Analysis

  • max time kernel
    152s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    04-12-2021 07:02

General

  • Target

    bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a.exe

  • Size

    248KB

  • MD5

    26de68582574616729ab05e2b92e194d

  • SHA1

    e47c2eaeb157e1a51699d9139467511ec3b2ad6c

  • SHA256

    bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a

  • SHA512

    b555ee23a8f26f32fc186421b0d74cc6474e70ae6bdf732b9afd64768bc3179d08813a0ba82608a5e8c8172415689d2d820234f6b6c6a594e0170ed502435bae

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

049dc5184bb65eb56e4e860bf61427e2a0fcba1e

Attributes
  • url4cnc

    http://185.225.19.18/duglassa1

    http://91.219.237.227/duglassa1

    https://t.me/duglassa1

rc4.plain
rc4.plain

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

b620be4c85b4051a92040003edbc322be4eb082d

Attributes
  • url4cnc

    http://91.219.236.207/capibar

    http://185.225.19.18/capibar

    http://91.219.237.227/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 14 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Local\Temp\bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a.exe
      "C:\Users\Admin\AppData\Local\Temp\bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:4048
  • C:\Users\Admin\AppData\Local\Temp\2A87.exe
    C:\Users\Admin\AppData\Local\Temp\2A87.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Users\Admin\AppData\Local\Temp\2A87.exe
      C:\Users\Admin\AppData\Local\Temp\2A87.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:4084
  • C:\Users\Admin\AppData\Local\Temp\3788.exe
    C:\Users\Admin\AppData\Local\Temp\3788.exe
    1⤵
    • Executes dropped EXE
    PID:1872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 492
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1620
  • C:\Users\Admin\AppData\Local\Temp\9113.exe
    C:\Users\Admin\AppData\Local\Temp\9113.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\9113.exe
      C:\Users\Admin\AppData\Local\Temp\9113.exe
      2⤵
      • Executes dropped EXE
      PID:1204
  • C:\Users\Admin\AppData\Local\Temp\9980.exe
    C:\Users\Admin\AppData\Local\Temp\9980.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1124
  • C:\Users\Admin\AppData\Local\Temp\A96F.exe
    C:\Users\Admin\AppData\Local\Temp\A96F.exe
    1⤵
    • Executes dropped EXE
    PID:3976
  • C:\Users\Admin\AppData\Local\Temp\B893.exe
    C:\Users\Admin\AppData\Local\Temp\B893.exe
    1⤵
    • Executes dropped EXE
    PID:1724
  • C:\Users\Admin\AppData\Local\Temp\DA45.exe
    C:\Users\Admin\AppData\Local\Temp\DA45.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Windows\SysWOW64\expand.exe
      expand
      2⤵
        PID:3052
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Confronto.vsd
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2324
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^zsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDk$" Che.vsd
            4⤵
              PID:1740
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com
              Ritroverai.exe.com B
              4⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3800
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B
                5⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1948
                • C:\Windows\SysWOW64\nslookup.exe
                  C:\Windows\SysWOW64\nslookup.exe
                  6⤵
                    PID:2752
              • C:\Windows\SysWOW64\PING.EXE
                ping JQKTJDNJ
                4⤵
                • Runs ping.exe
                PID:2728

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Credential Access

        Credentials in Files

        2
        T1081

        Discovery

        Query Registry

        2
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Collection

        Data from Local System

        2
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2A87.exe
          MD5

          26de68582574616729ab05e2b92e194d

          SHA1

          e47c2eaeb157e1a51699d9139467511ec3b2ad6c

          SHA256

          bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a

          SHA512

          b555ee23a8f26f32fc186421b0d74cc6474e70ae6bdf732b9afd64768bc3179d08813a0ba82608a5e8c8172415689d2d820234f6b6c6a594e0170ed502435bae

        • C:\Users\Admin\AppData\Local\Temp\2A87.exe
          MD5

          26de68582574616729ab05e2b92e194d

          SHA1

          e47c2eaeb157e1a51699d9139467511ec3b2ad6c

          SHA256

          bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a

          SHA512

          b555ee23a8f26f32fc186421b0d74cc6474e70ae6bdf732b9afd64768bc3179d08813a0ba82608a5e8c8172415689d2d820234f6b6c6a594e0170ed502435bae

        • C:\Users\Admin\AppData\Local\Temp\2A87.exe
          MD5

          26de68582574616729ab05e2b92e194d

          SHA1

          e47c2eaeb157e1a51699d9139467511ec3b2ad6c

          SHA256

          bc9c4f264ca61d4022f1e0adb9ed160cadf0161968ed1839c8c4ef4752bc298a

          SHA512

          b555ee23a8f26f32fc186421b0d74cc6474e70ae6bdf732b9afd64768bc3179d08813a0ba82608a5e8c8172415689d2d820234f6b6c6a594e0170ed502435bae

