Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    22-03-2022 17:03

General

  • Target

    df689aafc37fe83d1f76984911e4d6c2.exe

  • Size

    264KB

  • MD5

    df689aafc37fe83d1f76984911e4d6c2

  • SHA1

    e90bd78e5e110fe2d306ecc8e8cadf19de78564c

  • SHA256

    4ff32cd7d9a37a73d8c836a7c5a32792281e46b3f2d8a17fd535a4c90fe65680

  • SHA512

    435fd573b94e4fc3c53bc5d7bf56a3e83a434da4c60a7bc960f572afbf726c00c916dab41e342b2b473b5d61a99679728f478d623a0fc7b987c6b78c8f87e4aa

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://coralee.at/upload/

http://ducvietcao.com/upload/

http://biz-acc.ru/upload/

http://toimap.com/upload/

http://bbb7d.com/upload/

http://piratia-life.ru/upload/

http://curvreport.com/upload/

http://viagratos.com/upload/

http://mordo.ru/upload/

http://pkodev.net/upload/

http://ghahantellorb.com/

http://hasarcyaionex.shop/

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

1

C2

62.204.41.199:30941

Attributes
  • auth_value

    233d7744d392476aad9c7ac20cda7c2e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 62 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 49 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 20 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df689aafc37fe83d1f76984911e4d6c2.exe
    "C:\Users\Admin\AppData\Local\Temp\df689aafc37fe83d1f76984911e4d6c2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2120
  • C:\Users\Admin\AppData\Local\Temp\A277.exe
    C:\Users\Admin\AppData\Local\Temp\A277.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      PID:4312
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61
      2⤵
      • Blocklisted process makes network request
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      PID:5084
  • C:\Users\Admin\AppData\Local\Temp\BC88.exe
    C:\Users\Admin\AppData\Local\Temp\BC88.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:3636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3636 -s 2044
      2⤵
      • Program crash
      PID:2860
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Drops file in Windows directory
    PID:2480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3636 -ip 3636
    1⤵
      PID:2076
    • C:\Users\Admin\AppData\Local\Temp\82C7.exe
      C:\Users\Admin\AppData\Local\Temp\82C7.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout -t 15 -nobreak && ping google.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4696
        • C:\Windows\SysWOW64\timeout.exe
          timeout -t 15 -nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:2464
        • C:\Windows\SysWOW64\PING.EXE
          ping google.com
          3⤵
          • Runs ping.exe
          PID:4708
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 45
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\timeout.exe
          timeout 45
          3⤵
          • Delays execution with timeout.exe
          PID:1796
      • C:\Users\Admin\AppData\Local\Temp\Sogbecbezmlrhbrab.exe
        "C:\Users\Admin\AppData\Local\Temp\Sogbecbezmlrhbrab.exe"
        2⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:1616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        2⤵
          PID:3668
      • C:\Users\Admin\AppData\Roaming\ehudhji
        C:\Users\Admin\AppData\Roaming\ehudhji
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4516
      • C:\Users\Admin\AppData\Local\Temp\3BB8.exe
        C:\Users\Admin\AppData\Local\Temp\3BB8.exe
        1⤵
        • Executes dropped EXE
        • Checks computer location settings
        PID:4868
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout -t 15 -nobreak && ping google.com
          2⤵
            PID:4760
            • C:\Windows\system32\timeout.exe
              timeout -t 15 -nobreak
              3⤵
              • Delays execution with timeout.exe
              PID:1680
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:4008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 872
              2⤵
              • Program crash
              PID:2788
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4008 -ip 4008
            1⤵
              PID:3064
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:4572

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Modify Registry

              2
              T1112

              Credential Access

              Credentials in Files

              2
              T1081

              Discovery

              Query Registry

              4
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Remote System Discovery

              1
              T1018

              Collection

              Data from Local System

              2
              T1005

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\3BB8.exe
                MD5

                43f3b41f77603a3d1586061a5d658baf

                SHA1

                ce239071569dd2d126feea3d621b5bec5a69f12b

                SHA256

                7a5263d4bd8876395270cac6c003b26e6142c87ea655639b817a62ec91b17a42

                SHA512

                07a4a8b302c72b4f88991759b79874b985705ba89cd1f960e05b3c96ced36ae03c88490799c6af201ecbe2bcfff03c0463712439ac5afad464611ecfb78bc579

