Analysis

  • max time kernel
    129s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-06-2022 07:04

General

  • Target

    cfd33d516ee92bc96d6eb380b7f8e7fb.exe

  • Size

    3.0MB

  • MD5

    cfd33d516ee92bc96d6eb380b7f8e7fb

  • SHA1

    8b1a6c2d8430ad40674d7aa9b564261c8b5f4f85

  • SHA256

    66f7d8cb4ae8a8a1a9989f4a66070f9d7eefa029e2c7ff575e447827abbfcb0b

  • SHA512

    53180a9fcc2dce7fb0edbf2831a079804430f2b2255dd76b2c337dc0628f3fde69535668fba86a34530fac4956df3ad671f2ad3e6497130b2cf9f5d64e7d3481

Malware Config

Extracted

Family

arkei

Botnet

Default

Signatures

  • Arkei

    Arkei is an infostealer written in C++.

  • suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

    suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4

  • suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

    suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil

  • ASPack v2.12-2.42 4 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe
    "C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\E87C.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\cfd33d516ee92bc96d6eb380b7f8e7fb.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe
        dllhost.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe
          "C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Users\Admin\AppData\Roaming\vsnaad.exe
            "C:\Users\Admin\AppData\Roaming\vsnaad.exe" 0
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1504
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout /t 20
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:688
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 20
                7⤵
                • Delays execution with timeout.exe
                PID:2040
            • C:\Users\Admin\AppData\Roaming\vsnaad.exe
              C:\Users\Admin\AppData\Roaming\vsnaad.exe
              6⤵
              • Executes dropped EXE
              PID:1800
            • C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe
              "C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe"
              6⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:676
              • C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe
                C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                • Suspicious use of WriteProcessMemory
                PID:1164
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe" & exit
                  8⤵
                    PID:1016
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 5
                      9⤵
                      • Delays execution with timeout.exe
                      PID:636
        • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\crac.exe
          crac.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2020
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x460
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1336
    • C:\Windows\SysWOW64\timeout.exe
      timeout /t 20
      1⤵
      • Delays execution with timeout.exe
      PID:1128
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout /t 20
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\crac.exe

      Filesize

      2.2MB

      MD5

      c22f4bdea9cb2b92b363b7ca84e98992

      SHA1

      6a55b2b4d5933cf37bb419f48758e9d011b32a09

      SHA256

      1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

      SHA512

      6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\crac.exe

      Filesize

      2.2MB

      MD5

      c22f4bdea9cb2b92b363b7ca84e98992

      SHA1

      6a55b2b4d5933cf37bb419f48758e9d011b32a09

      SHA256

      1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

      SHA512

      6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • C:\Users\Admin\AppData\Local\Temp\E87C.tmp\start.bat

      Filesize

      80B

      MD5

      d3e1968f1feff01c334eb0ae4943662c

      SHA1

      9161e9ab4d4ceadb1667890b884742db96db6541

      SHA256

      500f6b19bd4c892f5cb4502975e5287b49170eaf84948bc5153b747b30773de3

      SHA512

      5992099816fd7b6e8bb5bcb3af321301aa9dbc3936a00704384dc0009a92957b10d07aaf853e581864776777c3ceca00e20e2cfe34902c637cacefd98b1c8f1a

    • C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe

      Filesize

      40KB

      MD5

      e8065b3712ff329829a9a9d191b684d7

      SHA1

      be243f806044523da8cfbd65b0aa0057e24ee984

      SHA256

      6b7698fc83039d223e81f3352ea03afdb4fa4c3042a92683298c7fa5f67d5a07

      SHA512

      73641d298b07f51da61218babfec650d7a9de8c3ad6d10c81dd14cb1ac5d50e19624cfbde78f1c7af10698bfa76e83a79a751569839fabc547cb253c5bd3e0c0

    • C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe

      Filesize

      40KB

      MD5

      e8065b3712ff329829a9a9d191b684d7

      SHA1

      be243f806044523da8cfbd65b0aa0057e24ee984

      SHA256

      6b7698fc83039d223e81f3352ea03afdb4fa4c3042a92683298c7fa5f67d5a07

      SHA512

      73641d298b07f51da61218babfec650d7a9de8c3ad6d10c81dd14cb1ac5d50e19624cfbde78f1c7af10698bfa76e83a79a751569839fabc547cb253c5bd3e0c0

    • C:\Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe

      Filesize

      40KB

      MD5

      e8065b3712ff329829a9a9d191b684d7

      SHA1

      be243f806044523da8cfbd65b0aa0057e24ee984

      SHA256

      6b7698fc83039d223e81f3352ea03afdb4fa4c3042a92683298c7fa5f67d5a07

      SHA512

      73641d298b07f51da61218babfec650d7a9de8c3ad6d10c81dd14cb1ac5d50e19624cfbde78f1c7af10698bfa76e83a79a751569839fabc547cb253c5bd3e0c0

