Analysis

  • max time kernel
    151s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 04:25

General

  • Target

    32f0d60079a0227aa273f6cebecd2bce7fc0030b7c03ee070b91be916d6b835f.exe

  • Size

    5.7MB

  • MD5

    dacb53fb7d302ae928f24860ffffa7fc

  • SHA1

    2b9192ade87566fcea23322c45e1da13572e0aae

  • SHA256

    32f0d60079a0227aa273f6cebecd2bce7fc0030b7c03ee070b91be916d6b835f

  • SHA512

    a918acd08bab80a8a91b74e696a2bfd2335c12df17fce0d93fb23bb4952e90a7c4739db60cecd3ce7f0417f667e1d302a40f3e91b577664dc15a3cacaa9af1c4

Malware Config

Extracted

Family

socelars

C2

http://www.chosenncrowned.com/

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider Payload 7 IoCs
  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • suricata: ET MALWARE Win32/FFDroider CnC Activity M2

    suricata: ET MALWARE Win32/FFDroider CnC Activity M2

  • NirSoft WebBrowserPassView 4 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 4 IoCs
  • OnlyLogger Payload 3 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32f0d60079a0227aa273f6cebecd2bce7fc0030b7c03ee070b91be916d6b835f.exe
    "C:\Users\Admin\AppData\Local\Temp\32f0d60079a0227aa273f6cebecd2bce7fc0030b7c03ee070b91be916d6b835f.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:888
    • C:\Program Files (x86)\Company\NewProduct\askinstall35.exe
      "C:\Program Files (x86)\Company\NewProduct\askinstall35.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill /f /im chrome.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1624
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im chrome.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:344
    • C:\Program Files (x86)\Company\NewProduct\chenyuying.exe
      "C:\Program Files (x86)\Company\NewProduct\chenyuying.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files (x86)\Company\NewProduct\chenyuying.exe
        "C:\Program Files (x86)\Company\NewProduct\chenyuying.exe" -u
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        PID:1988
    • C:\Program Files (x86)\Company\NewProduct\md9_1sjm.exe
      "C:\Program Files (x86)\Company\NewProduct\md9_1sjm.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:320
    • C:\Program Files (x86)\Company\NewProduct\OneCleanerInst942914.exe
      "C:\Program Files (x86)\Company\NewProduct\OneCleanerInst942914.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:656
    • C:\Program Files (x86)\Company\NewProduct\rtst1051.exe
      "C:\Program Files (x86)\Company\NewProduct\rtst1051.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Users\Admin\AppData\Local\Temp\11111.exe
        C:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1740
    • C:\Program Files (x86)\Company\NewProduct\setup.exe
      "C:\Program Files (x86)\Company\NewProduct\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1276
    • C:\Program Files (x86)\Company\NewProduct\Cube_WW6.exe
      "C:\Program Files (x86)\Company\NewProduct\Cube_WW6.exe"
      2⤵
      • Executes dropped EXE
      PID:1560
  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
    1⤵
    • Process spawned unexpected child process
    PID:1668

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Company\NewProduct\Cube_WW6.exe
    Filesize

    137KB

    MD5

    d2a8a7af97a4d2f03640f436c95246ef

    SHA1

    b93b2101f368866d89c46248f2625660210ad469

    SHA256

    912a1e6048b5c9b179171365aef4dffbf335f435634a4345ecdc8fd9b288e84a

    SHA512

    4062d45bb4a4c21664a92cc9bbf92632f41274c30cf78f42fc0703a5708ce17d4d0fbb0f7c54293e287315e8dc12bef73d39fc39e69bb25025c390aec67de730

  • C:\Program Files (x86)\Company\NewProduct\OneCleanerInst942914.exe
    Filesize

    178KB

    MD5

    f8c7d533e566557eb19e6a89f910ab6b

    SHA1

    a225ef1c22fcd29562bd5f8a2d0da3969a5393cb

    SHA256

    697949b98fd6207152522f27bcfea3716c336a8cab81751738eda59fd6067dee

    SHA512

    a450548c41c45955206459d58f712284b4589bad7a93d9a6c98c5cd0f1f48cb66ee56cc2568e5dfd1fd174fdc6fa4bd249f5b1c9521dc018ec5b90718d0c97b1

  • C:\Program Files (x86)\Company\NewProduct\OneCleanerInst942914.exe
    Filesize

    178KB

    MD5

    f8c7d533e566557eb19e6a89f910ab6b

    SHA1

    a225ef1c22fcd29562bd5f8a2d0da3969a5393cb

    SHA256

    697949b98fd6207152522f27bcfea3716c336a8cab81751738eda59fd6067dee

    SHA512

    a450548c41c45955206459d58f712284b4589bad7a93d9a6c98c5cd0f1f48cb66ee56cc2568e5dfd1fd174fdc6fa4bd249f5b1c9521dc018ec5b90718d0c97b1

