Analysis

  • max time kernel
    191s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 16:45

General

  • Target

    514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe

  • Size

    976KB

  • MD5

    b183f1731bdac50bab7759683766efab

  • SHA1

    2a311a9706fcf8a4b58c30f8b1418ff51a96a908

  • SHA256

    514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d

  • SHA512

    92194f2df08064bf31a8f03ae263e329ccb79fce0c4d85822a11ee4b3339960c805b5f048a0ad2bf54c8bed855904ea6866f048d4ad683ce0d991acadbc2b7b2

Malware Config

Extracted

Family

hawkeye_reborn

Version

10.0.0.1

Credentials

  • Protocol:
    smtp
  • Host:
    mail.eagleeyeapparels.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    eagle*qaz
Mutex

f98d37f4-ca90-4ed7-9f6f-6121c4014605

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:eagle*qaz _EmailPort:587 _EmailSSL:true _EmailServer:mail.eagleeyeapparels.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f98d37f4-ca90-4ed7-9f6f-6121c4014605 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:true _SystemInfo:true _Version:10.0.0.1 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye RebornX, Version=10.0.0.1, Culture=neutral, PublicKeyToken=null

Signatures

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • Looks up external IP address via web service 12 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3288
    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
      2⤵
        PID:3624
      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 3624 240587406
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
          "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
            "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
            4⤵
              PID:4488
            • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
              "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 4488 240610171
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4512
              • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                5⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:3188
                • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                  "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 3916 240621000
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3704
                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                    7⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of WriteProcessMemory
                    PID:748
                    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                      8⤵
                        PID:4736
                      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 4736 240632140
                        8⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1604
                        • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                          "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                          9⤵
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:1508
                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                    6⤵
                      PID:3916
          • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
            "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
            1⤵
              PID:1112
            • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
              "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 1112 240643078
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:3904
              • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:4392
                • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                  "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                  3⤵
                    PID:1704
                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 1704 240654031
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1420
                    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                      4⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of WriteProcessMemory
                      PID:2788
                      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                        5⤵
                          PID:1588
                        • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                          "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 1588 240664906
                          5⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2596
                          • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                            "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                            6⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of WriteProcessMemory
                            PID:3376
                            • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                              "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                              7⤵
                                PID:4272
                              • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 4272 240675828
                                7⤵
                                  PID:1304
                                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                    8⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: MapViewOfSection
                                    PID:2024
                                    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                      9⤵
                                        PID:2620
                                      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 2620 240686937
                                        9⤵
                                          PID:2648
                                          • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                            "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                            10⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: MapViewOfSection
                                            PID:2208
                                            • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                              "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                              11⤵
                                                PID:3384
                                              • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 3384 240697890
                                                11⤵
                                                  PID:404
                                                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                    12⤵
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:4656
                                                    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                      13⤵
                                                        PID:3804
                                                      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 3804 240708906
                                                        13⤵
                                                          PID:4592
                                                          • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                            14⤵
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:3480
                                                            • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                              15⤵
                                                                PID:1416
                                                              • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 1416 240719796
                                                                15⤵
                                                                  PID:4584
                                                                  • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                                    16⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    • Suspicious behavior: MapViewOfSection
                                                                    PID:4360
                                                                    • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe"
                                                                      17⤵
                                                                        PID:2984
                                                                      • C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe" 2 2984 240730703
                                                                        17⤵
                                                                          PID:1240

                                        Network

                                        MITRE ATT&CK Matrix

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\514741cf1116c4e8cb0267728b25a3f0a8ad9ac904a1a607d654e37c76829f8d.exe.log

                                          Filesize

                                          680B

                                          MD5

                                          8faf48455ffc017246b08e89f6ba1956

                                          SHA1

                                          2f6c39d9828b3f95dc050f52a38cd7d3f543baf8

                                          SHA256

                                          9a643ce75fdfe840ea158010f28f8520bea2a60220494b44a25039a2a318fc35

                                          SHA512

                                          dafd4f1bf894ef1c61ff65dbcb8d5a151b33d8e39f3e354e6e433c8c7c0e8c2105615bffde8d796e361b77ccbe917a70ca4d03cc8cb6396f0495ff9e5b7010a9

