Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 14:30

General

  • Target

    Quotation 12052020-doc.exe

  • Size

    760KB

  • MD5

    a755796ffa8f905ecc4e382b80518a71

  • SHA1

    28a9048dd5f82525e8bbd1012c11f24941d07112

  • SHA256

    9f20ec0199d293e7dd83aec28d9a12669880eed778ce2132f13ce5aa54c14d3c

  • SHA512

    dabcd1f4a1d5dcb1339ca5e9a4013633ca268f64987f76ddd49cc9a21675ad986794b070073b4edd476b2c5d6cd2092f9fbcfcbac52c86f4e105de08894699a1

Malware Config

Signatures

  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2824
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 2824 240546359
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3236
    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 2348 240543937
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
          "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 3552 240546484
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3372
          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:5076
            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
              6⤵
                PID:4736
              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4736 240554718
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3332
                • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                  "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of WriteProcessMemory
                  PID:4304
                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                    8⤵
                      PID:4360
                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4360 240563031
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4392
                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                        9⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of WriteProcessMemory
                        PID:3120
                        • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                          "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                          10⤵
                            PID:1364
                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 1364 240571296
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4436
                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                              11⤵
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: MapViewOfSection
                              • Suspicious use of WriteProcessMemory
                              PID:740
                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                12⤵
                                  PID:4428
                                • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4428 240579531
                                  12⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:532
                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                    13⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: MapViewOfSection
                                    • Suspicious use of WriteProcessMemory
                                    PID:4220
                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                      14⤵
                                        PID:4456
                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4456 240587828
                                        14⤵
                                          PID:404
                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                            15⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: MapViewOfSection
                                            PID:544
                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                              16⤵
                                                PID:3660
                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 3660 240596078
                                                16⤵
                                                  PID:3188
                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                    17⤵
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: MapViewOfSection
                                                    PID:4836
                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                      18⤵
                                                        PID:1748
                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 1748 240604375
                                                        18⤵
                                                          PID:1632
                                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                            19⤵
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious behavior: MapViewOfSection
                                                            PID:332
                                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                              20⤵
                                                                PID:4924
                                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4924 240612687
                                                                20⤵
                                                                  PID:3960
                                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                    21⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    • Suspicious behavior: MapViewOfSection
                                                                    PID:2652
                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                      22⤵
                                                                        PID:2920
                                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 2920 240620921
                                                                        22⤵
                                                                          PID:4472
                                                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                            23⤵
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: MapViewOfSection
                                                                            PID:3256
                                                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                              24⤵
                                                                                PID:4564
                                                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4564 240629187
                                                                                24⤵
                                                                                  PID:4296
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                    25⤵
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                    PID:1388
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                      26⤵
                                                                                        PID:3620
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 3620 240637468
                                                                                        26⤵
                                                                                          PID:3732
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                            27⤵
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                            PID:1180
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                              28⤵
                                                                                                PID:4024
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 4024 240645781
                                                                                                28⤵
                                                                                                  PID:3360
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                    29⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                    PID:4088
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                      30⤵
                                                                                                        PID:3648
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 3648 240654046
                                                                                                        30⤵
                                                                                                          PID:2528
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                            31⤵
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                            PID:1144
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                              32⤵
                                                                                                                PID:3576
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 3576 240662343
                                                                                                                32⤵
                                                                                                                  PID:4032
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                    33⤵
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                    PID:2608
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                      34⤵
                                                                                                                        PID:2572
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 2572 240670578
                                                                                                                        34⤵
                                                                                                                          PID:2752
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                            35⤵
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                            PID:3880
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                              36⤵
                                                                                                                                PID:1384
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 1384 240678875
                                                                                                                                36⤵
                                                                                                                                  PID:4692
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                                    37⤵
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                    PID:1160
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                                                                                      38⤵
                                                                                                                                        PID:2160
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe" 2 2160 240687125
                                                                                                                                        38⤵
                                                                                                                                          PID:4892
                                                                    • C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Quotation 12052020-doc.exe"
                                                                      4⤵
                                                                        PID:3552

