Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:41

General

  • Target

    CONTRACTS DOCUMENTS.exe

  • Size

    215KB

  • MD5

    b5a64ee18bd52e91671491580ae349da

  • SHA1

    0a5ec3756c34db4a9eb9a1e54a0867f9c98c6f3d

  • SHA256

    380b98b82eca0b9f9ea4a86ea9ee60c579bc68d75a75db5d800074a8c50a0a52

  • SHA512

    9fc1a1faed034a8e1247e1b6daeb83bbcc4f58ce3aadd5df21213837de5d3252c8801aeb7031be6c73fa00cc23ef85d218b724b0da3d9f6cbcd7dd3eaec9c6f9

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

nfl

Decoy

giacamp.net

qb51.party

mashalevine.com

russiasexdating.com

jitangyy.com

morockin.com

karoreiss.com

tractionhero.today

bienvenueenprovence.net

stormharbour.info

61999h.com

tryandcert.com

bestwaytosuccess.com

laobaochang.com

otomatiktente.com

rehpb.info

ivpdqb.info

dc-wv-wv-ie-q.com

goingmagic.com

cimachain.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 13 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
      "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
      2⤵
      • Drops startup file
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
        "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
        3⤵
        • Drops startup file
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2004
        • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
          "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:524
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:580
          • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
            "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1152
            • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
              "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
              6⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1028
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                7⤵
                  PID:1608
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1604
                • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                  "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2036
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    8⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1832
                  • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                    "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                    8⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1636
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      9⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1656
                      • C:\Windows\SysWOW64\cscript.exe
                        "C:\Windows\SysWOW64\cscript.exe"
                        10⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1752
                    • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                      "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                      9⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1188
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        10⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1704
                      • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                        "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                        10⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1256
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          11⤵
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of AdjustPrivilegeToken
                          PID:588
                        • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                          "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                          11⤵
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1740
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            12⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1884
                          • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                            "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                            12⤵
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1516
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              13⤵
                                PID:2044
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                13⤵
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: MapViewOfSection
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1620
                              • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                13⤵
                                • Suspicious use of SetThreadContext
                                • Suspicious behavior: MapViewOfSection
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1316
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                  14⤵
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1220
                                • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                  "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                  14⤵
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:984
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                    15⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: MapViewOfSection
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:956
                                  • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                    "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                    15⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:916
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      16⤵
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:876
                                      • C:\Windows\SysWOW64\wlanext.exe
                                        "C:\Windows\SysWOW64\wlanext.exe"
                                        17⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1184
                                    • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                      "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                      16⤵
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2012
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        17⤵
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1836
                                      • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                        "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                        17⤵
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1120
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                          18⤵
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1308
                                        • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                          "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                          18⤵
                                          • Suspicious use of SetThreadContext
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1360
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                            19⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1232
                                          • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                            "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                            19⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1824
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              20⤵
                                              • Suspicious use of SetThreadContext
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1904
                                            • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                              "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                              20⤵
                                              • Suspicious use of SetThreadContext
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1780
                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                21⤵
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:952
                                              • C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe
                                                "C:\Users\Admin\AppData\Local\Temp\CONTRACTS DOCUMENTS.exe"
                                                21⤵
                                                  PID:440
          • C:\Windows\SysWOW64\wlanext.exe
            "C:\Windows\SysWOW64\wlanext.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:1288
            • C:\Windows\SysWOW64\ipconfig.exe
              "C:\Windows\SysWOW64\ipconfig.exe"
              2⤵
              • Gathers network information
              • Suspicious use of AdjustPrivilegeToken
              PID:320
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe"
              2⤵
                PID:1500
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\SysWOW64\control.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1348
              • C:\Windows\SysWOW64\mstsc.exe
                "C:\Windows\SysWOW64\mstsc.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1352
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\SysWOW64\netsh.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1280
              • C:\Windows\SysWOW64\ipconfig.exe
                "C:\Windows\SysWOW64\ipconfig.exe"
                2⤵
                • Gathers network information
                • Suspicious use of AdjustPrivilegeToken
                PID:1224
              • C:\Windows\SysWOW64\cmmon32.exe
                "C:\Windows\SysWOW64\cmmon32.exe"
                2⤵
                  PID:592
                • C:\Windows\SysWOW64\NETSTAT.EXE
                  "C:\Windows\SysWOW64\NETSTAT.EXE"
                  2⤵
                  • Gathers network information
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1748
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:1464
                  • C:\Windows\SysWOW64\control.exe
                    "C:\Windows\SysWOW64\control.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:284
                  • C:\Windows\SysWOW64\control.exe
                    "C:\Windows\SysWOW64\control.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1056
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\SysWOW64\msiexec.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1860
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\SysWOW64\msiexec.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1560
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\SysWOW64\cmd.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2032
                  • C:\Windows\SysWOW64\netsh.exe
                    "C:\Windows\SysWOW64\netsh.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:968
                  • C:\Windows\SysWOW64\msiexec.exe
                    "C:\Windows\SysWOW64\msiexec.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:980
                  • C:\Windows\SysWOW64\wuapp.exe
                    "C:\Windows\SysWOW64\wuapp.exe"
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1384

