Analysis

  • max time kernel
    160s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    22-02-2022 17:42

General

  • Target

    0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe

  • Size

    267KB

  • MD5

    5478d0872828e7cc05b8c3d59877de57

  • SHA1

    b8a74db005723b3431825d188ea7a03c5f7116c9

  • SHA256

    0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8

  • SHA512

    c09553be0d69e75bed30c572a98dc86c5373c2adbedb7be31d1fc1a45b66020b24830be1bdad077015394d8ddc40c9fdeaa687fb91e000a9764b5f5a0a7c08b2

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://dollybuster.at/upload/

http://spaldingcompanies.com/upload/

http://remik-franchise.ru/upload/

http://fennsports.com/upload/

http://am1420wbec.com/upload/

http://islamic-city.com/upload/

http://egsagl.com/upload/

http://mordo.ru/upload/

http://piratia-life.ru/upload/

https://oakland-studio.video/search.php

https://seattle-university.video/search.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

icedid

Campaign

1843818144

C2

grendafolz.com

Extracted

Family

raccoon

Botnet

9185b8c5d1dac158cc47aef92b143671d2c3a9bf

Attributes
  • url4cnc

    http://206.189.100.203/kernelnixbarbos

    http://194.180.191.234/kernelnixbarbos

    http://185.163.204.216/kernelnixbarbos

    http://139.162.157.205/kernelnixbarbos

    https://t.me/kernelnixbarbos

rc4.plain
rc4.plain

Signatures

  • IcedID, BokBot

    IcedID is a banking trojan capable of stealing credentials.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateProcessExOtherParentProcess 13 IoCs
  • IcedID First Stage Loader 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 26 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe
    "C:\Users\Admin\AppData\Local\Temp\0418508dcc93da9ade2ed5dd5a18dbcea9d98b394d206abee22bad7deaed54f8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1444
  • C:\Users\Admin\AppData\Local\Temp\A810.exe
    C:\Users\Admin\AppData\Local\Temp\A810.exe
    1⤵
    • Executes dropped EXE
    • Checks SCSI registry key(s)
    • Suspicious behavior: MapViewOfSection
    PID:3364
  • C:\Users\Admin\AppData\Local\Temp\C4A1.exe
    C:\Users\Admin\AppData\Local\Temp\C4A1.exe
    1⤵
    • Executes dropped EXE
    PID:3372
  • C:\Users\Admin\AppData\Local\Temp\EEFE.exe
    C:\Users\Admin\AppData\Local\Temp\EEFE.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3716
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:2740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 616
      2⤵
      • Drops file in Windows directory
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 840
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3416
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 880
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1008
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1016
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 1032
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2200
  • C:\Users\Admin\AppData\Local\Temp\A57.exe
    C:\Users\Admin\AppData\Local\Temp\A57.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:3328
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 528
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 876
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1300
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 936
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1252
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 944
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 972
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2072
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 900
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 940
      2⤵
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2560 -ip 2560
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:4036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3716 -ip 3716
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:3140
  • C:\Windows\system32\cmd.exe
    cmd
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3640
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv
      2⤵
        PID:2028
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv
        2⤵
          PID:1500
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv
          2⤵
            PID:3940
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv
            2⤵
              PID:1916
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv
              2⤵
                PID:3616
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv
                2⤵
                  PID:3772
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv
                  2⤵
                    PID:2652
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv
                    2⤵
                      PID:3760
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv
                      2⤵
                        PID:2584
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv
                        2⤵
                          PID:3284
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv
                          2⤵
                            PID:2720
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv
                            2⤵
                              PID:1564
                            • C:\Windows\system32\ipconfig.exe
                              ipconfig /displaydns
                              2⤵
                              • Gathers network information
                              PID:2056
                            • C:\Windows\system32\ROUTE.EXE
                              route print
                              2⤵
                                PID:2944
                              • C:\Windows\system32\netsh.exe
                                netsh firewall show state
                                2⤵
                                  PID:1016
                                • C:\Windows\system32\systeminfo.exe
                                  systeminfo
                                  2⤵
                                  • Gathers system information
                                  PID:3816
                              • C:\Windows\system32\msiexec.exe
                                C:\Windows\system32\msiexec.exe /V
                                1⤵
                                  PID:3600
                                • C:\Users\Admin\AppData\Local\Temp\5B66.exe
                                  C:\Users\Admin\AppData\Local\Temp\5B66.exe
                                  1⤵
                                  • Executes dropped EXE
                                  PID:1716
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:4080
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3716 -ip 3716
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3348
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3716 -ip 3716
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3612
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:1820
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:876
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3716 -ip 3716
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3288
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3960
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3992
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3716 -ip 3716
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:480
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3716 -ip 3716
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:2724
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2560 -ip 2560
                                  1⤵
                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                  PID:3208