              • C:\Users\Admin\AppData\Local\Temp\3BB8.exe
                MD5

                43f3b41f77603a3d1586061a5d658baf

                SHA1

                ce239071569dd2d126feea3d621b5bec5a69f12b

                SHA256

                7a5263d4bd8876395270cac6c003b26e6142c87ea655639b817a62ec91b17a42

                SHA512

                07a4a8b302c72b4f88991759b79874b985705ba89cd1f960e05b3c96ced36ae03c88490799c6af201ecbe2bcfff03c0463712439ac5afad464611ecfb78bc579

              • C:\Users\Admin\AppData\Local\Temp\82C7.exe
                MD5

                025c730ef5b8574793c11e87273fd584

                SHA1

                9177bb472db427646fac6d31d85eed3ad54f95b9

                SHA256

                0812ab0c488e4934cb7c701ee2118fa6d1eb824f9fa8ead82de9341446305407

                SHA512

                1713cafab12a418f030a7499c5a8269d5c5ffcaed270ad5dca02df55e1122f7abe1f6bcba4adb909e438772b604e3d21c108715547c2b20073a0a82f7b000c0c

              • C:\Users\Admin\AppData\Local\Temp\82C7.exe
                MD5

                025c730ef5b8574793c11e87273fd584

                SHA1

                9177bb472db427646fac6d31d85eed3ad54f95b9

                SHA256

                0812ab0c488e4934cb7c701ee2118fa6d1eb824f9fa8ead82de9341446305407

                SHA512

                1713cafab12a418f030a7499c5a8269d5c5ffcaed270ad5dca02df55e1122f7abe1f6bcba4adb909e438772b604e3d21c108715547c2b20073a0a82f7b000c0c

              • C:\Users\Admin\AppData\Local\Temp\A277.exe
                MD5

                85672c5beb6c2f6d314f664c0aa7ccbc

                SHA1

                851d1d80843e61c5ed1553ec3a876b38af8eba4a

                SHA256

                f1001b6e11acf408c344adf6e0f99a2633b8bdd3d7c52fb42ee967164632ccac

                SHA512

                bc4bb8fa39cd617a29f529bbc249ee2f26fb100c35ada84651f8b2406b5979755f6fa0efff72c0132cf5570c5bd53d9573e60dc5d2b014914e37a1ab83a2c5ce

              • C:\Users\Admin\AppData\Local\Temp\A277.exe
                MD5

                85672c5beb6c2f6d314f664c0aa7ccbc

                SHA1

                851d1d80843e61c5ed1553ec3a876b38af8eba4a

                SHA256

                f1001b6e11acf408c344adf6e0f99a2633b8bdd3d7c52fb42ee967164632ccac

                SHA512

                bc4bb8fa39cd617a29f529bbc249ee2f26fb100c35ada84651f8b2406b5979755f6fa0efff72c0132cf5570c5bd53d9573e60dc5d2b014914e37a1ab83a2c5ce

              • C:\Users\Admin\AppData\Local\Temp\BC88.exe
                MD5

                27638182e40c220ac8f72b5cfc50416c

                SHA1

                cc39001d83cb188e307e355d3bf70c63ca8d9615

                SHA256

                4efa2ba1b9de97bc6a7590c9d997d8d8f667a42de96b809b0df04b7d2ec7008e

                SHA512

                a229a4242c0bdc66bb83cff8e27710e57fb23e6ffd635785bb8a93db745cafaf77f05fff5b6cd598e1454726a34de19c9962c79af7466db332a562bd8b141c5a

              • C:\Users\Admin\AppData\Local\Temp\BC88.exe
                MD5

                27638182e40c220ac8f72b5cfc50416c

                SHA1

                cc39001d83cb188e307e355d3bf70c63ca8d9615

                SHA256

                4efa2ba1b9de97bc6a7590c9d997d8d8f667a42de96b809b0df04b7d2ec7008e

                SHA512

                a229a4242c0bdc66bb83cff8e27710e57fb23e6ffd635785bb8a93db745cafaf77f05fff5b6cd598e1454726a34de19c9962c79af7466db332a562bd8b141c5a