  • C:\Program Files (x86)\Company\NewProduct\askinstall35.exe
    Filesize

    1.4MB

    MD5

    4237b0c8aaf9c4712147215571e73a8a

    SHA1

    26ab93a00cc5b2f662ec2af44f7ae01709b92741

    SHA256

    2bb5d4ff2f58f4fbc6e69ae7f425dca22edf92ddb48abd3f4910332bd30d956e

    SHA512

    e623372bf15c0a8939e1022f0730072dc14cd59ba6aa675ff81dc57b44a43232900cd164744318703c9a75f60f1547dc2f91a8ceb4b6d5bab73db4113c40cd2a

  • C:\Program Files (x86)\Company\NewProduct\chenyuying.exe
    Filesize

    124KB

    MD5

    6ce3e55d094a774714ac633c2553a340

    SHA1

    747233e1d4cd22d1c73f5ef16ae75d09eaecac8f

    SHA256

    78ec34d508a6fc76c95df25b32e3a58fd48bf7379b896ba3d41349255f19d419

    SHA512

    477f1891173b2315d75fa6bc2f84abbf59b078d8252aa7db59baf69f1b5153ccdf270202c20a6f03cbf6718411d1f4819777558d7874304fd016305e54dafa29

  • C:\Program Files (x86)\Company\NewProduct\chenyuying.exe
    Filesize

    124KB

    MD5

    6ce3e55d094a774714ac633c2553a340

    SHA1

    747233e1d4cd22d1c73f5ef16ae75d09eaecac8f

    SHA256

    78ec34d508a6fc76c95df25b32e3a58fd48bf7379b896ba3d41349255f19d419

    SHA512

    477f1891173b2315d75fa6bc2f84abbf59b078d8252aa7db59baf69f1b5153ccdf270202c20a6f03cbf6718411d1f4819777558d7874304fd016305e54dafa29

  • C:\Program Files (x86)\Company\NewProduct\chenyuying.exe
    Filesize

    124KB

    MD5

    6ce3e55d094a774714ac633c2553a340

    SHA1

    747233e1d4cd22d1c73f5ef16ae75d09eaecac8f

    SHA256

    78ec34d508a6fc76c95df25b32e3a58fd48bf7379b896ba3d41349255f19d419

    SHA512

    477f1891173b2315d75fa6bc2f84abbf59b078d8252aa7db59baf69f1b5153ccdf270202c20a6f03cbf6718411d1f4819777558d7874304fd016305e54dafa29

  • C:\Program Files (x86)\Company\NewProduct\md9_1sjm.exe
    Filesize

    4.1MB

    MD5

    5ef104d3036dac5ff025b794279a1dfc

    SHA1

    491372e223a02d8c3dd8f5d77c22b4be6838e8c7

    SHA256

    b4bc15fb0b89f77e8d13d2e9decc0a213d1e33c469367a346acc4ba516895423

    SHA512

    7af766d58c274752454fa3a0ef3a127d0ee3bd2fd5e5ff2afa848a84bb84b0dc63063f743f03a86ba88df7ae033fd5f876bcd17f0e07bca8b7b97dcbe6cea265

  • C:\Program Files (x86)\Company\NewProduct\md9_1sjm.exe
    Filesize

    4.1MB

    MD5

    5ef104d3036dac5ff025b794279a1dfc

    SHA1

    491372e223a02d8c3dd8f5d77c22b4be6838e8c7

    SHA256

    b4bc15fb0b89f77e8d13d2e9decc0a213d1e33c469367a346acc4ba516895423

    SHA512

    7af766d58c274752454fa3a0ef3a127d0ee3bd2fd5e5ff2afa848a84bb84b0dc63063f743f03a86ba88df7ae033fd5f876bcd17f0e07bca8b7b97dcbe6cea265

  • C:\Program Files (x86)\Company\NewProduct\rtst1051.exe
    Filesize

    2.0MB

    MD5

    0012a367988e198f7ce3381ceb90c9eb

    SHA1

    78160bbae8cff3a9953df74f06690cff12ec4c96

    SHA256

    826738323fa5c270e0d388befb12ef81f7e7900a7a5ad8a377e0c2a4d0854fe6

    SHA512

    aed875773d3b627a2f58ae94cdb10f14cb21c53d431c642a6a660298f8a08576f0bbbab550381729357be653ee20d0babed8402241d2f6478d86764705b33e80

  • C:\Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • C:\Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    60KB

