Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    14-12-2021 20:45

General

  • Target

    16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe

  • Size

    321KB

  • MD5

    2247bec4be00052ab8d4ad21848087a7

  • SHA1

    985b0400c54130ce241cb729a6cd8aac0b3fc3ea

  • SHA256

    16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b

  • SHA512

    4073a0d802ea3d1bc40511e5b3b1786fe536babf7e52f884f08f14b5f74137d2e9832a8090964b79027bd010d4b896897726fb7a3556a4bf20191c3d45499ead

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Extracted

Family

raccoon

Botnet

871b18794e3cbbc6476a5b391363702168853a50

Attributes
  • url4cnc

    http://194.180.174.53/duglassa1

    http://91.219.236.18/duglassa1

    http://194.180.174.41/duglassa1

    http://91.219.236.148/duglassa1

    https://t.me/duglassa1

rc4.plain
rc4.plain

Extracted

Family

warzonerat

C2

91.229.76.26:5200

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • VKeylogger

    A keylogger first seen in Nov 2020.

  • VKeylogger Payload 3 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

    suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious

  • suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

    suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)

  • suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

    suricata: ET MALWARE Sharik/Smoke CnC Beacon 11

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Win32/IcedID Request Cookie

    suricata: ET MALWARE Win32/IcedID Request Cookie

  • Arkei Stealer Payload 3 IoCs
  • Warzone RAT Payload 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 20 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe
    "C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe
      "C:\Users\Admin\AppData\Local\Temp\16ab8d15481385d351202245fa572760b68eee32bfebe64757b4cea42262692b.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2684
  • C:\Users\Admin\AppData\Local\Temp\7AC9.exe
    C:\Users\Admin\AppData\Local\Temp\7AC9.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\7AC9.exe
      C:\Users\Admin\AppData\Local\Temp\7AC9.exe
      2⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:60
  • C:\Users\Admin\AppData\Local\Temp\8932.exe
    C:\Users\Admin\AppData\Local\Temp\8932.exe
    1⤵
    • Executes dropped EXE
    PID:1456
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 476
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
  • C:\Users\Admin\AppData\Local\Temp\9643.exe
    C:\Users\Admin\AppData\Local\Temp\9643.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4024
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9B74.dll
    1⤵
    • Loads dropped DLL
    PID:676
  • C:\Users\Admin\AppData\Local\Temp\9EE0.exe
    C:\Users\Admin\AppData\Local\Temp\9EE0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:872
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Users\Admin\AppData\Local\Temp\485.exe
          "C:\Users\Admin\AppData\Local\Temp\485.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2772
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe,"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1380
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe,"
              6⤵
              • Modifies WinLogon for persistence
              PID:1264
          • C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe
            "C:\Users\Admin\AppData\Roaming\SInitia\SInitia.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:4072
            • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
