9969a60f7415a688af4db9b93949e1e6c4e3928916e374a9e47416aad32e6eb6f30b0e7966bc699bd13fbbd14b3c7059f8540f45a8

              • C:\Users\Admin\AppData\Local\Temp\52C3.exe
                MD5

                b25fdabef081394cfc659b7f9574e323

                SHA1

                84c00d9786f82767814033f70401cb193e0024c0

                SHA256

                ebc4acabf30b159e1a855e529b5c045fa7af9356e70433fa3ce8ce9599b151e6

                SHA512

                42dae5ed2501280d02102d9969a60f7415a688af4db9b93949e1e6c4e3928916e374a9e47416aad32e6eb6f30b0e7966bc699bd13fbbd14b3c7059f8540f45a8

              • C:\Users\Admin\AppData\Local\Temp\5DC1.exe
                MD5

                cd217b0e6e936f9ae9492ec1a089cdcf

                SHA1

                14ac87815ea815f8997f0a4c751cc352822a7975

                SHA256

                5f5eacd77526de995a9caaaa7a963d18c5f7732b22fad8a0151ac8c25c9baad8

                SHA512

                fbf065be9b4cc648493e4829473902c7c68971a3b59be7908ad5699de69bd9283deab1487d1af05bf2110f4d2468992db6e5af02f26517b8ab376040702e0c73

              • C:\Users\Admin\AppData\Local\Temp\5DC1.exe
                MD5

                cd217b0e6e936f9ae9492ec1a089cdcf

                SHA1

                14ac87815ea815f8997f0a4c751cc352822a7975

                SHA256

                5f5eacd77526de995a9caaaa7a963d18c5f7732b22fad8a0151ac8c25c9baad8

                SHA512

                fbf065be9b4cc648493e4829473902c7c68971a3b59be7908ad5699de69bd9283deab1487d1af05bf2110f4d2468992db6e5af02f26517b8ab376040702e0c73

              • C:\Users\Admin\AppData\Local\Temp\67E4.exe
                MD5

                5bb9ac32655956f1924110c7c9c7adc3

                SHA1

                922d06d96ab2138b8ff8b6c8f7605e2c0c1fb72b

                SHA256

                6b126592ce7ac410aa0c3e68ef95226ae15b02c36f416d74f8e3fc1ea3df7f9d

                SHA512

                86e529e7cc1b4ec583228a098dcd811deafb26be737a07b1fca0c4a8ba91f7dbef29569db5457f94c38a88e65e0e27406e3371da7118a220b78fb3c0f90de4f5

              • C:\Users\Admin\AppData\Local\Temp\67E4.exe
                MD5

                5bb9ac32655956f1924110c7c9c7adc3

                SHA1

                922d06d96ab2138b8ff8b6c8f7605e2c0c1fb72b

                SHA256

                6b126592ce7ac410aa0c3e68ef95226ae15b02c36f416d74f8e3fc1ea3df7f9d

                SHA512

                86e529e7cc1b4ec583228a098dcd811deafb26be737a07b1fca0c4a8ba91f7dbef29569db5457f94c38a88e65e0e27406e3371da7118a220b78fb3c0f90de4f5

              • C:\Users\Admin\AppData\Local\Temp\EDDB.exe
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Users\Admin\AppData\Local\Temp\EDDB.exe
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Users\Admin\AppData\Local\Temp\EDDB.exe
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Users\Admin\AppData\Local\Temp\F1B5.exe
                MD5

                ae26a7d97f24de1ccb18f6e8d5c2b17e

                SHA1

                db1699530d888798f5755c6fa49b510735ee382c

                SHA256

                8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

                SHA512

                08c8c53f698d20167058d26b973c95fe639b7f2b7812c3b8b4ee6a89088d9917ec0ea31a3d34592400976bf2b3419993d7b5207830e396bc89701c5b69b8e723

              • C:\Users\Admin\AppData\Local\Temp\F1B5.exe
                MD5

                ae26a7d97f24de1ccb18f6e8d5c2b17e

                SHA1

                db1699530d888798f5755c6fa49b510735ee382c

                SHA256

                8de70b11b35097da33e0d5dd0e501ab30c1e7848bfa1339ae111208720412a2e

                SHA512

                08c8c53f698d20167058d26b973c95fe639b7f2b7812c3b8b4ee6a89088d9917ec0ea31a3d34592400976bf2b3419993d7b5207830e396bc89701c5b69b8e723