    MD5

    308336e7f515478969b24c13ded11ede

    SHA1

    8fb0cf42b77dbbef224a1e5fc38abc2486320775

    SHA256

    889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9

    SHA512

    61ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d577ee15b1b22835840bff1c8fb82680

    SHA1

    b3669a73c166532ae9dae381d1860ebe7ed32101

    SHA256

    9d2037e2167f0d6848d4d96aaecaf59409f16d63934167d59e96a1481aed48c0

    SHA512

    eee2fe08fbb0bd36cffc6b419d0dd07c9b8b317c247590b61edeb144a6db4d55078dd87cba24e302b8968337bd7c8a1e1aad7ee91c16ae7e6283709bae2b85a2

  • C:\Users\Admin\AppData\Local\Temp\11111.exe
    Filesize

    391KB

    MD5

    7165e9d7456520d1f1644aa26da7c423

    SHA1

    177f9116229a021e24f80c4059999c4c52f9e830

    SHA256

    40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67

    SHA512

    fe80996a7f5c64815c19db1fa582581aa1934ea8d1050e686b4f65bcdd000df1decdf711e0e4b1de8a2aa4fcb1ac95cebb0316017c42e80d8386bd3400fcaecb

  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
    Filesize

    246B

    MD5

    46183ada973d3bfaab7be726c800e96e

    SHA1

    7fcb7272b04d8b1caaf1343ec720461ca79f45c2

    SHA256

    0cba483c4b5eeb5d275d2a54db9f7c3c213615628b4ac79044980347930e7a1f

    SHA512

    338c4ccf7cde74e3aa5c9bb27672797ab8b4c8aa6e99fbcf61a2dc8caecdd871b747e4bcc654391479bc4df5a1e72257da9957f9768c67b2846dd9435b950926

  • C:\Users\Admin\AppData\Local\Temp\sqlite.dll
    Filesize

    4KB

    MD5

    c9e19d1cf5913a8502d678cf9d9bada5

    SHA1

    540742fff5573db2925d939f58e4ad4fdda99145

    SHA256

    854befbb09139188c878ad1f1d8667be4b8f6a5ebeeeadeb2068cec52ecef8e8

    SHA512

    ad35535565003dca2c613f0784aff9974a5332e5ea8a5ce08ecae50b220a9434e77e1b595786e7d7a8b8ab20c8d3913047f037e96ac1ec73ae89b47271b83313

  • \Program Files (x86)\Company\NewProduct\Cube_WW6.exe
    Filesize

    137KB

    MD5

    d2a8a7af97a4d2f03640f436c95246ef

    SHA1

    b93b2101f368866d89c46248f2625660210ad469

    SHA256

    912a1e6048b5c9b179171365aef4dffbf335f435634a4345ecdc8fd9b288e84a

    SHA512

    4062d45bb4a4c21664a92cc9bbf92632f41274c30cf78f42fc0703a5708ce17d4d0fbb0f7c54293e287315e8dc12bef73d39fc39e69bb25025c390aec67de730

  • \Program Files (x86)\Company\NewProduct\OneCleanerInst942914.exe
    Filesize

    178KB

    MD5

    f8c7d533e566557eb19e6a89f910ab6b

    SHA1

    a225ef1c22fcd29562bd5f8a2d0da3969a5393cb

    SHA256

    697949b98fd6207152522f27bcfea3716c336a8cab81751738eda59fd6067dee

    SHA512

    a450548c41c45955206459d58f712284b4589bad7a93d9a6c98c5cd0f1f48cb66ee56cc2568e5dfd1fd174fdc6fa4bd249f5b1c9521dc018ec5b90718d0c97b1

  • \Program Files (x86)\Company\NewProduct\askinstall35.exe
    Filesize

    1.4MB

    MD5

    4237b0c8aaf9c4712147215571e73a8a

    SHA1

    26ab93a00cc5b2f662ec2af44f7ae01709b92741

    SHA256

    2bb5d4ff2f58f4fbc6e69ae7f425dca22edf92ddb48abd3f4910332bd30d956e

    SHA512

    e623372bf15c0a8939e1022f0730072dc14cd59ba6aa675ff81dc57b44a43232900cd164744318703c9a75f60f1547dc2f91a8ceb4b6d5bab73db4113c40cd2a

  • \Program Files (x86)\Company\NewProduct\chenyuying.exe
    Filesize

    124KB

    MD5

    6ce3e55d094a774714ac633c2553a340

    SHA1

    747233e1d4cd22d1c73f5ef16ae75d09eaecac8f

    SHA256

    78ec34d508a6fc76c95df25b32e3a58fd48bf7379b896ba3d41349255f19d419

    SHA512

    477f1891173b2315d75fa6bc2f84abbf59b078d8252aa7db59baf69f1b5153ccdf270202c20a6f03cbf6718411d1f4819777558d7874304fd016305e54dafa29