              "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
              6⤵
              • Executes dropped EXE
              PID:1528
  • C:\Users\Admin\AppData\Local\Temp\A46F.exe
    C:\Users\Admin\AppData\Local\Temp\A46F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:1876
  • C:\Users\Admin\AppData\Local\Temp\B23B.exe
    C:\Users\Admin\AppData\Local\Temp\B23B.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B23B.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\timeout.exe
        timeout /t 5
        3⤵
        • Delays execution with timeout.exe
        PID:1276
  • C:\Users\Admin\AppData\Local\Temp\B78B.exe
    C:\Users\Admin\AppData\Local\Temp\B78B.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3512
  • C:\Users\Admin\AppData\Local\Temp\2346.exe
    C:\Users\Admin\AppData\Local\Temp\2346.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:404
  • C:\Users\Admin\AppData\Local\Temp\2A4C.exe
    C:\Users\Admin\AppData\Local\Temp\2A4C.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:636
  • C:\Users\Admin\AppData\Local\Temp\3634.exe
    C:\Users\Admin\AppData\Local\Temp\3634.exe
    1⤵
    • Executes dropped EXE
    PID:1728
  • C:\Users\Admin\AppData\Local\Temp\3AE8.exe
    C:\Users\Admin\AppData\Local\Temp\3AE8.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    PID:1416
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:460
    • C:\ProgramData\Reader.exe
      "C:\ProgramData\Reader.exe"
      2⤵
      • Executes dropped EXE
      PID:4008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
          PID:3004
    • C:\Users\Admin\AppData\Local\Temp\61CA.exe
      C:\Users\Admin\AppData\Local\Temp\61CA.exe
      1⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:436
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32
        2⤵
          PID:1204
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c cmd < Tra.xlsx & ping 127.0.0.1 -n 30
          2⤵
            PID:948
            • C:\Windows\SysWOW64\cmd.exe
              cmd
              3⤵
                PID:3644
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /V /R "^dMFemqVCSwldOigKUiVwItEauGtDewBPrbAynibrquaLXwOyLiwfdszkojVTWsAQmchdHojNJSqBMSxyRZ$" Tenere.xlsx
                  4⤵
                    PID:1792
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.com
                    Doni.exe.com i
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:2364
                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.com
                      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Doni.exe.com i
                      5⤵
                      • Executes dropped EXE
                      • Drops startup file
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:376
                      • C:\Windows\SysWOW64\nslookup.exe
                        C:\Windows\SysWOW64\nslookup.exe
                        6⤵
                          PID:896
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 30
                    3⤵
                    • Runs ping.exe
                    PID:1480
              • C:\Users\Admin\AppData\Local\Temp\8A43.exe
                C:\Users\Admin\AppData\Local\Temp\8A43.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                PID:1240
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                • Accesses Microsoft Outlook profiles
                • outlook_office_path
                • outlook_win_path
                PID:548
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:2920