        • C:\Users\Admin\AppData\Local\Temp\3788.exe
          MD5

          df13fac0d8b182e4d8b9a02ba87a9571

          SHA1

          b2187debc6fde96e08d5014ce4f1af5cf568bce5

          SHA256

          af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3

          SHA512

          bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816

        • C:\Users\Admin\AppData\Local\Temp\3788.exe
          MD5

          df13fac0d8b182e4d8b9a02ba87a9571

          SHA1

          b2187debc6fde96e08d5014ce4f1af5cf568bce5

          SHA256

          af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3

          SHA512

          bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816

        • C:\Users\Admin\AppData\Local\Temp\9113.exe
          MD5

          61a3807e15231687f38358e3ae6b670c

          SHA1

          b577ef08f60b55811aa5b8b93e5b3755b899115f

          SHA256

          56283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1

          SHA512

          8dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4

        • C:\Users\Admin\AppData\Local\Temp\9113.exe
          MD5

          61a3807e15231687f38358e3ae6b670c

          SHA1

          b577ef08f60b55811aa5b8b93e5b3755b899115f

          SHA256

          56283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1

          SHA512

          8dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4

        • C:\Users\Admin\AppData\Local\Temp\9113.exe
          MD5

          61a3807e15231687f38358e3ae6b670c

          SHA1

          b577ef08f60b55811aa5b8b93e5b3755b899115f

          SHA256

          56283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1

          SHA512

          8dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4

        • C:\Users\Admin\AppData\Local\Temp\9980.exe
          MD5

          4df0d4be3b3abb5ca237d11013411885

          SHA1

          7b9376e633769eb52a70ec887143826f924f6fee

          SHA256

          2cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813

          SHA512

          14e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7

        • C:\Users\Admin\AppData\Local\Temp\9980.exe
          MD5

          4df0d4be3b3abb5ca237d11013411885

          SHA1

          7b9376e633769eb52a70ec887143826f924f6fee

          SHA256

          2cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813

          SHA512

          14e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7

        • C:\Users\Admin\AppData\Local\Temp\A96F.exe
          MD5

          4d96f213bfbba34ffba4986724d3a99c

          SHA1

          b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526

          SHA256

          f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7

          SHA512

          4e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937

        • C:\Users\Admin\AppData\Local\Temp\A96F.exe
          MD5

          4d96f213bfbba34ffba4986724d3a99c

          SHA1

          b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526

          SHA256

          f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7

          SHA512

          4e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937

        • C:\Users\Admin\AppData\Local\Temp\B893.exe
          MD5

          2e19613dc4b7b13c47312bfdf4ec399c

          SHA1

          6809a37a40a224029f07c62c6308121e5d84290d

          SHA256

          ed7edd291d4c2cc21f2c75af41f1d32b2e6ae6973236d1715d83f01c76811021

          SHA512

          b939889905b7c28b217946b2185da12098ac45d0d6fe602253644d2d30f9d6c8db753c84df5cd6548c2a3b390b1c69915735240864ea0e722bfeaec05aeb620a

        • C:\Users\Admin\AppData\Local\Temp\B893.exe
          MD5

          2e19613dc4b7b13c47312bfdf4ec399c

          SHA1

          6809a37a40a224029f07c62c6308121e5d84290d

          SHA256

          ed7edd291d4c2cc21f2c75af41f1d32b2e6ae6973236d1715d83f01c76811021

          SHA512

          b939889905b7c28b217946b2185da12098ac45d0d6fe602253644d2d30f9d6c8db753c84df5cd6548c2a3b390b1c69915735240864ea0e722bfeaec05aeb620a

        • C:\Users\Admin\AppData\Local\Temp\DA45.exe
          MD5

          a9bc4aeb94664b8938a00b5301225d7a

          SHA1

          9a0ecb70fc029faeb968de0e639537d6baf525e4

          SHA256

          94e99f4dbbf9739b71ee8dad26651b8cd01cd3c5bb6eb97da26d88991351cf6b

          SHA512

          3382be368a3d4fc9cf3016dc2bcfc0eb6bf3345ba644441b2e1d8b4f37831216681b5c18e8692c3ea96f1b12df52255dffcc2ab85e5068609cc573b0ff98988c