                                                                Network

                                                                MITRE ATT&CK Matrix ATT&CK v6

                                                                Persistence

                                                                Registry Run Keys / Startup Folder

                                                                1
                                                                T1060

                                                                Defense Evasion

                                                                Modify Registry

                                                                1
                                                                T1112

                                                                Discovery

                                                                Query Registry

                                                                1
                                                                T1012

                                                                System Information Discovery

                                                                2
                                                                T1082

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Roaming\Install\Host.exe
                                                                  Filesize

                                                                  760KB

                                                                  MD5

                                                                  a755796ffa8f905ecc4e382b80518a71

                                                                  SHA1

                                                                  28a9048dd5f82525e8bbd1012c11f24941d07112

                                                                  SHA256

                                                                  9f20ec0199d293e7dd83aec28d9a12669880eed778ce2132f13ce5aa54c14d3c

                                                                  SHA512

                                                                  dabcd1f4a1d5dcb1339ca5e9a4013633ca268f64987f76ddd49cc9a21675ad986794b070073b4edd476b2c5d6cd2092f9fbcfcbac52c86f4e105de08894699a1

                                                                • C:\Users\Admin\AppData\Roaming\Install\Host.exe
                                                                  Filesize

                                                                  760KB

                                                                  MD5

                                                                  a755796ffa8f905ecc4e382b80518a71

                                                                  SHA1

                                                                  28a9048dd5f82525e8bbd1012c11f24941d07112

                                                                  SHA256

                                                                  9f20ec0199d293e7dd83aec28d9a12669880eed778ce2132f13ce5aa54c14d3c

                                                                  SHA512

                                                                  dabcd1f4a1d5dcb1339ca5e9a4013633ca268f64987f76ddd49cc9a21675ad986794b070073b4edd476b2c5d6cd2092f9fbcfcbac52c86f4e105de08894699a1

                                                                • C:\Users\Admin\AppData\Roaming\Install\Host.exe
                                                                  Filesize

                                                                  760KB

                                                                  MD5

                                                                  a755796ffa8f905ecc4e382b80518a71

                                                                  SHA1

                                                                  28a9048dd5f82525e8bbd1012c11f24941d07112

                                                                  SHA256

                                                                  9f20ec0199d293e7dd83aec28d9a12669880eed778ce2132f13ce5aa54c14d3c

                                                                  SHA512

                                                                  dabcd1f4a1d5dcb1339ca5e9a4013633ca268f64987f76ddd49cc9a21675ad986794b070073b4edd476b2c5d6cd2092f9fbcfcbac52c86f4e105de08894699a1

                                                                • C:\Users\Admin\AppData\Roaming\Install\Host.exe
                                                                  Filesize

                                                                  760KB

                                                                  MD5

                                                                  a755796ffa8f905ecc4e382b80518a71

                                                                  SHA1

                                                                  28a9048dd5f82525e8bbd1012c11f24941d07112

                                                                  SHA256

                                                                  9f20ec0199d293e7dd83aec28d9a12669880eed778ce2132f13ce5aa54c14d3c

                                                                  SHA512

                                                                  dabcd1f4a1d5dcb1339ca5e9a4013633ca268f64987f76ddd49cc9a21675ad986794b070073b4edd476b2c5d6cd2092f9fbcfcbac52c86f4e105de08894699a1