              • C:\Users\Admin\AppData\Local\Temp\Eussiyua.tmp
                MD5

                4ec77aa03c6c37a2a151e6d13bc3b63a

                SHA1

                81a5ee8c7acf66141b815058892d9333cee22997

                SHA256

                bcd89ddf4ac2fe081e2c0cfeab1d4822fc39b1371b2d953ea4eccaa3072448fd

                SHA512

                bfae9d127dadececfaeb0f0264be388fdb94b460aa701be6642e9fff739d99faca975dc27d1ebde900d27de6edb83e12a2d8ddb8a267850041ba102fc1146ba1

              • C:\Users\Admin\AppData\Local\Temp\Sogbecbezmlrhbrab.exe
                MD5

                b531350380c34183be2ecf92345d71a9

                SHA1

                95153e94ce21bde0b18e75d4b482177ddf12775f

                SHA256

                33a13e4565dfe81381a66e6e73fea85441f0597991533139b6c46afb4ae0fd3f

                SHA512

                f0670db65c741d7c9fb0c1ebe6064e3d54327f33700a3def43854e5f432940fc4bb1e29de058a52031fc2097bc22e6e498983aee6ee1a0624549d91adc19abb8

              • C:\Users\Admin\AppData\Local\Temp\Sogbecbezmlrhbrab.exe
                MD5

                b531350380c34183be2ecf92345d71a9

                SHA1

                95153e94ce21bde0b18e75d4b482177ddf12775f

                SHA256

                33a13e4565dfe81381a66e6e73fea85441f0597991533139b6c46afb4ae0fd3f

                SHA512

                f0670db65c741d7c9fb0c1ebe6064e3d54327f33700a3def43854e5f432940fc4bb1e29de058a52031fc2097bc22e6e498983aee6ee1a0624549d91adc19abb8

              • C:\Users\Admin\AppData\Roaming\ehudhji
                MD5

                df689aafc37fe83d1f76984911e4d6c2

                SHA1

                e90bd78e5e110fe2d306ecc8e8cadf19de78564c

                SHA256

                4ff32cd7d9a37a73d8c836a7c5a32792281e46b3f2d8a17fd535a4c90fe65680

                SHA512

                435fd573b94e4fc3c53bc5d7bf56a3e83a434da4c60a7bc960f572afbf726c00c916dab41e342b2b473b5d61a99679728f478d623a0fc7b987c6b78c8f87e4aa

              • C:\Users\Admin\AppData\Roaming\ehudhji
                MD5

                df689aafc37fe83d1f76984911e4d6c2

                SHA1

                e90bd78e5e110fe2d306ecc8e8cadf19de78564c

                SHA256

                4ff32cd7d9a37a73d8c836a7c5a32792281e46b3f2d8a17fd535a4c90fe65680

                SHA512

                435fd573b94e4fc3c53bc5d7bf56a3e83a434da4c60a7bc960f572afbf726c00c916dab41e342b2b473b5d61a99679728f478d623a0fc7b987c6b78c8f87e4aa

              • memory/1616-235-0x0000000000400000-0x0000000000409000-memory.dmp
                Filesize

                36KB

              • memory/1900-228-0x0000000007060000-0x0000000007112000-memory.dmp
                Filesize

                712KB

              • memory/1900-225-0x0000000006850000-0x0000000006851000-memory.dmp
                Filesize

                4KB

              • memory/1900-223-0x0000000000DC0000-0x0000000000DD4000-memory.dmp
                Filesize

                80KB

              • memory/1900-224-0x0000000074430000-0x0000000074BE0000-memory.dmp
                Filesize

                7.7MB

              • memory/1900-227-0x0000000006D20000-0x0000000006D2A000-memory.dmp
                Filesize

                40KB

              • memory/1900-226-0x0000000006D30000-0x0000000006D80000-memory.dmp
                Filesize

                320KB

              • memory/2120-135-0x0000000000568000-0x0000000000571000-memory.dmp
                Filesize

                36KB

              • memory/2120-136-0x0000000000540000-0x0000000000549000-memory.dmp
                Filesize