        • C:\Users\Admin\AppData\Local\Temp\DA45.exe
          MD5

          a9bc4aeb94664b8938a00b5301225d7a

          SHA1

          9a0ecb70fc029faeb968de0e639537d6baf525e4

          SHA256

          94e99f4dbbf9739b71ee8dad26651b8cd01cd3c5bb6eb97da26d88991351cf6b

          SHA512

          3382be368a3d4fc9cf3016dc2bcfc0eb6bf3345ba644441b2e1d8b4f37831216681b5c18e8692c3ea96f1b12df52255dffcc2ab85e5068609cc573b0ff98988c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B
          MD5

          9c8b1ff7225c8a2a275da1429a4def68

          SHA1

          327b06f14e19ea05ea4098a876e791957ab5564e

          SHA256

          d8cae76147cc93bd2bbbd286e773e9bff830ed53982c13634ac2aea102d39e48

          SHA512

          64e7549f98674882724a190057bc2e34c77ff89b137ae33d98c26944507179d60d9d784e4240e4e89d1dfc5ddfe10a7c6b3c687551f6671caebb36c45b12e165

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Che.vsd
          MD5

          b244d053acb999b59be3eba3e2d082d5

          SHA1

          0cf0b6dce77473217b49e6728d93433ccbcefe4e

          SHA256

          c9348064a4b8f7fdc331e7953153a6fa57b2d5763638a79116e0d3704c671f69

          SHA512

          f4f44e5fa2fe3b1d6999bde94a39c5acb430a1cac4549eb1f57218437e4252ea077ab5797fdd73ad7a8b0e162aa41b0a07cf82feb31821ab35d425e09365101b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Confronto.vsd
          MD5

          991bf94339253ad1a6c45684affb3814

          SHA1

          5055c39fd2ed129a2687bb334a79e9d7f3d76f83

          SHA256

          94e1685a4ea5fdca28260d8c7a187c8d2647955346afa08ef766ca090208081d

          SHA512

          2ca36a2601c2167ac6f7cf45ee2a8c60f299f880642009e3a580dacc1a3eb4ac1c6ae07817aeb02c54d947272dff17f53667c05983c6259652c708dc9697fbad

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Istante.vsd
          MD5

          9c8b1ff7225c8a2a275da1429a4def68

          SHA1

          327b06f14e19ea05ea4098a876e791957ab5564e

          SHA256

          d8cae76147cc93bd2bbbd286e773e9bff830ed53982c13634ac2aea102d39e48

          SHA512

          64e7549f98674882724a190057bc2e34c77ff89b137ae33d98c26944507179d60d9d784e4240e4e89d1dfc5ddfe10a7c6b3c687551f6671caebb36c45b12e165

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com
          MD5

          c56b5f0201a3b3de53e561fe76912bfd

          SHA1

          2a4062e10a5de813f5688221dbeb3f3ff33eb417

          SHA256

          237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

          SHA512

          195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

        • memory/1124-160-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
          Filesize

          4KB

        • memory/1124-176-0x0000000004ED0000-0x0000000004ED1000-memory.dmp
          Filesize

          4KB

        • memory/1124-144-0x0000000001240000-0x00000000013B5000-memory.dmp
          Filesize

          1.5MB

        • memory/1124-145-0x0000000000050000-0x0000000000051000-memory.dmp
          Filesize

          4KB

        • memory/1124-146-0x0000000075A60000-0x0000000075C22000-memory.dmp
          Filesize

          1.8MB

        • memory/1124-147-0x0000000074940000-0x0000000074A31000-memory.dmp
          Filesize

          964KB

        • memory/1124-148-0x0000000001240000-0x0000000001241000-memory.dmp
          Filesize

          4KB

        • memory/1124-150-0x0000000071B90000-0x0000000071C10000-memory.dmp
          Filesize

          512KB

        • memory/1124-151-0x00000000051D0000-0x00000000051D1000-memory.dmp
          Filesize

          4KB

        • memory/1124-152-0x0000000000CF0000-0x0000000000D33000-memory.dmp
          Filesize

          268KB

        • memory/1124-153-0x0000000000640000-0x0000000000641000-memory.dmp
          Filesize

          4KB

        • memory/1124-154-0x0000000004A00000-0x0000000004A01000-memory.dmp
          Filesize

          4KB

        • memory/1124-155-0x0000000004BC0000-0x0000000004BC1000-memory.dmp
          Filesize

          4KB

        • memory/1124-156-0x0000000004A60000-0x0000000004A61000-memory.dmp
          Filesize

          4KB

        • memory/1124-157-0x0000000074F00000-0x0000000075484000-memory.dmp
          Filesize

          5.5MB

        • memory/1124-159-0x0000000004BB0000-0x0000000004BB1000-memory.dmp
          Filesize

          4KB

        • memory/1124-158-0x00000000767D0000-0x0000000077B18000-memory.dmp
          Filesize