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/404-268-0x00000000053A0000-0x00000000059A6000-memory.dmp

                  Filesize

                  6.0MB

                • memory/460-305-0x0000000004922000-0x0000000004923000-memory.dmp

                  Filesize

                  4KB

                • memory/460-304-0x0000000004920000-0x0000000004921000-memory.dmp

                  Filesize

                  4KB

                • memory/460-422-0x0000000004923000-0x0000000004924000-memory.dmp

                  Filesize

                  4KB

                • memory/460-376-0x000000007ECD0000-0x000000007ECD1000-memory.dmp

                  Filesize

                  4KB

                • memory/548-598-0x0000000000110000-0x000000000017B000-memory.dmp

                  Filesize

                  428KB

                • memory/548-595-0x0000000000180000-0x00000000001F4000-memory.dmp

                  Filesize

                  464KB

                • memory/636-246-0x0000000001100000-0x000000000124A000-memory.dmp

                  Filesize

                  1.3MB

                • memory/636-248-0x0000000000A40000-0x0000000000A41000-memory.dmp

                  Filesize

                  4KB

                • memory/636-267-0x0000000005910000-0x0000000005911000-memory.dmp

                  Filesize

                  4KB

                • memory/636-243-0x0000000000A40000-0x0000000000AC6000-memory.dmp

                  Filesize

                  536KB

                • memory/636-247-0x0000000076CB0000-0x0000000076DA1000-memory.dmp

                  Filesize

                  964KB

                • memory/636-244-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

                  Filesize

                  4KB

                • memory/636-245-0x0000000073C60000-0x0000000073E22000-memory.dmp

                  Filesize

                  1.8MB

                • memory/676-181-0x00000000009A0000-0x00000000009AA000-memory.dmp

                  Filesize

                  40KB

                • memory/684-116-0x0000000000540000-0x00000000005EE000-memory.dmp

                  Filesize

                  696KB

                • memory/872-182-0x00000000007B0000-0x00000000007BF000-memory.dmp

                  Filesize

                  60KB

                • memory/1240-562-0x0000000005870000-0x0000000005871000-memory.dmp

                  Filesize

                  4KB

                • memory/1240-561-0x0000000002BA0000-0x0000000002BE5000-memory.dmp

                  Filesize

                  276KB

                • memory/1328-202-0x0000000000A00000-0x0000000000A0F000-memory.dmp

                  Filesize

                  60KB

                • memory/1416-287-0x0000000000400000-0x0000000000554000-memory.dmp

                  Filesize

                  1.3MB

                • memory/1416-286-0x0000000000650000-0x000000000079A000-memory.dmp

                  Filesize

                  1.3MB

                • memory/1456-152-0x00000000004D0000-0x000000000057E000-memory.dmp

                  Filesize

                  696KB

                • memory/1456-153-0x0000000000400000-0x00000000004CD000-memory.dmp

                  Filesize

                  820KB

                • memory/1528-885-0x0000000004FF0000-0x000000000508C000-memory.dmp

                  Filesize

                  624KB

                • memory/1728-285-0x0000000000400000-0x0000000000512000-memory.dmp

                  Filesize

                  1.1MB

                • memory/1728-284-0x00000000021B0000-0x0000000002242000-memory.dmp

                  Filesize

                  584KB

                • memory/1876-164-0x0000000073C60000-0x0000000073E22000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1876-162-0x0000000001010000-0x00000000010B6000-memory.dmp

                  Filesize

                  664KB

                • memory/1876-163-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-166-0x0000000001010000-0x0000000001011000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-165-0x0000000076CB0000-0x0000000076DA1000-memory.dmp

                  Filesize

                  964KB

                • memory/1876-170-0x00000000718A0000-0x0000000071920000-memory.dmp

                  Filesize

                  512KB

                • memory/1876-175-0x0000000002B30000-0x0000000002B75000-memory.dmp

                  Filesize

                  276KB

                • memory/1876-176-0x0000000005790000-0x0000000005791000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-177-0x0000000076360000-0x00000000768E4000-memory.dmp

                  Filesize

                  5.5MB

                • memory/1876-178-0x0000000074950000-0x0000000075C98000-memory.dmp

                  Filesize

                  19.3MB

                • memory/1876-180-0x000000006F210000-0x000000006F25B000-memory.dmp

                  Filesize

                  300KB

                • memory/1876-195-0x00000000059A0000-0x00000000059A1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-196-0x0000000005AC0000-0x0000000005AC1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-210-0x00000000095E0000-0x00000000095E1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-209-0x0000000008EE0000-0x0000000008EE1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-208-0x00000000032B0000-0x00000000032B1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-197-0x00000000068C0000-0x00000000068C1000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-199-0x0000000005D60000-0x0000000005D61000-memory.dmp

                  Filesize

                  4KB

                • memory/1876-200-0x0000000006570000-0x0000000006571000-memory.dmp

                  Filesize

                  4KB

                • memory/2272-130-0x0000000000720000-0x0000000000729000-memory.dmp

                  Filesize

                  36KB

                • memory/2272-126-0x0000000000816000-0x0000000000827000-memory.dmp

                  Filesize

                  68KB

                • memory/2684-117-0x0000000000400000-0x0000000000409000-memory.dmp

                  Filesize

                  36KB

                • memory/2772-219-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                  Filesize