    • C:\Users\Admin\AppData\Roaming\vsnaad.exe

      Filesize

      40KB

      MD5

      0a7b32e75a01764ef5389a1d9e72ed63

      SHA1

      871366f3573c3349e9dc7b67fef1ef575815c154

      SHA256

      34ba222ef969f09ecca5506cbada7c346469a96a6af0cdd21146d4435196deda

      SHA512

      f19a7d56a825b59d2841a4f10db940458d3255239e15bb9bbe1376e1fc47d4c97aef09d4e7ecd5a3a35fca44ec92edf60edd4a07ef1845d679c3bd4fc8fe43ba

    • C:\Users\Admin\AppData\Roaming\vsnaad.exe

      Filesize

      40KB

      MD5

      0a7b32e75a01764ef5389a1d9e72ed63

      SHA1

      871366f3573c3349e9dc7b67fef1ef575815c154

      SHA256

      34ba222ef969f09ecca5506cbada7c346469a96a6af0cdd21146d4435196deda

      SHA512

      f19a7d56a825b59d2841a4f10db940458d3255239e15bb9bbe1376e1fc47d4c97aef09d4e7ecd5a3a35fca44ec92edf60edd4a07ef1845d679c3bd4fc8fe43ba

    • C:\Users\Admin\AppData\Roaming\vsnaad.exe

      Filesize

      40KB

      MD5

      0a7b32e75a01764ef5389a1d9e72ed63

      SHA1

      871366f3573c3349e9dc7b67fef1ef575815c154

      SHA256

      34ba222ef969f09ecca5506cbada7c346469a96a6af0cdd21146d4435196deda

      SHA512

      f19a7d56a825b59d2841a4f10db940458d3255239e15bb9bbe1376e1fc47d4c97aef09d4e7ecd5a3a35fca44ec92edf60edd4a07ef1845d679c3bd4fc8fe43ba

    • \ProgramData\mozglue.dll

      Filesize

      133KB

      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\nss3.dll

      Filesize

      1.2MB

      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • \Users\Admin\AppData\Local\Temp\E87C.tmp\crac.exe

      Filesize

      2.2MB

      MD5

      c22f4bdea9cb2b92b363b7ca84e98992

      SHA1

      6a55b2b4d5933cf37bb419f48758e9d011b32a09

      SHA256

      1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

      SHA512

      6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

    • \Users\Admin\AppData\Local\Temp\E87C.tmp\crac.exe

      Filesize

      2.2MB

      MD5

      c22f4bdea9cb2b92b363b7ca84e98992

      SHA1

      6a55b2b4d5933cf37bb419f48758e9d011b32a09

      SHA256

      1e7d93b7da6d178a92f1c8cce77edc31d2e85bf05f957dd5212a2a94a63c4926

      SHA512

      6797bc5872d7df2f7685cce66c089ace45021a8c3858d73e5744691d569e03dd3cbe4c7c458019ce482cdf702be5d9543e452337a9832abbef7e5239f5e50509

    • \Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • \Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • \Users\Admin\AppData\Local\Temp\E87C.tmp\dllhost.exe

      Filesize

      84KB

      MD5

      d8e0462c633785181b5b31ea98308a0b

      SHA1

      69809c0237167c9666ef2b50aa1694e2a8ca38ac

      SHA256

      5ebb3cc4e09a0fb9434d07543cd821538008462dc037c6d6323a32b8bd26dd6e

      SHA512

      0e63d4e2d765005bca3647109315bbac9bb6ea0a640212ffbbeaa949043dc1f36396265c5c4ad80e1cd0701b03ebcbd1c0938df4fbd1e48528feaf997df65aee

    • \Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe

      Filesize

      40KB

      MD5

      e8065b3712ff329829a9a9d191b684d7

      SHA1

      be243f806044523da8cfbd65b0aa0057e24ee984

      SHA256

      6b7698fc83039d223e81f3352ea03afdb4fa4c3042a92683298c7fa5f67d5a07

      SHA512

      73641d298b07f51da61218babfec650d7a9de8c3ad6d10c81dd14cb1ac5d50e19624cfbde78f1c7af10698bfa76e83a79a751569839fabc547cb253c5bd3e0c0

    • \Users\Admin\AppData\Local\Temp\Iioozcrscrdqdprjojgormars2.exe

      Filesize

      40KB

      MD5

      e8065b3712ff329829a9a9d191b684d7

      SHA1

      be243f806044523da8cfbd65b0aa0057e24ee984

      SHA256

      6b7698fc83039d223e81f3352ea03afdb4fa4c3042a92683298c7fa5f67d5a07

      SHA512

      73641d298b07f51da61218babfec650d7a9de8c3ad6d10c81dd14cb1ac5d50e19624cfbde78f1c7af10698bfa76e83a79a751569839fabc547cb253c5bd3e0c0