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Command-Line Interface

                1
                T1059

                Discovery

                System Information Discovery

                2
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe
                  Filesize

                  216KB

                  MD5

                  3be793cc456c24741f474e0a7e9e9dda

                  SHA1

                  23f715eb3ea125162234fa5aedbe3e79a4287412

                  SHA256

                  b9a289e4b32a9d4592cf63aad42628937ce83fb51be4742f1fd8c1ddf747b389

                  SHA512

                  34a02e675d57ca4e0d1b32cc68ac99bca9858fad49611e6103077977b04afb91d8b0f6daf8bd104b3ea8fae7a16b233deb76f96e9a0bfe0df76a8b8942844ce0

                • memory/284-196-0x0000000000000000-mapping.dmp
                • memory/320-86-0x0000000001FD0000-0x00000000022D3000-memory.dmp
                  Filesize

                  3.0MB

                • memory/320-82-0x0000000000000000-mapping.dmp
                • memory/320-84-0x00000000003A0000-0x00000000003AA000-memory.dmp
                  Filesize

                  40KB

                • memory/320-85-0x0000000000080000-0x00000000000AA000-memory.dmp
                  Filesize

                  168KB

                • memory/440-297-0x0000000000000000-mapping.dmp
                • memory/524-71-0x0000000000000000-mapping.dmp
                • memory/580-93-0x00000000001C0000-0x00000000001D4000-memory.dmp
                  Filesize

                  80KB

                • memory/580-104-0x0000000000200000-0x0000000000214000-memory.dmp
                  Filesize

                  80KB

                • memory/580-88-0x000000000041B620-mapping.dmp
                • memory/580-92-0x0000000000E50000-0x0000000001153000-memory.dmp
                  Filesize

                  3.0MB

                • memory/588-162-0x0000000002260000-0x0000000002563000-memory.dmp
                  Filesize

                  3.0MB

                • memory/588-163-0x00000000001E0000-0x00000000001F4000-memory.dmp
                  Filesize

                  80KB

                • memory/588-159-0x000000000041B620-mapping.dmp
                • memory/588-161-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/876-238-0x000000000041B620-mapping.dmp
                • memory/916-221-0x0000000000000000-mapping.dmp
                • memory/952-295-0x000000000041B620-mapping.dmp
                • memory/956-219-0x000000000041B620-mapping.dmp
                • memory/968-254-0x0000000000000000-mapping.dmp
                • memory/980-269-0x0000000000000000-mapping.dmp
                • memory/984-206-0x0000000000000000-mapping.dmp
                • memory/1028-101-0x0000000000000000-mapping.dmp
                • memory/1056-195-0x0000000000000000-mapping.dmp
                • memory/1120-247-0x0000000000000000-mapping.dmp
                • memory/1152-96-0x000000000041B620-mapping.dmp
                • memory/1152-98-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/1152-99-0x00000000001E0000-0x00000000001F4000-memory.dmp
                  Filesize