              • C:\Users\Admin\AppData\Local\Temp\F436.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\F436.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\F436.exe
                MD5

                e850bf7dbab0575d6bcde28710be9192

                SHA1

                9d8c748670b02c2e01c6ad894cacd1dd27ba0814

                SHA256

                c5f10feca7a51c7e54414820d37ca533175a78465578b4b03c531c8422a16db0

                SHA512

                4f181a6e43fc116ad9b5c92b762d7609e620b57e3c19009fe88fbbc3a248495a042d4e92644e333c10cb5c774e5237a9e312690a8c98975a9af029ba85087352

              • C:\Users\Admin\AppData\Local\Temp\wpdphbdq.exe
                MD5

                9a7c0049275c4d72f8c781f260892ecb

                SHA1

                12e944982811f7fd3b0ee47310eb539955703d47

                SHA256

                684939c568e03b7fe091529b70956ce9846e18b85983aea05872c7bdad997cee

                SHA512

                57cda1f681080b4376bfb873cf8c7b2e1ee2cfb3093ad4661968310422d5416c662d2b14c99d31af2e1d27837047367f68d2ab8958014161674692366f0069c5

              • C:\Users\Admin\AppData\Roaming\bjgfefs
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Users\Admin\AppData\Roaming\bjgfefs
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Users\Admin\AppData\Roaming\bjgfefs
                MD5

                11a916f9500bd66cf55448d7bf6f7cb2

                SHA1

                258f7f70f43535da8b3c6396f40de4b3a82a5dfb

                SHA256

                ca289ea1659a41dfc4e8919662fbab8c2d69eab65f90e1f61816bb9f98c1850b

                SHA512

                95fa566787dc49d07899ca3a8fd17e39ca9fd89ae164ff70903f3fb5098f89fe71836d20726eba13b17b85f5fd1e3a237960ea0bc3b5bcd2827468cdf1cb89b7

              • C:\Windows\SysWOW64\zyrmrrs\wpdphbdq.exe
                MD5

                9a7c0049275c4d72f8c781f260892ecb

                SHA1

                12e944982811f7fd3b0ee47310eb539955703d47

                SHA256

                684939c568e03b7fe091529b70956ce9846e18b85983aea05872c7bdad997cee

                SHA512

                57cda1f681080b4376bfb873cf8c7b2e1ee2cfb3093ad4661968310422d5416c662d2b14c99d31af2e1d27837047367f68d2ab8958014161674692366f0069c5

              • memory/360-127-0x0000000000402DC6-mapping.dmp
              • memory/480-143-0x0000000000000000-mapping.dmp
              • memory/652-140-0x0000000000000000-mapping.dmp
              • memory/1008-185-0x0000000000000000-mapping.dmp
              • memory/1008-202-0x0000000001170000-0x0000000001179000-memory.dmp
                Filesize

                36KB

              • memory/1008-203-0x0000000000400000-0x0000000001085000-memory.dmp
                Filesize

                12.5MB

              • memory/1200-196-0x000000001B980000-0x000000001B981000-memory.dmp
                Filesize

                4KB

              • memory/1200-195-0x0000000001470000-0x0000000001471000-memory.dmp
                Filesize

                4KB

              • memory/1200-188-0x0000000000000000-mapping.dmp
              • memory/1200-191-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
                Filesize

                4KB

              • memory/1200-197-0x000000001BA20000-0x000000001BA22000-memory.dmp
                Filesize

                8KB

              • memory/1200-193-0x0000000001400000-0x000000000141B000-memory.dmp
                Filesize

                108KB

              • memory/1200-194-0x000000001BB40000-0x000000001BB41000-memory.dmp
                Filesize

                4KB

              • memory/1252-173-0x0000000005BF0000-0x0000000005BF1000-memory.dmp
                Filesize

                4KB

              • memory/1252-169-0x00000000058D0000-0x00000000058D1000-memory.dmp
                Filesize

                4KB

              • memory/1252-178-0x0000000007B00000-0x0000000007B01000-memory.dmp
                Filesize

                4KB

              • memory/1252-177-0x0000000007400000-0x0000000007401000-memory.dmp
                Filesize

                4KB

              • memory/1252-175-0x00000000067E0000-0x00000000067E1000-memory.dmp
                Filesize

                4KB

              • memory/1252-160-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/1252-161-0x0000000000418EEE-mapping.dmp
              • memory/1252-171-0x00000000057A0000-0x0000000005DA6000-memory.dmp
                Filesize

                6.0MB

              • memory/1252-170-0x0000000005910000-0x0000000005911000-memory.dmp
                Filesize

                4KB

              • memory/1252-166-0x0000000005DB0000-0x0000000005DB1000-memory.dmp
                Filesize