                36KB

              • memory/2120-134-0x0000000000568000-0x0000000000571000-memory.dmp
                Filesize

                36KB

              • memory/2120-137-0x0000000000400000-0x0000000000472000-memory.dmp
                Filesize

                456KB

              • memory/2480-154-0x000002BF827A0000-0x000002BF827B0000-memory.dmp
                Filesize

                64KB

              • memory/2480-155-0x000002BF856C0000-0x000002BF856C4000-memory.dmp
                Filesize

                16KB

              • memory/2480-153-0x000002BF82740000-0x000002BF82750000-memory.dmp
                Filesize

                64KB

              • memory/2480-220-0x000002BF85DB0000-0x000002BF85DB4000-memory.dmp
                Filesize

                16KB

              • memory/2480-219-0x000002BF86030000-0x000002BF86034000-memory.dmp
                Filesize

                16KB

              • memory/2480-218-0x000002BF85DF0000-0x000002BF85DF4000-memory.dmp
                Filesize

                16KB

              • memory/2480-166-0x000002BF85D10000-0x000002BF85D14000-memory.dmp
                Filesize

                16KB

              • memory/2480-167-0x000002BF85D10000-0x000002BF85D14000-memory.dmp
                Filesize

                16KB

              • memory/2480-217-0x000002BF85DF0000-0x000002BF85DF4000-memory.dmp
                Filesize

                16KB

              • memory/2776-238-0x000000000F110000-0x000000000F126000-memory.dmp
                Filesize

                88KB

              • memory/2776-138-0x0000000001030000-0x0000000001046000-memory.dmp
                Filesize

                88KB

              • memory/2776-242-0x000000000F0D0000-0x000000000F0E6000-memory.dmp
                Filesize

                88KB

              • memory/3636-215-0x0000000006980000-0x0000000006B42000-memory.dmp
                Filesize

                1.8MB

              • memory/3636-157-0x0000000004CD0000-0x0000000005274000-memory.dmp
                Filesize

                5.6MB

              • memory/3636-165-0x0000000004CC4000-0x0000000004CC6000-memory.dmp
                Filesize

                8KB

              • memory/3636-164-0x00000000059F0000-0x0000000005A2C000-memory.dmp
                Filesize

                240KB

              • memory/3636-163-0x00000000058C0000-0x00000000059CA000-memory.dmp
                Filesize

                1.0MB

              • memory/3636-162-0x00000000058A0000-0x00000000058B2000-memory.dmp
                Filesize

                72KB

              • memory/3636-176-0x0000000005CF0000-0x0000000005D66000-memory.dmp
                Filesize

                472KB

              • memory/3636-161-0x0000000005280000-0x0000000005898000-memory.dmp
                Filesize

                6.1MB

              • memory/3636-160-0x0000000004CC3000-0x0000000004CC4000-memory.dmp
                Filesize

                4KB

              • memory/3636-159-0x0000000004CC2000-0x0000000004CC3000-memory.dmp
                Filesize

                4KB

              • memory/3636-158-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
                Filesize

                4KB

              • memory/3636-216-0x0000000006B50000-0x000000000707C000-memory.dmp
                Filesize

                5.2MB

              • memory/3636-192-0x0000000006010000-0x0000000006076000-memory.dmp
                Filesize

                408KB

              • memory/3636-184-0x0000000005E90000-0x0000000005EAE000-memory.dmp
                Filesize

                120KB

              • memory/3636-156-0x0000000072B30000-0x00000000732E0000-memory.dmp
                Filesize

                7.7MB

              • memory/3636-149-0x000000000083D000-0x0000000000867000-memory.dmp
                Filesize

                168KB

              • memory/3636-150-0x000000000083D000-0x0000000000867000-memory.dmp
                Filesize

                168KB

              • memory/3636-151-0x00000000020C0000-0x00000000020F7000-memory.dmp
                Filesize

                220KB

              • memory/3636-181-0x0000000005D70000-0x0000000005E02000-memory.dmp
                Filesize

                584KB

              • memory/3636-152-0x0000000000400000-0x000000000049D000-memory.dmp
                Filesize

                628KB

              • memory/3668-233-0x0000000000400000-0x0000000000420000-memory.dmp
                Filesize

