Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2022, 17:59

General

  • Target

    2e42b0bed4d0228cde60b27436b54eef.exe

  • Size

    275KB

  • MD5

    2e42b0bed4d0228cde60b27436b54eef

  • SHA1

    0ad015065304467a659575eca8e322485982eda2

  • SHA256

    7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21

  • SHA512

    1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27

  • SSDEEP

    3072:uXrN9JMhlH3THrjUggq5fbn8+F2XNrEuZ29rBFrDv2i2bC0QhOM/h3qpZa9uD6Vq:2Z9JMTHbEYbnOXWNzr7HHhOrwVfquS

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 11 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e42b0bed4d0228cde60b27436b54eef.exe
    "C:\Users\Admin\AppData\Local\Temp\2e42b0bed4d0228cde60b27436b54eef.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4824
  • C:\Users\Admin\AppData\Local\Temp\FF92.exe
    C:\Users\Admin\AppData\Local\Temp\FF92.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:1988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 1856
      2⤵
      • Program crash
      PID:1376
  • C:\Users\Admin\AppData\Local\Temp\2089.exe
    C:\Users\Admin\AppData\Local\Temp\2089.exe
    1⤵
    • Executes dropped EXE
    PID:4472
  • C:\Users\Admin\AppData\Local\Temp\2647.exe
    C:\Users\Admin\AppData\Local\Temp\2647.exe
    1⤵
    • Executes dropped EXE
    PID:4400
  • C:\Users\Admin\AppData\Local\Temp\2ACC.exe
    C:\Users\Admin\AppData\Local\Temp\2ACC.exe
    1⤵
    • Executes dropped EXE
    PID:3608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1988 -ip 1988
    1⤵
      PID:1644
    • C:\Users\Admin\AppData\Local\Temp\3A4E.exe
      C:\Users\Admin\AppData\Local\Temp\3A4E.exe
      1⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
        "C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:872
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wfyoot.exe /TR "C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe" /F
          3⤵
          • Creates scheduled task(s)
          PID:4444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 896
        2⤵
        • Program crash
        PID:1460
    • C:\Users\Admin\AppData\Local\Temp\4413.exe
      C:\Users\Admin\AppData\Local\Temp\4413.exe
      1⤵
      • Executes dropped EXE
      PID:1004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1716 -ip 1716
      1⤵
        PID:4348
      • C:\Users\Admin\AppData\Local\Temp\4A1F.exe
        C:\Users\Admin\AppData\Local\Temp\4A1F.exe
        1⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3440
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        1⤵
          PID:924
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:5092
          • C:\Windows\SysWOW64\explorer.exe
            C:\Windows\SysWOW64\explorer.exe
            1⤵
              PID:4392
            • C:\Users\Admin\AppData\Roaming\jtbtwhv
              C:\Users\Admin\AppData\Roaming\jtbtwhv
              1⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: MapViewOfSection
              PID:4716
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe
              1⤵
                PID:568
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:2380
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3012
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:324
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1588
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:4008
                        • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                          C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe
                          1⤵
                          • Executes dropped EXE
                          PID:4568
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 316
                            2⤵
                            • Program crash
                            PID:2316
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4568 -ip 4568
                          1⤵
                            PID:2368

                          Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                                  Filesize

                                  324KB

                                  MD5

                                  6936c8f6779f32cd60bf3b635107307d

                                  SHA1

                                  69ead13e469b06d8b1aac9eecb14a6e56613648a

                                  SHA256

                                  5f433b6cef3cbf82c18ab9631e5c1b4c0896664ba107c234aeccf79ab419b9b4

                                  SHA512

                                  4f6bd6afa4636a12f54e461cf60e1b3fc2ab457c1bdb510d36d6680ff2de6cd73242b34d865256950da1de4fe71fd398979b5f895093a1e96c7e3bdd87ee07b1

                                • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                                  Filesize