                  80KB

                • memory/1152-100-0x0000000000DC0000-0x00000000010C3000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1184-265-0x0000000000000000-mapping.dmp
                • memory/1188-144-0x0000000000000000-mapping.dmp
                • memory/1220-204-0x000000000041B620-mapping.dmp
                • memory/1224-140-0x0000000000080000-0x00000000000AA000-memory.dmp
                  Filesize

                  168KB

                • memory/1224-139-0x0000000000FE0000-0x0000000000FEA000-memory.dmp
                  Filesize

                  40KB

                • memory/1224-141-0x0000000000CC0000-0x0000000000FC3000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1224-137-0x0000000000000000-mapping.dmp
                • memory/1232-275-0x000000000041B620-mapping.dmp
                • memory/1256-153-0x0000000000000000-mapping.dmp
                • memory/1264-156-0x0000000008710000-0x00000000088AE000-memory.dmp
                  Filesize

                  1.6MB

                • memory/1264-103-0x0000000006D60000-0x0000000006E7B000-memory.dmp
                  Filesize

                  1.1MB

                • memory/1264-94-0x0000000006CA0000-0x0000000006D56000-memory.dmp
                  Filesize

                  728KB

                • memory/1264-105-0x0000000006F90000-0x00000000070CD000-memory.dmp
                  Filesize

                  1.2MB

                • memory/1264-106-0x00000000029A0000-0x0000000002A4D000-memory.dmp
                  Filesize

                  692KB

                • memory/1264-149-0x00000000083F0000-0x00000000084CD000-memory.dmp
                  Filesize

                  884KB

                • memory/1264-77-0x0000000004FE0000-0x00000000050BA000-memory.dmp
                  Filesize

                  872KB

                • memory/1264-64-0x00000000068F0000-0x0000000006A49000-memory.dmp
                  Filesize

                  1.3MB

                • memory/1264-158-0x00000000088B0000-0x000000000898B000-memory.dmp
                  Filesize

                  876KB

                • memory/1264-68-0x0000000006B40000-0x0000000006C9E000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1264-122-0x0000000007600000-0x0000000007797000-memory.dmp
                  Filesize

                  1.6MB

                • memory/1264-136-0x00000000077A0000-0x000000000788B000-memory.dmp
                  Filesize

                  940KB

                • memory/1280-127-0x0000000000180000-0x00000000001AA000-memory.dmp
                  Filesize

                  168KB

                • memory/1280-123-0x0000000000000000-mapping.dmp
                • memory/1280-128-0x0000000000B70000-0x0000000000E73000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1280-126-0x0000000000F40000-0x0000000000F5B000-memory.dmp
                  Filesize

                  108KB

                • memory/1288-81-0x0000000000000000-mapping.dmp
                • memory/1308-258-0x000000000041B620-mapping.dmp
                • memory/1316-189-0x0000000000000000-mapping.dmp
                • memory/1348-107-0x0000000000000000-mapping.dmp
                • memory/1348-109-0x00000000001A0000-0x00000000001BF000-memory.dmp
                  Filesize

                  124KB

                • memory/1348-110-0x0000000000080000-0x00000000000AA000-memory.dmp
                  Filesize

                  168KB

                • memory/1348-111-0x0000000001F30000-0x0000000002233000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1352-112-0x0000000000000000-mapping.dmp
                • memory/1352-115-0x00000000000C0000-0x00000000000EA000-memory.dmp
                  Filesize

                  168KB

                • memory/1352-114-0x0000000000860000-0x0000000000964000-memory.dmp
                  Filesize

                  1.0MB

                • memory/1352-116-0x0000000002140000-0x0000000002443000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1360-264-0x0000000000000000-mapping.dmp
                • memory/1384-283-0x0000000000000000-mapping.dmp
                • memory/1516-172-0x0000000000000000-mapping.dmp
                • memory/1560-229-0x0000000000000000-mapping.dmp
                • memory/1604-117-0x000000000041B620-mapping.dmp
                • memory/1604-120-0x0000000000DE0000-0x00000000010E3000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1604-121-0x00000000001D0000-0x00000000001E4000-memory.dmp
                  Filesize