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\5B66.exe

                                  MD5

                                  ff4ab1345cc07c5b050ef5a78eae97ef

                                  SHA1

                                  157d19cb5c0f4dd740a57b315f86e5291be139f7

                                  SHA256

                                  d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34

                                  SHA512

                                  47a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d

                                • C:\Users\Admin\AppData\Local\Temp\5B66.exe

                                  MD5

                                  ff4ab1345cc07c5b050ef5a78eae97ef

                                  SHA1

                                  157d19cb5c0f4dd740a57b315f86e5291be139f7

                                  SHA256

                                  d9666f203b175e302f2657c0b54b9cf2def99f43cefe78b9e048e689149fdd34

                                  SHA512

                                  47a1ffc765b07c9ba9e684a86e841a0ea78280e4371935ececd69e06aca4181c6402b9fe03c3a88746923a0a57480c4f3ed498563110aac411e3dad9e851b45d

                                • C:\Users\Admin\AppData\Local\Temp\A57.exe

                                  MD5

                                  e301c4e88d2ef3c3a79f12c47d2db55e

                                  SHA1

                                  5d3904b9cba99d8b643ddf1f6ada00aae3133353

                                  SHA256

                                  bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

                                  SHA512

                                  d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

                                • C:\Users\Admin\AppData\Local\Temp\A57.exe

                                  MD5

                                  e301c4e88d2ef3c3a79f12c47d2db55e

                                  SHA1

                                  5d3904b9cba99d8b643ddf1f6ada00aae3133353

                                  SHA256

                                  bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

                                  SHA512

                                  d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

                                • C:\Users\Admin\AppData\Local\Temp\A810.exe

                                  MD5

                                  4d57e60ba0331722725a1383859057db

                                  SHA1

                                  eeea99876485cc9b747009a8de739d75ae3edcf1

                                  SHA256

                                  28b081408c83eef255021424744fa36738df41e3edcb614ba13d9969350d6bde

                                  SHA512

                                  d8362ff9294f3561abccc8cd11b13f3321aa4d0e67dbc74cf7849716e7ff7cf0ed0f07f8c2000869db9116ba82f2c7495b2b80749a5a1263e8fe8cc5c714e86e

                                • C:\Users\Admin\AppData\Local\Temp\A810.exe

                                  MD5

                                  4d57e60ba0331722725a1383859057db

                                  SHA1

                                  eeea99876485cc9b747009a8de739d75ae3edcf1

                                  SHA256

                                  28b081408c83eef255021424744fa36738df41e3edcb614ba13d9969350d6bde

                                  SHA512

                                  d8362ff9294f3561abccc8cd11b13f3321aa4d0e67dbc74cf7849716e7ff7cf0ed0f07f8c2000869db9116ba82f2c7495b2b80749a5a1263e8fe8cc5c714e86e

                                • C:\Users\Admin\AppData\Local\Temp\Aeesafyftaohi.tmp

                                  MD5

                                  748bbd8633ad346381c0ae69be3a0ca3

                                  SHA1

                                  307a99df0a4ca1c550b536d79574497b4b3163eb

                                  SHA256

                                  25869e4d0fa9fcfb2446560efe9d2ef6cae8f334508d1ba7cea5e539517e40a9

                                  SHA512

                                  7a02ba4eb28a6985b2d4c95fe7ff9cbbc42f93a68db247ef8f58a13fc6b283dd79c594f5b7b5f3b9efc1adedc2d19b476031297bf794cd03c23ce59ad475fca7