                4KB

              • memory/1252-167-0x0000000005830000-0x0000000005831000-memory.dmp
                Filesize

                4KB

              • memory/1252-168-0x0000000005960000-0x0000000005961000-memory.dmp
                Filesize

                4KB

              • memory/1580-147-0x0000000000000000-mapping.dmp
              • memory/1772-263-0x0000000000400000-0x0000000002B5C000-memory.dmp
                Filesize

                39.4MB

              • memory/1772-198-0x0000000000000000-mapping.dmp
              • memory/1772-272-0x0000000004D50000-0x0000000004D7C000-memory.dmp
                Filesize

                176KB

              • memory/1772-266-0x00000000049F0000-0x0000000004A1E000-memory.dmp
                Filesize

                184KB

              • memory/1772-255-0x0000000002DC0000-0x0000000002DF9000-memory.dmp
                Filesize

                228KB

              • memory/1772-253-0x0000000002E78000-0x0000000002EA4000-memory.dmp
                Filesize

                176KB

              • memory/2120-300-0x0000000000402DC6-mapping.dmp
              • memory/2236-246-0x0000000005130000-0x0000000005146000-memory.dmp
                Filesize

                88KB

              • memory/2236-159-0x0000000002D50000-0x0000000002D66000-memory.dmp
                Filesize

                88KB

              • memory/2236-122-0x0000000000D20000-0x0000000000D36000-memory.dmp
                Filesize

                88KB

              • memory/2428-148-0x0000000000000000-mapping.dmp
              • memory/2680-149-0x0000000000000000-mapping.dmp
              • memory/3160-136-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3160-135-0x0000000000680000-0x0000000000693000-memory.dmp
                Filesize

                76KB

              • memory/3160-129-0x0000000000000000-mapping.dmp
              • memory/3160-134-0x0000000000530000-0x000000000067A000-memory.dmp
                Filesize

                1.3MB

              • memory/3772-144-0x0000000004D60000-0x0000000004D61000-memory.dmp
                Filesize

                4KB

              • memory/3772-141-0x0000000004B30000-0x0000000004B31000-memory.dmp
                Filesize

                4KB

              • memory/3772-132-0x0000000000000000-mapping.dmp
              • memory/3772-138-0x00000000002C0000-0x00000000002C1000-memory.dmp
                Filesize

                4KB

              • memory/3772-146-0x0000000005270000-0x0000000005271000-memory.dmp
                Filesize

                4KB

              • memory/3772-142-0x0000000002540000-0x0000000002541000-memory.dmp
                Filesize

                4KB

              • memory/3836-156-0x0000000000440000-0x00000000004EE000-memory.dmp
                Filesize

                696KB

              • memory/3836-157-0x0000000000440000-0x00000000004EE000-memory.dmp
                Filesize

                696KB

              • memory/3836-158-0x0000000000400000-0x0000000000432000-memory.dmp
                Filesize

                200KB

              • memory/3928-151-0x0000000000000000-mapping.dmp
              • memory/4024-121-0x00000000005B0000-0x00000000005B9000-memory.dmp
                Filesize

                36KB

              • memory/4024-120-0x0000000000590000-0x0000000000598000-memory.dmp
                Filesize

                32KB

              • memory/4168-184-0x00000000028F0000-0x00000000029E1000-memory.dmp
                Filesize

                964KB

              • memory/4168-179-0x00000000028F0000-0x00000000029E1000-memory.dmp
                Filesize

                964KB

              • memory/4168-183-0x000000000298259C-mapping.dmp
              • memory/4204-154-0x0000000002E70000-0x0000000002E71000-memory.dmp
                Filesize

                4KB

              • memory/4204-155-0x0000000002E70000-0x0000000002E71000-memory.dmp
                Filesize

                4KB

              • memory/4204-153-0x0000000002F69A6B-mapping.dmp
              • memory/4204-152-0x0000000002F60000-0x0000000002F75000-memory.dmp
                Filesize

                84KB

              • memory/4356-119-0x0000000000402DC6-mapping.dmp
              • memory/4356-118-0x0000000000400000-0x0000000000408000-memory.dmp
                Filesize

                32KB

              • memory/4516-123-0x0000000000000000-mapping.dmp
              • memory/5064-238-0x0000000002800000-0x0000000002801000-memory.dmp
                Filesize

                4KB

              • memory/5064-220-0x00000000028D0000-0x00000000028D1000-memory.dmp
                Filesize

                4KB

              • memory/5064-212-0x00000000028E0000-0x00000000028E1000-memory.dmp
                Filesize