                  80KB

                • memory/1604-119-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/1620-183-0x000000000041B620-mapping.dmp
                • memory/1624-65-0x0000000000000000-mapping.dmp
                • memory/1636-131-0x0000000000000000-mapping.dmp
                • memory/1656-157-0x0000000000430000-0x0000000000444000-memory.dmp
                  Filesize

                  80KB

                • memory/1656-147-0x0000000002130000-0x0000000002433000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1656-142-0x000000000041B620-mapping.dmp
                • memory/1656-146-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/1656-148-0x00000000003C0000-0x00000000003D4000-memory.dmp
                  Filesize

                  80KB

                • memory/1688-61-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/1688-62-0x0000000000D60000-0x0000000001063000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1688-63-0x0000000000270000-0x0000000000284000-memory.dmp
                  Filesize

                  80KB

                • memory/1688-67-0x00000000002D0000-0x00000000002E4000-memory.dmp
                  Filesize

                  80KB

                • memory/1688-58-0x000000000041B620-mapping.dmp
                • memory/1704-155-0x00000000001D0000-0x00000000001E4000-memory.dmp
                  Filesize

                  80KB

                • memory/1704-152-0x00000000021E0000-0x00000000024E3000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1704-166-0x0000000000210000-0x0000000000224000-memory.dmp
                  Filesize

                  80KB

                • memory/1704-150-0x000000000041B620-mapping.dmp
                • memory/1712-90-0x0000000000000000-mapping.dmp
                • memory/1740-164-0x0000000000000000-mapping.dmp
                • memory/1744-56-0x0000000075761000-0x0000000075763000-memory.dmp
                  Filesize

                  8KB

                • memory/1744-60-0x0000000000290000-0x0000000000293000-memory.dmp
                  Filesize

                  12KB

                • memory/1744-55-0x00000000004C0000-0x00000000004F8000-memory.dmp
                  Filesize

                  224KB

                • memory/1744-57-0x0000000000280000-0x0000000000283000-memory.dmp
                  Filesize

                  12KB

                • memory/1744-54-0x0000000000A50000-0x0000000000A8C000-memory.dmp
                  Filesize

                  240KB

                • memory/1748-179-0x0000000000000000-mapping.dmp
                • memory/1752-175-0x0000000000000000-mapping.dmp
                • memory/1780-293-0x0000000000000000-mapping.dmp
                • memory/1824-281-0x0000000000000000-mapping.dmp
                • memory/1832-133-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/1832-134-0x0000000000E60000-0x0000000001163000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1832-129-0x000000000041B620-mapping.dmp
                • memory/1832-135-0x00000000003B0000-0x00000000003C4000-memory.dmp
                  Filesize

                  80KB

                • memory/1836-245-0x000000000041B620-mapping.dmp
                • memory/1860-214-0x0000000000000000-mapping.dmp
                • memory/1884-167-0x000000000041B620-mapping.dmp
                • memory/1904-287-0x000000000041B620-mapping.dmp
                • memory/2004-75-0x0000000000D80000-0x0000000001083000-memory.dmp
                  Filesize

                  3.0MB

                • memory/2004-69-0x000000000041B620-mapping.dmp
                • memory/2004-74-0x0000000000400000-0x000000000042A000-memory.dmp
                  Filesize

                  168KB

                • memory/2004-76-0x00000000001C0000-0x00000000001D4000-memory.dmp
                  Filesize

                  80KB

                • memory/2012-240-0x0000000000000000-mapping.dmp
                • memory/2024-78-0x0000000000000000-mapping.dmp
                • memory/2024-79-0x0000000000FC0000-0x0000000000FD6000-memory.dmp
                  Filesize

                  88KB

                • memory/2024-80-0x0000000000080000-0x00000000000AA000-memory.dmp
                  Filesize

                  168KB

                • memory/2024-87-0x0000000000B70000-0x0000000000E73000-memory.dmp
                  Filesize

                  3.0MB

                • memory/2024-95-0x0000000000960000-0x00000000009F3000-memory.dmp
                  Filesize

                  588KB

                • memory/2032-234-0x0000000000000000-mapping.dmp
                • memory/2036-124-0x0000000000000000-mapping.dmp