          19.3MB

        • memory/1124-161-0x000000006FE50000-0x000000006FE9B000-memory.dmp
          Filesize

          300KB

        • memory/1124-182-0x0000000006450000-0x0000000006451000-memory.dmp
          Filesize

          4KB

        • memory/1124-181-0x0000000006BB0000-0x0000000006BB1000-memory.dmp
          Filesize

          4KB

        • memory/1124-180-0x00000000064B0000-0x00000000064B1000-memory.dmp
          Filesize

          4KB

        • memory/1124-179-0x0000000005A50000-0x0000000005A51000-memory.dmp
          Filesize

          4KB

        • memory/1124-178-0x0000000004EB0000-0x0000000004EB1000-memory.dmp
          Filesize

          4KB

        • memory/1124-177-0x0000000005CE0000-0x0000000005CE1000-memory.dmp
          Filesize

          4KB

        • memory/1124-141-0x0000000000000000-mapping.dmp
        • memory/1124-175-0x0000000004DB0000-0x0000000004DB1000-memory.dmp
          Filesize

          4KB

        • memory/1204-189-0x0000000000400000-0x0000000003269000-memory.dmp
          Filesize

          46.4MB

        • memory/1204-183-0x00000000033AC000-0x00000000033FB000-memory.dmp
          Filesize

          316KB

        • memory/1204-185-0x0000000004E80000-0x0000000004F0F000-memory.dmp
          Filesize

          572KB

        • memory/1204-184-0x0000000000400000-0x0000000003269000-memory.dmp
          Filesize

          46.4MB

        • memory/1204-171-0x0000000000400000-0x0000000003269000-memory.dmp
          Filesize

          46.4MB

        • memory/1204-163-0x0000000000400000-0x0000000003269000-memory.dmp
          Filesize

          46.4MB

        • memory/1204-164-0x0000000000456A80-mapping.dmp
        • memory/1684-138-0x0000000000000000-mapping.dmp
        • memory/1684-169-0x0000000000760000-0x00000000007EF000-memory.dmp
          Filesize

          572KB

        • memory/1724-187-0x0000000002150000-0x00000000021DF000-memory.dmp
          Filesize

          572KB

        • memory/1724-172-0x0000000000000000-mapping.dmp
        • memory/1724-186-0x0000000000538000-0x0000000000587000-memory.dmp
          Filesize

          316KB

        • memory/1724-188-0x0000000000400000-0x0000000000491000-memory.dmp
          Filesize

          580KB

        • memory/1740-197-0x0000000000000000-mapping.dmp
        • memory/1852-190-0x0000000000000000-mapping.dmp
        • memory/1872-130-0x0000000000000000-mapping.dmp
        • memory/1872-136-0x0000000000400000-0x0000000002B64000-memory.dmp
          Filesize

          39.4MB

        • memory/1872-134-0x0000000002C90000-0x0000000002C99000-memory.dmp
          Filesize

          36KB

        • memory/1872-135-0x0000000002CA0000-0x0000000002CA9000-memory.dmp
          Filesize

          36KB

        • memory/1948-205-0x0000000000000000-mapping.dmp
        • memory/2324-196-0x0000000000000000-mapping.dmp
        • memory/2668-118-0x00000000005E9000-0x00000000005F2000-memory.dmp
          Filesize

          36KB

        • memory/2668-119-0x00000000001D0000-0x00000000001D9000-memory.dmp
          Filesize

          36KB

        • memory/2728-202-0x0000000000000000-mapping.dmp
        • memory/2960-137-0x0000000003520000-0x0000000003536000-memory.dmp
          Filesize

          88KB

        • memory/2960-122-0x0000000001330000-0x0000000001346000-memory.dmp
          Filesize

          88KB

        • memory/3052-193-0x0000000000000000-mapping.dmp
        • memory/3248-126-0x0000000000798000-0x00000000007A1000-memory.dmp
          Filesize

          36KB

        • memory/3248-133-0x0000000000450000-0x000000000059A000-memory.dmp
          Filesize

          1.3MB

        • memory/3248-123-0x0000000000000000-mapping.dmp
        • memory/3756-194-0x0000000000000000-mapping.dmp
        • memory/3800-200-0x0000000000000000-mapping.dmp
        • memory/3976-170-0x0000000001570000-0x00000000015B7000-memory.dmp
          Filesize

          284KB

        • memory/3976-166-0x0000000000000000-mapping.dmp
        • memory/4048-121-0x0000000000402F47-mapping.dmp
        • memory/4048-120-0x0000000000400000-0x0000000000409000-memory.dmp
          Filesize

          36KB

        • memory/4084-128-0x0000000000402F47-mapping.dmp