                                  324KB

                                  MD5

                                  6936c8f6779f32cd60bf3b635107307d

                                  SHA1

                                  69ead13e469b06d8b1aac9eecb14a6e56613648a

                                  SHA256

                                  5f433b6cef3cbf82c18ab9631e5c1b4c0896664ba107c234aeccf79ab419b9b4

                                  SHA512

                                  4f6bd6afa4636a12f54e461cf60e1b3fc2ab457c1bdb510d36d6680ff2de6cd73242b34d865256950da1de4fe71fd398979b5f895093a1e96c7e3bdd87ee07b1

                                • C:\Users\Admin\AppData\Local\Temp\0fd408e638\wfyoot.exe

                                  Filesize

                                  324KB

                                  MD5

                                  6936c8f6779f32cd60bf3b635107307d

                                  SHA1

                                  69ead13e469b06d8b1aac9eecb14a6e56613648a

                                  SHA256

                                  5f433b6cef3cbf82c18ab9631e5c1b4c0896664ba107c234aeccf79ab419b9b4

                                  SHA512

                                  4f6bd6afa4636a12f54e461cf60e1b3fc2ab457c1bdb510d36d6680ff2de6cd73242b34d865256950da1de4fe71fd398979b5f895093a1e96c7e3bdd87ee07b1

                                • C:\Users\Admin\AppData\Local\Temp\2089.exe

                                  Filesize

                                  720KB

                                  MD5

                                  b637a1732d44cad9c877a10707d26528

                                  SHA1

                                  9c4163e9d319564b50131f51475baa86c83f8b34

                                  SHA256

                                  ac6552f97c938cf1d32f0b06857f89e285e7d261a11855950bb62b642be65b37

                                  SHA512

                                  a11102b1e8830e7c4d8d4b879a465f0f14e5d5b97749b843508abd99f1714a468d260b959a785515881e793a3832e9a5501209fcaa8215c5447e2700405c52b6

                                • C:\Users\Admin\AppData\Local\Temp\2089.exe

                                  Filesize

                                  720KB

                                  MD5

                                  b637a1732d44cad9c877a10707d26528

                                  SHA1

                                  9c4163e9d319564b50131f51475baa86c83f8b34

                                  SHA256

                                  ac6552f97c938cf1d32f0b06857f89e285e7d261a11855950bb62b642be65b37

                                  SHA512

                                  a11102b1e8830e7c4d8d4b879a465f0f14e5d5b97749b843508abd99f1714a468d260b959a785515881e793a3832e9a5501209fcaa8215c5447e2700405c52b6

                                • C:\Users\Admin\AppData\Local\Temp\2647.exe

                                  Filesize

                                  783KB

                                  MD5

                                  d25caf342644a7a9653465b933cd07d7

                                  SHA1

                                  cdf0df62a942101c883265eedeae97310cd8c9ed

                                  SHA256

                                  9862e86cb6b2ee8c93d6ad9697a8242c10d43e61354e79659eacc5406e59ce57

                                  SHA512

                                  807a2e8aeff934dd3719a421379d6e6fda9546e65d3b41852d85c63f8edea90b4455a3102d179b52e81dbf717e4c17044fde2c513e2984164b5243aa17cc55e0

                                • C:\Users\Admin\AppData\Local\Temp\2647.exe

                                  Filesize

                                  783KB

                                  MD5

                                  d25caf342644a7a9653465b933cd07d7

                                  SHA1

                                  cdf0df62a942101c883265eedeae97310cd8c9ed

                                  SHA256

                                  9862e86cb6b2ee8c93d6ad9697a8242c10d43e61354e79659eacc5406e59ce57

                                  SHA512

                                  807a2e8aeff934dd3719a421379d6e6fda9546e65d3b41852d85c63f8edea90b4455a3102d179b52e81dbf717e4c17044fde2c513e2984164b5243aa17cc55e0

                                • C:\Users\Admin\AppData\Local\Temp\2ACC.exe

                                  Filesize

                                  720KB

                                  MD5

                                  4db6298298391f1c8d358622bc57e7b8

                                  SHA1

                                  ac9cb8990e928df59056dfaf054f414b10134422

                                  SHA256

                                  ec14da0d097482515910a8c92dd9759b290b5323924c5e18a412e9161e8718a9

                                  SHA512

                                  b7a1b56388c9cc6fb2f1033c4bef9cd8b46f2122ed68eeda8f9e87e94f823b1e409adb4bbfbf80c98e2435ba2c05523c2673142e543e58a26b936ecd008607c7