                  4KB

                • memory/2772-226-0x0000000004C40000-0x000000000513E000-memory.dmp

                  Filesize

                  5.0MB

                • memory/2772-215-0x0000000000220000-0x0000000000221000-memory.dmp

                  Filesize

                  4KB

                • memory/2772-225-0x0000000004C40000-0x000000000513E000-memory.dmp

                  Filesize

                  5.0MB

                • memory/2772-220-0x0000000005DF0000-0x0000000005E11000-memory.dmp

                  Filesize

                  132KB

                • memory/2772-222-0x0000000005E50000-0x0000000005E51000-memory.dmp

                  Filesize

                  4KB

                • memory/2920-649-0x0000000001290000-0x000000000129C000-memory.dmp

                  Filesize

                  48KB

                • memory/2920-646-0x00000000012A0000-0x00000000012A7000-memory.dmp

                  Filesize

                  28KB

                • memory/3004-425-0x0000000006B83000-0x0000000006B84000-memory.dmp

                  Filesize

                  4KB

                • memory/3004-424-0x000000007EAF0000-0x000000007EAF1000-memory.dmp

                  Filesize

                  4KB

                • memory/3004-352-0x0000000006B82000-0x0000000006B83000-memory.dmp

                  Filesize

                  4KB

                • memory/3004-350-0x0000000006B80000-0x0000000006B81000-memory.dmp

                  Filesize

                  4KB

                • memory/3068-119-0x00000000010C0000-0x00000000010D6000-memory.dmp

                  Filesize

                  88KB

                • memory/3068-351-0x000000000BE20000-0x000000000C330000-memory.dmp

                  Filesize

                  5.1MB

                • memory/3068-158-0x0000000002E70000-0x0000000002E86000-memory.dmp

                  Filesize

                  88KB

                • memory/3068-211-0x0000000003290000-0x00000000032A6000-memory.dmp

                  Filesize

                  88KB

                • memory/3232-239-0x00000000026E0000-0x00000000026E1000-memory.dmp

                  Filesize

                  4KB

                • memory/3232-237-0x000000001B500000-0x000000001B502000-memory.dmp

                  Filesize

                  8KB

                • memory/3232-238-0x000000001B510000-0x000000001B511000-memory.dmp

                  Filesize

                  4KB

                • memory/3232-233-0x0000000000500000-0x0000000000501000-memory.dmp

                  Filesize

                  4KB

                • memory/3512-207-0x0000000000400000-0x00000000004CD000-memory.dmp

                  Filesize

                  820KB

                • memory/3512-206-0x00000000005C0000-0x000000000070A000-memory.dmp

                  Filesize

                  1.3MB

                • memory/3672-203-0x0000000000530000-0x000000000054C000-memory.dmp

                  Filesize

                  112KB

                • memory/3672-204-0x0000000000400000-0x00000000004D3000-memory.dmp

                  Filesize

                  844KB

                • memory/4008-313-0x0000000000400000-0x0000000000554000-memory.dmp

                  Filesize

                  1.3MB

                • memory/4008-312-0x0000000000570000-0x000000000058E000-memory.dmp

                  Filesize

                  120KB

                • memory/4024-155-0x00000000057E0000-0x00000000057E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-134-0x0000000000370000-0x00000000003D9000-memory.dmp

                  Filesize

                  420KB

                • memory/4024-139-0x0000000000370000-0x0000000000371000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-138-0x0000000076CB0000-0x0000000076DA1000-memory.dmp

                  Filesize

                  964KB

                • memory/4024-167-0x0000000005820000-0x0000000005821000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-137-0x0000000073C60000-0x0000000073E22000-memory.dmp

                  Filesize

                  1.8MB

                • memory/4024-169-0x000000006F210000-0x000000006F25B000-memory.dmp

                  Filesize

                  300KB

                • memory/4024-136-0x0000000002D60000-0x0000000002DA5000-memory.dmp

                  Filesize

                  276KB

                • memory/4024-135-0x0000000001100000-0x0000000001101000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-141-0x00000000718A0000-0x0000000071920000-memory.dmp

                  Filesize

                  512KB

                • memory/4024-145-0x0000000005F00000-0x0000000005F01000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-147-0x0000000005780000-0x0000000005781000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-157-0x0000000074950000-0x0000000075C98000-memory.dmp

                  Filesize

                  19.3MB

                • memory/4024-148-0x00000000058F0000-0x00000000058F1000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-154-0x00000000058E0000-0x00000000058E1000-memory.dmp

                  Filesize

                  4KB

                • memory/4024-156-0x0000000076360000-0x00000000768E4000-memory.dmp

                  Filesize

                  5.5MB

                • memory/4072-564-0x00000000049E0000-0x0000000004EDE000-memory.dmp

                  Filesize

                  5.0MB

                • memory/4072-559-0x00000000049E0000-0x0000000004EDE000-memory.dmp

                  Filesize

                  5.0MB