                                        • memory/404-225-0x0000000000000000-mapping.dmp

                                        • memory/748-161-0x0000000000000000-mapping.dmp

                                        • memory/1112-180-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/1112-177-0x00000000009A0000-0x0000000000A30000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/1112-174-0x0000000000000000-mapping.dmp

                                        • memory/1240-255-0x0000000000000000-mapping.dmp

                                        • memory/1304-205-0x0000000000000000-mapping.dmp

                                        • memory/1416-250-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/1416-244-0x0000000000000000-mapping.dmp

                                        • memory/1416-247-0x00000000009B0000-0x0000000000A40000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/1420-185-0x0000000000000000-mapping.dmp

                                        • memory/1508-171-0x0000000000000000-mapping.dmp

                                        • memory/1588-200-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/1588-194-0x0000000000000000-mapping.dmp

                                        • memory/1588-197-0x0000000000A10000-0x0000000000AA0000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/1604-165-0x0000000000000000-mapping.dmp

                                        • memory/1704-190-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/1704-187-0x00000000009E0000-0x0000000000A70000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/1704-184-0x0000000000000000-mapping.dmp

                                        • memory/2024-211-0x0000000000000000-mapping.dmp

                                        • memory/2208-221-0x0000000000000000-mapping.dmp

                                        • memory/2596-195-0x0000000000000000-mapping.dmp

                                        • memory/2620-214-0x0000000000000000-mapping.dmp

                                        • memory/2620-217-0x0000000000AA0000-0x0000000000B30000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/2620-220-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/2648-215-0x0000000000000000-mapping.dmp

                                        • memory/2788-191-0x0000000000000000-mapping.dmp

                                        • memory/2984-260-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/2984-254-0x0000000000000000-mapping.dmp

                                        • memory/3188-151-0x0000000000000000-mapping.dmp

                                        • memory/3288-132-0x00000000023E0000-0x00000000023F1000-memory.dmp

                                          Filesize

                                          68KB

                                        • memory/3376-201-0x0000000000000000-mapping.dmp

                                        • memory/3384-230-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/3384-224-0x0000000000000000-mapping.dmp

                                        • memory/3480-241-0x0000000000000000-mapping.dmp

                                        • memory/3576-134-0x0000000000000000-mapping.dmp

                                        • memory/3624-139-0x0000000075160000-0x0000000075711000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/3624-136-0x0000000000BE0000-0x0000000000C70000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/3624-135-0x0000000000BE0000-0x0000000000C70000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/3624-133-0x0000000000000000-mapping.dmp

                                        • memory/3704-155-0x0000000000000000-mapping.dmp

                                        • memory/3804-234-0x0000000000000000-mapping.dmp

                                        • memory/3804-237-0x00000000009D0000-0x0000000000A60000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/3804-240-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/3904-175-0x0000000000000000-mapping.dmp

                                        • memory/3916-160-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/3916-154-0x0000000000000000-mapping.dmp

                                        • memory/4272-210-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/4272-207-0x0000000000A80000-0x0000000000B10000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/4272-204-0x0000000000000000-mapping.dmp

                                        • memory/4360-251-0x0000000000000000-mapping.dmp

                                        • memory/4392-181-0x0000000000000000-mapping.dmp

                                        • memory/4460-140-0x0000000000000000-mapping.dmp

                                        • memory/4488-146-0x0000000000A50000-0x0000000000AE0000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/4488-150-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/4488-145-0x0000000000A50000-0x0000000000AE0000-memory.dmp

                                          Filesize

                                          576KB

                                        • memory/4488-143-0x0000000000000000-mapping.dmp

                                        • memory/4512-144-0x0000000000000000-mapping.dmp

                                        • memory/4584-245-0x0000000000000000-mapping.dmp

                                        • memory/4592-235-0x0000000000000000-mapping.dmp

                                        • memory/4656-231-0x0000000000000000-mapping.dmp

                                        • memory/4736-170-0x0000000075200000-0x00000000757B1000-memory.dmp

                                          Filesize

                                          5.7MB

                                        • memory/4736-164-0x0000000000000000-mapping.dmp

                                        • memory/4736-167-0x0000000000B00000-0x0000000000B90000-memory.dmp

                                          Filesize

                                          576KB