                                                                • memory/332-186-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/332-183-0x0000000000000000-mapping.dmp
                                                                • memory/404-170-0x0000000000000000-mapping.dmp
                                                                • memory/404-172-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/532-165-0x0000000000000000-mapping.dmp
                                                                • memory/532-167-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/544-173-0x0000000000000000-mapping.dmp
                                                                • memory/544-176-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/740-166-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/740-163-0x0000000000000000-mapping.dmp
                                                                • memory/772-131-0x0000000000000000-mapping.dmp
                                                                • memory/772-133-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1144-216-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1144-213-0x0000000000000000-mapping.dmp
                                                                • memory/1160-228-0x0000000000000000-mapping.dmp
                                                                • memory/1160-231-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1180-203-0x0000000000000000-mapping.dmp
                                                                • memory/1180-206-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1364-159-0x0000000000000000-mapping.dmp
                                                                • memory/1384-224-0x0000000000000000-mapping.dmp
                                                                • memory/1388-201-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1388-198-0x0000000000000000-mapping.dmp
                                                                • memory/1632-180-0x0000000000000000-mapping.dmp
                                                                • memory/1632-182-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1748-179-0x0000000000000000-mapping.dmp
                                                                • memory/1956-137-0x0000000000000000-mapping.dmp
                                                                • memory/1956-145-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/1964-132-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2160-229-0x0000000000000000-mapping.dmp
                                                                • memory/2348-130-0x0000000000000000-mapping.dmp
                                                                • memory/2516-134-0x0000000000000000-mapping.dmp
                                                                • memory/2516-143-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2528-210-0x0000000000000000-mapping.dmp
                                                                • memory/2528-212-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2572-219-0x0000000000000000-mapping.dmp
                                                                • memory/2608-218-0x0000000000000000-mapping.dmp
                                                                • memory/2608-221-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2652-191-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2652-188-0x0000000000000000-mapping.dmp
                                                                • memory/2752-222-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/2752-220-0x0000000000000000-mapping.dmp
                                                                • memory/2824-138-0x0000000000000000-mapping.dmp
                                                                • memory/2920-189-0x0000000000000000-mapping.dmp
                                                                • memory/3120-161-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3120-158-0x0000000000000000-mapping.dmp
                                                                • memory/3188-177-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3188-175-0x0000000000000000-mapping.dmp
                                                                • memory/3236-140-0x0000000000000000-mapping.dmp
                                                                • memory/3236-146-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3256-196-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3256-193-0x0000000000000000-mapping.dmp
                                                                • memory/3332-150-0x0000000000000000-mapping.dmp
                                                                • memory/3332-152-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3360-205-0x0000000000000000-mapping.dmp
                                                                • memory/3360-207-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3372-144-0x0000000000000000-mapping.dmp
                                                                • memory/3372-147-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3552-142-0x0000000000000000-mapping.dmp
                                                                • memory/3576-214-0x0000000000000000-mapping.dmp
                                                                • memory/3620-199-0x0000000000000000-mapping.dmp
                                                                • memory/3648-209-0x0000000000000000-mapping.dmp
                                                                • memory/3660-174-0x0000000000000000-mapping.dmp
                                                                • memory/3732-202-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3732-200-0x0000000000000000-mapping.dmp
                                                                • memory/3880-226-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/3880-223-0x0000000000000000-mapping.dmp
                                                                • memory/3960-185-0x0000000000000000-mapping.dmp
                                                                • memory/3960-187-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4024-204-0x0000000000000000-mapping.dmp
                                                                • memory/4032-217-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4032-215-0x0000000000000000-mapping.dmp
                                                                • memory/4088-211-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4088-208-0x0000000000000000-mapping.dmp
                                                                • memory/4220-171-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4220-168-0x0000000000000000-mapping.dmp
                                                                • memory/4296-195-0x0000000000000000-mapping.dmp
                                                                • memory/4296-197-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4304-153-0x0000000000000000-mapping.dmp
                                                                • memory/4304-156-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4360-154-0x0000000000000000-mapping.dmp
                                                                • memory/4392-155-0x0000000000000000-mapping.dmp
                                                                • memory/4392-157-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4428-164-0x0000000000000000-mapping.dmp
                                                                • memory/4436-162-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4436-160-0x0000000000000000-mapping.dmp
                                                                • memory/4456-169-0x0000000000000000-mapping.dmp
                                                                • memory/4472-192-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4472-190-0x0000000000000000-mapping.dmp
                                                                • memory/4564-194-0x0000000000000000-mapping.dmp
                                                                • memory/4692-227-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4692-225-0x0000000000000000-mapping.dmp
                                                                • memory/4736-149-0x0000000000000000-mapping.dmp
                                                                • memory/4836-181-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4836-178-0x0000000000000000-mapping.dmp
                                                                • memory/4892-232-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/4892-230-0x0000000000000000-mapping.dmp
                                                                • memory/4924-184-0x0000000000000000-mapping.dmp
                                                                • memory/5076-151-0x0000000000400000-0x00000000004C5000-memory.dmp
                                                                  Filesize

                                                                  788KB

                                                                • memory/5076-148-0x0000000000000000-mapping.dmp