                                • C:\Users\Admin\AppData\Local\Temp\2ACC.exe

                                  Filesize

                                  720KB

                                  MD5

                                  4db6298298391f1c8d358622bc57e7b8

                                  SHA1

                                  ac9cb8990e928df59056dfaf054f414b10134422

                                  SHA256

                                  ec14da0d097482515910a8c92dd9759b290b5323924c5e18a412e9161e8718a9

                                  SHA512

                                  b7a1b56388c9cc6fb2f1033c4bef9cd8b46f2122ed68eeda8f9e87e94f823b1e409adb4bbfbf80c98e2435ba2c05523c2673142e543e58a26b936ecd008607c7

                                • C:\Users\Admin\AppData\Local\Temp\3A4E.exe

                                  Filesize

                                  324KB

                                  MD5

                                  6936c8f6779f32cd60bf3b635107307d

                                  SHA1

                                  69ead13e469b06d8b1aac9eecb14a6e56613648a

                                  SHA256

                                  5f433b6cef3cbf82c18ab9631e5c1b4c0896664ba107c234aeccf79ab419b9b4

                                  SHA512

                                  4f6bd6afa4636a12f54e461cf60e1b3fc2ab457c1bdb510d36d6680ff2de6cd73242b34d865256950da1de4fe71fd398979b5f895093a1e96c7e3bdd87ee07b1

                                • C:\Users\Admin\AppData\Local\Temp\3A4E.exe

                                  Filesize

                                  324KB

                                  MD5

                                  6936c8f6779f32cd60bf3b635107307d

                                  SHA1

                                  69ead13e469b06d8b1aac9eecb14a6e56613648a

                                  SHA256

                                  5f433b6cef3cbf82c18ab9631e5c1b4c0896664ba107c234aeccf79ab419b9b4

                                  SHA512

                                  4f6bd6afa4636a12f54e461cf60e1b3fc2ab457c1bdb510d36d6680ff2de6cd73242b34d865256950da1de4fe71fd398979b5f895093a1e96c7e3bdd87ee07b1

                                • C:\Users\Admin\AppData\Local\Temp\4413.exe

                                  Filesize

                                  720KB

                                  MD5

                                  76f49e4c7c466ca27af9420399608af5

                                  SHA1

                                  0d61a9e9cecae0b259fec2aac1a89938fe5265d9

                                  SHA256

                                  579392006c5a06592ed6d56e0593e8c272b704c0849ecf6d8f1502ea02c75435

                                  SHA512

                                  1dee0a768259f168d5d71f296c2ecbf1068c59d56be24a5b48f40d26c5cb5114cce2ccd76a3147b5d89ebdfde3331696be58f828eb4ba6ee581efce95aff1a3d

                                • C:\Users\Admin\AppData\Local\Temp\4413.exe

                                  Filesize

                                  720KB

                                  MD5

                                  76f49e4c7c466ca27af9420399608af5

                                  SHA1

                                  0d61a9e9cecae0b259fec2aac1a89938fe5265d9

                                  SHA256

                                  579392006c5a06592ed6d56e0593e8c272b704c0849ecf6d8f1502ea02c75435

                                  SHA512

                                  1dee0a768259f168d5d71f296c2ecbf1068c59d56be24a5b48f40d26c5cb5114cce2ccd76a3147b5d89ebdfde3331696be58f828eb4ba6ee581efce95aff1a3d

                                • C:\Users\Admin\AppData\Local\Temp\4A1F.exe

                                  Filesize

                                  272KB

                                  MD5

                                  762d276b402209a5ce78d9a9258f1bd3

                                  SHA1

                                  b09930f39b658639f06c83a6111be4c93ef712f8

                                  SHA256

                                  82361af8f5303de90ff5757d8dbba87b8fc00fc0ea7b6fb922517c8078e71bdb

                                  SHA512

                                  652df0eb36b4ab353aa1e932051a7ef299527bc985ddea7b7598f5845edaed16e111b1b27b01eee9078d56faefb6111155acd571cf397cf307d502cb2dd2846f