    • \Users\Admin\AppData\Roaming\vsnaad.exe

      Filesize

      40KB

      MD5

      0a7b32e75a01764ef5389a1d9e72ed63

      SHA1

      871366f3573c3349e9dc7b67fef1ef575815c154

      SHA256

      34ba222ef969f09ecca5506cbada7c346469a96a6af0cdd21146d4435196deda

      SHA512

      f19a7d56a825b59d2841a4f10db940458d3255239e15bb9bbe1376e1fc47d4c97aef09d4e7ecd5a3a35fca44ec92edf60edd4a07ef1845d679c3bd4fc8fe43ba

    • memory/664-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

      Filesize

      8KB

    • memory/676-143-0x0000000073CC0000-0x0000000073DBC000-memory.dmp

      Filesize

      1008KB

    • memory/676-119-0x00000000008C0000-0x00000000008D0000-memory.dmp

      Filesize

      64KB

    • memory/676-138-0x0000000070520000-0x0000000070D00000-memory.dmp

      Filesize

      7.9MB

    • memory/676-162-0x0000000070520000-0x0000000070D00000-memory.dmp

      Filesize

      7.9MB

    • memory/676-135-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/676-161-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/676-136-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB

    • memory/676-145-0x000000006FDE0000-0x000000007051E000-memory.dmp

      Filesize

      7.2MB

    • memory/676-163-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB

    • memory/676-144-0x0000000005190000-0x00000000051F6000-memory.dmp

      Filesize

      408KB

    • memory/960-83-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/960-142-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/960-104-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/1164-153-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-156-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-155-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-150-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-152-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-166-0x0000000060900000-0x0000000060992000-memory.dmp

      Filesize

      584KB

    • memory/1164-164-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-187-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-148-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-147-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-160-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1164-189-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB

    • memory/1504-97-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

      Filesize

      64KB

    • memory/1504-101-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/1504-102-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB

    • memory/1504-103-0x0000000070520000-0x0000000070D00000-memory.dmp

      Filesize

      7.9MB

    • memory/1504-129-0x000000006FDE0000-0x000000007051E000-memory.dmp

      Filesize

      7.2MB

    • memory/1504-110-0x00000000049C0000-0x0000000004A0C000-memory.dmp

      Filesize

      304KB

    • memory/1504-125-0x0000000073CC0000-0x0000000073DBC000-memory.dmp

      Filesize

      1008KB

    • memory/1504-109-0x00000000041B0000-0x0000000004204000-memory.dmp

      Filesize

      336KB

    • memory/1504-137-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/1504-139-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB

    • memory/1504-140-0x0000000070520000-0x0000000070D00000-memory.dmp

      Filesize

      7.9MB

    • memory/1800-118-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-132-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-127-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-141-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-123-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-122-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-116-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1800-115-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1988-76-0x0000000000250000-0x0000000000255000-memory.dmp

      Filesize

      20KB

    • memory/2020-91-0x000000006FDE0000-0x000000007051E000-memory.dmp

      Filesize

      7.2MB

    • memory/2020-85-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB

    • memory/2020-92-0x0000000004EBA000-0x0000000004ECB000-memory.dmp

      Filesize

      68KB

    • memory/2020-105-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/2020-90-0x0000000006480000-0x00000000066B2000-memory.dmp

      Filesize

      2.2MB

    • memory/2020-89-0x0000000073CC0000-0x0000000073DBC000-memory.dmp

      Filesize

      1008KB

    • memory/2020-88-0x0000000070520000-0x0000000070D00000-memory.dmp

      Filesize

      7.9MB

    • memory/2020-87-0x0000000070D00000-0x0000000071A1D000-memory.dmp

      Filesize

      13.1MB

    • memory/2020-86-0x0000000073DE0000-0x0000000073F74000-memory.dmp

      Filesize

      1.6MB

    • memory/2020-108-0x0000000070D00000-0x0000000071A1D000-memory.dmp

      Filesize

      13.1MB

    • memory/2020-84-0x0000000072430000-0x00000000737BF000-memory.dmp

      Filesize

      19.6MB

    • memory/2020-81-0x0000000004EF0000-0x0000000005102000-memory.dmp

      Filesize

      2.1MB

    • memory/2020-80-0x0000000005100000-0x0000000005312000-memory.dmp

      Filesize

      2.1MB

    • memory/2020-107-0x0000000073DE0000-0x0000000073F74000-memory.dmp

      Filesize

      1.6MB

    • memory/2020-72-0x0000000000400000-0x00000000006FA000-memory.dmp

      Filesize

      3.0MB

    • memory/2020-70-0x0000000000400000-0x00000000006FA000-memory.dmp

      Filesize

      3.0MB

    • memory/2020-106-0x0000000071A20000-0x0000000072430000-memory.dmp

      Filesize

      10.1MB