  • \Program Files (x86)\Company\NewProduct\chenyuying.exe
    Filesize

    124KB

    MD5

    6ce3e55d094a774714ac633c2553a340

    SHA1

    747233e1d4cd22d1c73f5ef16ae75d09eaecac8f

    SHA256

    78ec34d508a6fc76c95df25b32e3a58fd48bf7379b896ba3d41349255f19d419

    SHA512

    477f1891173b2315d75fa6bc2f84abbf59b078d8252aa7db59baf69f1b5153ccdf270202c20a6f03cbf6718411d1f4819777558d7874304fd016305e54dafa29

  • \Program Files (x86)\Company\NewProduct\md9_1sjm.exe
    Filesize

    4.1MB

    MD5

    5ef104d3036dac5ff025b794279a1dfc

    SHA1

    491372e223a02d8c3dd8f5d77c22b4be6838e8c7

    SHA256

    b4bc15fb0b89f77e8d13d2e9decc0a213d1e33c469367a346acc4ba516895423

    SHA512

    7af766d58c274752454fa3a0ef3a127d0ee3bd2fd5e5ff2afa848a84bb84b0dc63063f743f03a86ba88df7ae033fd5f876bcd17f0e07bca8b7b97dcbe6cea265

  • \Program Files (x86)\Company\NewProduct\rtst1051.exe
    Filesize

    2.0MB

    MD5

    0012a367988e198f7ce3381ceb90c9eb

    SHA1

    78160bbae8cff3a9953df74f06690cff12ec4c96

    SHA256

    826738323fa5c270e0d388befb12ef81f7e7900a7a5ad8a377e0c2a4d0854fe6

    SHA512

    aed875773d3b627a2f58ae94cdb10f14cb21c53d431c642a6a660298f8a08576f0bbbab550381729357be653ee20d0babed8402241d2f6478d86764705b33e80

  • \Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • \Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • \Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • \Program Files (x86)\Company\NewProduct\setup.exe
    Filesize

    436KB

    MD5

    64c92b900c57ee620763876c9b39031f

    SHA1

    2e53cb3965a4baf87a89c693b243cf4205468162

    SHA256

    9aa71046af14d50a4f849bef29e4a96a53ddb1577c0c3a40e0fecb958f1c18a3

    SHA512

    f559229cb0375a331e1044f7f6f285362561838e7ff03fbc19c0ea31a0e417a5b5244670897a83d35c1fdf3481e12f09b4f99981398523e819a0c0326a50ed5e

  • memory/320-96-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-99-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-69-0x0000000000000000-mapping.dmp
  • memory/320-80-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-113-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-94-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-95-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-102-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/320-97-0x0000000000400000-0x0000000000AE8000-memory.dmp
    Filesize

    6.9MB

  • memory/344-107-0x0000000000000000-mapping.dmp
  • memory/656-93-0x0000000000850000-0x0000000000886000-memory.dmp
    Filesize

    216KB

  • memory/656-106-0x00000000002C0000-0x00000000002C6000-memory.dmp
    Filesize

    24KB

  • memory/656-73-0x0000000000000000-mapping.dmp
  • memory/888-79-0x00000000031F0000-0x00000000038D8000-memory.dmp
    Filesize

    6.9MB

  • memory/888-54-0x00000000750C1000-0x00000000750C3000-memory.dmp
    Filesize

    8KB

  • memory/908-77-0x0000000000000000-mapping.dmp
  • memory/1212-56-0x0000000000000000-mapping.dmp
  • memory/1276-100-0x00000000002E0000-0x0000000000308000-memory.dmp
    Filesize

    160KB

  • memory/1276-104-0x0000000000400000-0x0000000000481000-memory.dmp
    Filesize

    516KB

  • memory/1276-101-0x00000000003A0000-0x00000000003E5000-memory.dmp
    Filesize

    276KB

  • memory/1276-82-0x0000000000000000-mapping.dmp
  • memory/1276-117-0x0000000000400000-0x0000000000481000-memory.dmp
    Filesize

    516KB

  • memory/1560-84-0x0000000000000000-mapping.dmp
  • memory/1624-105-0x0000000000000000-mapping.dmp
  • memory/1740-108-0x0000000000000000-mapping.dmp
  • memory/1740-111-0x0000000000400000-0x000000000047C000-memory.dmp
    Filesize

    496KB

  • memory/1988-65-0x0000000000000000-mapping.dmp
  • memory/2024-61-0x0000000000000000-mapping.dmp