                4KB

              • memory/5064-211-0x0000000000400000-0x0000000000816000-memory.dmp
                Filesize

                4.1MB

              • memory/5064-217-0x0000000002890000-0x0000000002891000-memory.dmp
                Filesize

                4KB

              • memory/5064-219-0x0000000002900000-0x0000000002901000-memory.dmp
                Filesize

                4KB

              • memory/5064-241-0x0000000002830000-0x0000000002831000-memory.dmp
                Filesize

                4KB

              • memory/5064-224-0x0000000006570000-0x0000000006571000-memory.dmp
                Filesize

                4KB

              • memory/5064-222-0x00000000035A0000-0x00000000035A1000-memory.dmp
                Filesize

                4KB

              • memory/5064-226-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-225-0x00000000064F0000-0x00000000064F1000-memory.dmp
                Filesize

                4KB

              • memory/5064-227-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-228-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-229-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-230-0x0000000002480000-0x0000000002481000-memory.dmp
                Filesize

                4KB

              • memory/5064-231-0x0000000002490000-0x0000000002491000-memory.dmp
                Filesize

                4KB

              • memory/5064-232-0x0000000000C90000-0x0000000000C91000-memory.dmp
                Filesize

                4KB

              • memory/5064-233-0x0000000002460000-0x0000000002461000-memory.dmp
                Filesize

                4KB

              • memory/5064-240-0x00000000027C0000-0x00000000027C1000-memory.dmp
                Filesize

                4KB

              • memory/5064-235-0x00000000024D0000-0x00000000024D1000-memory.dmp
                Filesize

                4KB

              • memory/5064-236-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-237-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-213-0x0000000000400000-0x0000000000402000-memory.dmp
                Filesize

                8KB

              • memory/5064-239-0x0000000002810000-0x0000000002811000-memory.dmp
                Filesize

                4KB

              • memory/5064-234-0x00000000024B0000-0x00000000024B1000-memory.dmp
                Filesize

                4KB

              • memory/5064-215-0x00000000028A0000-0x00000000028A1000-memory.dmp
                Filesize

                4KB

              • memory/5064-264-0x00000000029A0000-0x00000000029A1000-memory.dmp
                Filesize

                4KB

              • memory/5064-243-0x00000000027E0000-0x00000000027E1000-memory.dmp
                Filesize

                4KB

              • memory/5064-244-0x0000000002850000-0x0000000002851000-memory.dmp
                Filesize

                4KB

              • memory/5064-245-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-209-0x00000000028C0000-0x00000000028C1000-memory.dmp
                Filesize

                4KB

              • memory/5064-248-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-247-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-249-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-250-0x0000000003590000-0x0000000003591000-memory.dmp
                Filesize

                4KB

              • memory/5064-251-0x0000000000C80000-0x0000000000C81000-memory.dmp
                Filesize

                4KB

              • memory/5064-254-0x0000000002970000-0x0000000002971000-memory.dmp
                Filesize

                4KB

              • memory/5064-208-0x00000000028B0000-0x00000000028B1000-memory.dmp
                Filesize

                4KB

              • memory/5064-207-0x0000000000BD0000-0x0000000000C30000-memory.dmp
                Filesize

                384KB

              • memory/5064-252-0x0000000002960000-0x0000000002961000-memory.dmp
                Filesize

                4KB

              • memory/5064-256-0x0000000002920000-0x0000000002921000-memory.dmp
                Filesize

                4KB

              • memory/5064-257-0x0000000002990000-0x0000000002991000-memory.dmp
                Filesize

                4KB

              • memory/5064-258-0x0000000002950000-0x0000000002951000-memory.dmp
                Filesize

                4KB

              • memory/5064-259-0x0000000002940000-0x0000000002941000-memory.dmp
                Filesize

                4KB

              • memory/5064-260-0x00000000029B0000-0x00000000029B1000-memory.dmp
                Filesize

                4KB

              • memory/5064-261-0x0000000000C80000-0x0000000000C81000-memory.dmp
                Filesize

                4KB

              • memory/5064-262-0x0000000000C80000-0x0000000000C81000-memory.dmp
                Filesize

                4KB

              • memory/5064-210-0x0000000002870000-0x0000000002871000-memory.dmp
                Filesize

                4KB

              • memory/5064-204-0x0000000000000000-mapping.dmp
              • memory/5064-242-0x00000000027F0000-0x00000000027F1000-memory.dmp
                Filesize

                4KB

              • memory/5064-287-0x0000000008550000-0x0000000008551000-memory.dmp
                Filesize

                4KB