                                • C:\Users\Admin\AppData\Local\Temp\Aeesafyftaohi.tmp

                                  MD5

                                  748bbd8633ad346381c0ae69be3a0ca3

                                  SHA1

                                  307a99df0a4ca1c550b536d79574497b4b3163eb

                                  SHA256

                                  25869e4d0fa9fcfb2446560efe9d2ef6cae8f334508d1ba7cea5e539517e40a9

                                  SHA512

                                  7a02ba4eb28a6985b2d4c95fe7ff9cbbc42f93a68db247ef8f58a13fc6b283dd79c594f5b7b5f3b9efc1adedc2d19b476031297bf794cd03c23ce59ad475fca7

                                • C:\Users\Admin\AppData\Local\Temp\C4A1.exe

                                  MD5

                                  ee0e37deb11cf4a2985c6ed958b13d62

                                  SHA1

                                  7d8670e51edef13c46a6189734975f43035f601c

                                  SHA256

                                  c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

                                  SHA512

                                  bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

                                • C:\Users\Admin\AppData\Local\Temp\C4A1.exe

                                  MD5

                                  ee0e37deb11cf4a2985c6ed958b13d62

                                  SHA1

                                  7d8670e51edef13c46a6189734975f43035f601c

                                  SHA256

                                  c1b0455a5a7f7802014ef76bf279e6ec667a3fb89be5d0cef8b356d84642dc94

                                  SHA512

                                  bda678fca4c791822d1166be9b4b2691bf8a8fd7e22a4e766f85cd5700f92cc1721284df9b628909378d9ff8e97a50fd278cd1bd4cfb77bbbb78359c36ff2246

                                • C:\Users\Admin\AppData\Local\Temp\EEFE.exe

                                  MD5

                                  e301c4e88d2ef3c3a79f12c47d2db55e

                                  SHA1

                                  5d3904b9cba99d8b643ddf1f6ada00aae3133353

                                  SHA256

                                  bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

                                  SHA512

                                  d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

                                • C:\Users\Admin\AppData\Local\Temp\EEFE.exe

                                  MD5

                                  e301c4e88d2ef3c3a79f12c47d2db55e

                                  SHA1

                                  5d3904b9cba99d8b643ddf1f6ada00aae3133353

                                  SHA256

                                  bdad711d8509ccbb98cac05c70a1f1594dc2006e0fc063eaf0d15a2d7965a268

                                  SHA512

                                  d069254a4d4f0ebc2d56acca3ef40f3b5831070888d332da753e45b0be3895734e5cea3fcf49def11fa7ae6f5de0ddf17de05a60585b3d9cfee99149e6609820

                                • memory/1444-133-0x0000000000400000-0x0000000000409000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1444-130-0x000000000076D000-0x000000000077D000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1444-132-0x0000000000700000-0x0000000000709000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/1444-131-0x000000000076D000-0x000000000077D000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1716-201-0x00000000022E0000-0x0000000002372000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/1716-200-0x0000000000810000-0x0000000000860000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/1716-202-0x0000000000400000-0x0000000000493000-memory.dmp

                                  Filesize

                                  588KB

                                • memory/2324-142-0x0000000002980000-0x0000000002996000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/2324-134-0x0000000000A00000-0x0000000000A16000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/2324-157-0x0000000008020000-0x000000000802F000-memory.dmp

                                  Filesize

                                  60KB

                                • memory/2560-204-0x00000000030C0000-0x0000000003B0B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/2560-153-0x0000000000400000-0x0000000000735000-memory.dmp