                                • C:\Users\Admin\AppData\Local\Temp\FF92.exe

                                  Filesize

                                  421KB

                                  MD5

                                  331e9467ace2c12e1142a7af3861be0a

                                  SHA1

                                  d148319627a24bef5de80ee1dc8d805b7322db64

                                  SHA256

                                  2c8158054be8f59049ffba2ef8555dbe76812ddef3628dc9e06491ee982f1c61

                                  SHA512

                                  19c8c715d50771737803da03ed97a487012aa1586e68f51db3c437adbc8c69721400ab32b1ecedce05d53ffd7467d9f7cae054e3b763dde7f475155a6678b589

                                • C:\Users\Admin\AppData\Local\Temp\FF92.exe

                                  Filesize

                                  421KB

                                  MD5

                                  331e9467ace2c12e1142a7af3861be0a

                                  SHA1

                                  d148319627a24bef5de80ee1dc8d805b7322db64

                                  SHA256

                                  2c8158054be8f59049ffba2ef8555dbe76812ddef3628dc9e06491ee982f1c61

                                  SHA512

                                  19c8c715d50771737803da03ed97a487012aa1586e68f51db3c437adbc8c69721400ab32b1ecedce05d53ffd7467d9f7cae054e3b763dde7f475155a6678b589

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

                                  Filesize

                                  95.4MB

                                  MD5

                                  3ba1e949d622284230abf7fdb4d7d3e1

                                  SHA1

                                  d9e80ea034b53482f0596fcab723dd3b8adc6204

                                  SHA256

                                  07446168848004f6f0ad35c4e838f01a33ec7b6c66d7745fb394eae2eb4747db

                                  SHA512

                                  a94290e7ac232a2edc8750d4a45c18887c3996dabc55a4727d0d271321770ff355d810baa49f13bc946c68966d6342aeedda459f979a4b80ff385edcfdb5eb8d

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~1.EXE

                                  Filesize

                                  95.4MB

                                  MD5

                                  3ba1e949d622284230abf7fdb4d7d3e1

                                  SHA1

                                  d9e80ea034b53482f0596fcab723dd3b8adc6204

                                  SHA256

                                  07446168848004f6f0ad35c4e838f01a33ec7b6c66d7745fb394eae2eb4747db

                                  SHA512

                                  a94290e7ac232a2edc8750d4a45c18887c3996dabc55a4727d0d271321770ff355d810baa49f13bc946c68966d6342aeedda459f979a4b80ff385edcfdb5eb8d

                                • C:\Users\Admin\AppData\Roaming\jtbtwhv

                                  Filesize

                                  275KB

                                  MD5

                                  2e42b0bed4d0228cde60b27436b54eef

                                  SHA1

                                  0ad015065304467a659575eca8e322485982eda2

                                  SHA256

                                  7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21

                                  SHA512

                                  1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27

                                • C:\Users\Admin\AppData\Roaming\jtbtwhv

                                  Filesize

                                  275KB

                                  MD5

                                  2e42b0bed4d0228cde60b27436b54eef

                                  SHA1

                                  0ad015065304467a659575eca8e322485982eda2

                                  SHA256

                                  7e24caf0355d2816bec83ce942643a52213d676f5ebf03f2ff40d46c2af8ce21

                                  SHA512

                                  1519f668f81b7fc412e29c0726b7c46a216dc8adb64117eb7533d8e0cc2e676a2510965d022e255384cf54d5b6c0f33c33ca0e38fef255bf5d21228f64300e27

                                • memory/324-211-0x0000000001100000-0x000000000110B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/324-213-0x0000000001110000-0x0000000001116000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/324-226-0x0000000001110000-0x0000000001116000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/568-201-0x0000000000FF0000-0x0000000000FFC000-memory.dmp

                                  Filesize

                                  48KB

                                • memory/568-223-0x0000000001200000-0x0000000001206000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/568-200-0x0000000001200000-0x0000000001206000-memory.dmp