                128KB

              • memory/3668-236-0x0000000074430000-0x0000000074BE0000-memory.dmp
                Filesize

                7.7MB

              • memory/3668-237-0x00000000056E0000-0x00000000056E1000-memory.dmp
                Filesize

                4KB

              • memory/3668-241-0x00000000056E1000-0x00000000056E2000-memory.dmp
                Filesize

                4KB

              • memory/4312-146-0x0000000000760000-0x0000000000763000-memory.dmp
                Filesize

                12KB

              • memory/4312-145-0x0000000075A70000-0x0000000075C10000-memory.dmp
                Filesize

                1.6MB

              • memory/4312-144-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4312-143-0x0000000000750000-0x0000000000753000-memory.dmp
                Filesize

                12KB

              • memory/4516-234-0x0000000000628000-0x0000000000631000-memory.dmp
                Filesize

                36KB

              • memory/4516-239-0x0000000000628000-0x0000000000631000-memory.dmp
                Filesize

                36KB

              • memory/4516-240-0x0000000000400000-0x0000000000472000-memory.dmp
                Filesize

                456KB

              • memory/4580-175-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-185-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-141-0x0000000000400000-0x0000000000634000-memory.dmp
                Filesize

                2.2MB

              • memory/4580-142-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-171-0x0000000002D40000-0x0000000003777000-memory.dmp
                Filesize

                10.2MB

              • memory/4580-173-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-174-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-177-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-210-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-211-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-212-0x000000000394E000-0x000000000394F000-memory.dmp
                Filesize

                4KB

              • memory/4580-179-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-180-0x0000000002D40000-0x0000000003777000-memory.dmp
                Filesize

                10.2MB

              • memory/4580-170-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-202-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-169-0x0000000002D40000-0x0000000003777000-memory.dmp
                Filesize

                10.2MB

              • memory/4580-178-0x0000000003C20000-0x0000000003C21000-memory.dmp
                Filesize

                4KB

              • memory/4580-182-0x0000000003C50000-0x0000000003C51000-memory.dmp
                Filesize

                4KB

              • memory/4580-194-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-198-0x00000000038DF000-0x00000000038E0000-memory.dmp
                Filesize

                4KB

              • memory/4580-196-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-197-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-195-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-193-0x0000000003F00000-0x0000000003F01000-memory.dmp
                Filesize

                4KB

              • memory/4580-191-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-190-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-172-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/4580-189-0x0000000003C70000-0x0000000003C71000-memory.dmp
                Filesize

                4KB

              • memory/4580-188-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-186-0x0000000003C60000-0x0000000003C61000-memory.dmp
                Filesize

                4KB

              • memory/4580-187-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/4580-183-0x0000000003840000-0x0000000003980000-memory.dmp
                Filesize

                1.2MB

              • memory/5084-203-0x0000000004210000-0x0000000004211000-memory.dmp
                Filesize

                4KB

              • memory/5084-200-0x0000000001000000-0x0000000001917000-memory.dmp
                Filesize

                9.1MB

              • memory/5084-201-0x0000000076ED0000-0x0000000077073000-memory.dmp
                Filesize

                1.6MB

              • memory/5084-214-0x0000000001A90000-0x0000000001A91000-memory.dmp
                Filesize

                4KB

              • memory/5084-213-0x00000000034C0000-0x0000000003EF7000-memory.dmp
                Filesize

                10.2MB

              • memory/5084-209-0x000000000400E000-0x000000000400F000-memory.dmp
                Filesize

                4KB

              • memory/5084-208-0x0000000003F9F000-0x0000000003FA0000-memory.dmp
                Filesize

                4KB

              • memory/5084-206-0x0000000003F00000-0x0000000004040000-memory.dmp
                Filesize

                1.2MB

              • memory/5084-207-0x0000000003F00000-0x0000000004040000-memory.dmp
                Filesize

                1.2MB

              • memory/5084-205-0x00000000042C0000-0x00000000042C1000-memory.dmp
                Filesize

                4KB

              • memory/5084-204-0x00000000034C0000-0x0000000003EF7000-memory.dmp
                Filesize

                10.2MB