                                  Filesize

                                  3.2MB

                                • memory/2560-154-0x00000000025A0000-0x00000000027C9000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/2560-155-0x0000000000400000-0x0000000000635000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/2560-156-0x00000000005E9000-0x00000000005F2000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/2560-230-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-229-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-228-0x00000000041B0000-0x00000000041B1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2560-227-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-226-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-225-0x00000000041A0000-0x00000000041A1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2560-223-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-224-0x0000000003C50000-0x0000000003D90000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/2560-222-0x0000000004020000-0x0000000004021000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2560-221-0x00000000030C0000-0x0000000003B0B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/2560-220-0x0000000003C30000-0x0000000003C31000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2560-208-0x00000000030C1000-0x0000000003B0B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/2740-194-0x0000000000820000-0x0000000000823000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-190-0x00000000007E0000-0x00000000007E3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-174-0x00000000006E0000-0x00000000006E3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-173-0x00000000006D0000-0x00000000006D3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-175-0x00000000006F0000-0x00000000006F3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-176-0x0000000000700000-0x0000000000703000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-177-0x0000000000710000-0x0000000000713000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-178-0x0000000000720000-0x0000000000723000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-179-0x0000000000730000-0x0000000000733000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-181-0x0000000000750000-0x0000000000753000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-180-0x0000000000740000-0x0000000000743000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-182-0x0000000000760000-0x0000000000763000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-183-0x0000000000770000-0x0000000000773000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-184-0x0000000000780000-0x0000000000783000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-185-0x0000000000790000-0x0000000000793000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-186-0x00000000007A0000-0x00000000007A3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-187-0x00000000007B0000-0x00000000007B3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-188-0x00000000007C0000-0x00000000007C3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-189-0x00000000007D0000-0x00000000007D3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-164-0x00000000006B0000-0x00000000006B3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-191-0x00000000007F0000-0x00000000007F3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-192-0x0000000000800000-0x0000000000803000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-172-0x00000000006C0000-0x00000000006C3000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-193-0x0000000000810000-0x0000000000813000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-195-0x0000000000830000-0x0000000000833000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/2740-196-0x0000000000840000-0x0000000000843000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3328-165-0x0000000000E60000-0x0000000000E64000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-169-0x0000000000EA0000-0x0000000000EA4000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-171-0x0000000000EC0000-0x0000000000EC4000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-163-0x0000000076404000-0x0000000076405000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3328-168-0x0000000000E90000-0x0000000000E94000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-167-0x0000000000E80000-0x0000000000E84000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-161-0x0000000000E50000-0x0000000000E54000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-170-0x0000000000EB0000-0x0000000000EB4000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-166-0x0000000000E70000-0x0000000000E74000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3328-162-0x0000000077164000-0x0000000077165000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3364-137-0x0000000002250000-0x0000000002258000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/3364-138-0x0000000002260000-0x0000000002269000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3364-139-0x0000000000400000-0x0000000000409000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3372-143-0x000001F144530000-0x000001F14453B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/3716-147-0x0000000002570000-0x0000000002799000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/3716-212-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-213-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-214-0x0000000004060000-0x0000000004061000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-215-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-216-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-217-0x0000000004070000-0x0000000004071000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-218-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-219-0x0000000003C20000-0x0000000003D60000-memory.dmp

                                  Filesize

                                  1.2MB

                                • memory/3716-211-0x0000000002880000-0x0000000002881000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-210-0x0000000003010000-0x0000000003A5B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/3716-209-0x0000000004050000-0x0000000004051000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-207-0x0000000003011000-0x0000000003A5B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/3716-206-0x0000000077162000-0x0000000077163000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-205-0x0000000003010000-0x0000000003A5B000-memory.dmp

                                  Filesize

                                  10.3MB

                                • memory/3716-146-0x0000000002490000-0x0000000002570000-memory.dmp

                                  Filesize

                                  896KB

                                • memory/3716-148-0x0000000000400000-0x0000000000735000-memory.dmp

                                  Filesize

                                  3.2MB

                                • memory/3716-149-0x0000000000400000-0x0000000000635000-memory.dmp

                                  Filesize

                                  2.2MB

                                • memory/3716-158-0x0000000077162000-0x0000000077163000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3716-150-0x00000000005E9000-0x00000000005F2000-memory.dmp

                                  Filesize

                                  36KB