                                  Filesize

                                  24KB

                                • memory/872-188-0x0000000000687000-0x00000000006A4000-memory.dmp

                                  Filesize

                                  116KB

                                • memory/872-189-0x0000000000400000-0x0000000000457000-memory.dmp

                                  Filesize

                                  348KB

                                • memory/924-181-0x00000000010C0000-0x00000000010CB000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/924-180-0x00000000010D0000-0x00000000010D7000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/924-220-0x00000000010D0000-0x00000000010D7000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/1588-214-0x0000000000680000-0x0000000000687000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/1588-215-0x00000000003F0000-0x00000000003FD000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1588-227-0x0000000000680000-0x0000000000687000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/1716-176-0x0000000000400000-0x0000000000457000-memory.dmp

                                  Filesize

                                  348KB

                                • memory/1716-174-0x00000000006A7000-0x00000000006C3000-memory.dmp

                                  Filesize

                                  112KB

                                • memory/1716-175-0x00000000005C0000-0x00000000005F7000-memory.dmp

                                  Filesize

                                  220KB

                                • memory/1988-155-0x0000000007480000-0x00000000079AC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/1988-149-0x0000000006420000-0x0000000006470000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/1988-164-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/1988-163-0x000000000077D000-0x00000000007B4000-memory.dmp

                                  Filesize

                                  220KB

                                • memory/1988-146-0x0000000005850000-0x000000000588C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/1988-158-0x0000000007180000-0x000000000719E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/1988-147-0x0000000005B50000-0x0000000005BE2000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/1988-148-0x0000000005BF0000-0x0000000005C56000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/1988-145-0x0000000005740000-0x000000000584A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/1988-139-0x000000000077D000-0x00000000007B4000-memory.dmp

                                  Filesize

                                  220KB

                                • memory/1988-154-0x00000000072B0000-0x0000000007472000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/1988-140-0x0000000002100000-0x0000000002159000-memory.dmp

                                  Filesize

                                  356KB

                                • memory/1988-141-0x0000000000400000-0x000000000046D000-memory.dmp

                                  Filesize

                                  436KB

                                • memory/1988-142-0x0000000004B50000-0x00000000050F4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/1988-150-0x0000000006470000-0x00000000064E6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/1988-143-0x0000000005100000-0x0000000005718000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/1988-144-0x0000000005720000-0x0000000005732000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2380-204-0x0000000000F40000-0x0000000000F62000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/2380-202-0x0000000000F10000-0x0000000000F37000-memory.dmp

                                  Filesize

                                  156KB

                                • memory/2380-224-0x0000000000F40000-0x0000000000F62000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/3012-208-0x00000000005E0000-0x00000000005E5000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3012-225-0x00000000005E0000-0x00000000005E5000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3012-205-0x00000000005D0000-0x00000000005D9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3440-197-0x00000000054B0000-0x00000000054BA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3440-191-0x0000000000C40000-0x0000000000C48000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4008-218-0x0000000000110000-0x000000000011B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/4008-228-0x0000000000120000-0x0000000000128000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4008-217-0x0000000000120000-0x0000000000128000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/4392-193-0x0000000001100000-0x0000000001109000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/4392-222-0x0000000001110000-0x0000000001115000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/4392-198-0x0000000001110000-0x0000000001115000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/4568-230-0x00000000004FA000-0x0000000000517000-memory.dmp

                                  Filesize

                                  116KB

                                • memory/4568-231-0x0000000000400000-0x0000000000457000-memory.dmp

                                  Filesize

                                  348KB

                                • memory/4716-219-0x0000000000400000-0x000000000044A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/4716-209-0x0000000000450000-0x0000000000550000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/4716-210-0x0000000000400000-0x000000000044A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/4824-135-0x0000000000400000-0x000000000044A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/4824-134-0x0000000000400000-0x000000000044A000-memory.dmp

                                  Filesize

                                  296KB

                                • memory/4824-132-0x0000000000517000-0x0000000000527000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4824-133-0x00000000004D0000-0x00000000004D9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/5092-221-0x00000000008A0000-0x00000000008A9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/5092-190-0x00000000008A0000-0x00000000008A9000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/5092-192-0x0000000000890000-0x000000000089F000-memory.dmp

                                  Filesize

                                  60KB