Analysis

  • max time kernel
    41s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2022, 11:38

General

  • Target

    f335de99ddd439a9cbdcfed4b0a401806af481b789122df20936b9c00991b7e7.exe

  • Size

    226KB

  • MD5

    42e00577b163d4c87b0b758871452ff6

  • SHA1

    b829fad325624cba1b1feb07f09cc24d471f47a5

  • SHA256

    f335de99ddd439a9cbdcfed4b0a401806af481b789122df20936b9c00991b7e7

  • SHA512

    6f89abe6076acd36e410cca7817e0bc33d056a2bfead08c5e8a84649b57a53428f2640b6fd026d52895057193af34e249c1dd071d5a781b35be5a62e30285c16

  • SSDEEP

    3072:gXOzkeIaL1sR5Han+zMEJgWYL4BVEu8UwyVCrgW+gvhw4Cg3drRh5h+yKnu:UON/LE5Ow7gWeju8DgBw3ND5h+yc

Malware Config

Extracted

Family

blacknet

Version

v3.7.0 Public

Botnet

Round3

C2

http://zee.zight.ru

Mutex

BN[d396d077ee81b07d64cc8bbff27bbccb]

Attributes
  • antivm

    true

  • elevate_uac

    false

  • install_name

    GPUpdate.exe

  • splitter

    |BN|

  • start_name

    e162b1333458a713bc6916cc8ac4110c

  • startup

    false

  • usb_spread

    false

aes.plain

Signatures

  • BlackNET

    BlackNET is an open source remote access tool written in VB.NET.

  • BlackNET payload 1 IoCs
  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detects Smokeloader packer 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 4 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f335de99ddd439a9cbdcfed4b0a401806af481b789122df20936b9c00991b7e7.exe
    "C:\Users\Admin\AppData\Local\Temp\f335de99ddd439a9cbdcfed4b0a401806af481b789122df20936b9c00991b7e7.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4712
  • C:\Users\Admin\AppData\Local\Temp\D304.exe
    C:\Users\Admin\AppData\Local\Temp\D304.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4836
  • C:\Users\Admin\AppData\Local\Temp\DAF4.exe
    C:\Users\Admin\AppData\Local\Temp\DAF4.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1512
  • C:\Users\Admin\AppData\Local\Temp\E527.exe
    C:\Users\Admin\AppData\Local\Temp\E527.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Users\Admin\AppData\Local\Temp\E527.exe
      "C:\Users\Admin\AppData\Local\Temp\E527.exe"
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3896
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell" Get-MpPreference -verbose
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2160
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 2692
        3⤵
        • Program crash
        PID:4972
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\RegStart"
      2⤵
        PID:1180
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe'" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4224
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe'" /f
          3⤵
          • Creates scheduled task(s)
          PID:4904
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\E527.exe" "C:\Users\Admin\AppData\Roaming\RegStart\RegStart.exe"
        2⤵
          PID:4540
      • C:\Users\Admin\AppData\Local\Temp\F814.exe
        C:\Users\Admin\AppData\Local\Temp\F814.exe
        1⤵
        • Executes dropped EXE
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\1D9.exe
        C:\Users\Admin\AppData\Local\Temp\1D9.exe
        1⤵
          PID:3700
          • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe
            "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe"
            2⤵
              PID:1864
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe" /F
                3⤵
                • Creates scheduled task(s)
                PID:1896
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rovwer.exe" /P "Admin:N"&&CACLS "rovwer.exe" /P "Admin:R" /E&&echo Y|CACLS "..\99e342142d" /P "Admin:N"&&CACLS "..\99e342142d" /P "Admin:R" /E&&Exit
                3⤵
                  PID:4660
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    4⤵
                      PID:1484
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "rovwer.exe" /P "Admin:N"
                      4⤵
                        PID:2636
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "rovwer.exe" /P "Admin:R" /E
                        4⤵
                          PID:4316
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1140
                      2⤵
                      • Program crash
                      PID:3792
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:4544
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:2204
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3700 -ip 3700
                        1⤵
                          PID:4576
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:4868
                          • C:\Windows\explorer.exe
                            C:\Windows\explorer.exe
                            1⤵
                              PID:2332
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3896 -ip 3896
                              1⤵
                                PID:3776
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                  PID:4644

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\1D9.exe

                                  Filesize

                                  264KB

                                  MD5

                                  67422d51b73b9e580ad1d4ba4a0553b9

                                  SHA1

                                  cbbbb10166bb020d637bee3b99a1e61dab3e2067

                                  SHA256

                                  64f2b64d4122513a18baddccd96b896d6287916a53745756ba44b3ff3c39117d

                                  SHA512

                                  43b60e1184fbf566eaf820d5aeeb649f62112d09607d6d746d562fc3e13c590c23bfa6cd80caf769005f1ba7be22d7e2d12294117e8ee618aa5e4357bcb4bb89

                                • C:\Users\Admin\AppData\Local\Temp\1D9.exe

                                  Filesize

                                  264KB

                                  MD5

                                  67422d51b73b9e580ad1d4ba4a0553b9

                                  SHA1

                                  cbbbb10166bb020d637bee3b99a1e61dab3e2067

                                  SHA256

                                  64f2b64d4122513a18baddccd96b896d6287916a53745756ba44b3ff3c39117d

                                  SHA512

                                  43b60e1184fbf566eaf820d5aeeb649f62112d09607d6d746d562fc3e13c590c23bfa6cd80caf769005f1ba7be22d7e2d12294117e8ee618aa5e4357bcb4bb89

                                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                                  Filesize

                                  264KB

                                  MD5

                                  67422d51b73b9e580ad1d4ba4a0553b9

                                  SHA1

                                  cbbbb10166bb020d637bee3b99a1e61dab3e2067

                                  SHA256

                                  64f2b64d4122513a18baddccd96b896d6287916a53745756ba44b3ff3c39117d

                                  SHA512

                                  43b60e1184fbf566eaf820d5aeeb649f62112d09607d6d746d562fc3e13c590c23bfa6cd80caf769005f1ba7be22d7e2d12294117e8ee618aa5e4357bcb4bb89

                                • C:\Users\Admin\AppData\Local\Temp\99e342142d\rovwer.exe

                                  Filesize

                                  264KB

                                  MD5

                                  67422d51b73b9e580ad1d4ba4a0553b9

                                  SHA1

                                  cbbbb10166bb020d637bee3b99a1e61dab3e2067

                                  SHA256

                                  64f2b64d4122513a18baddccd96b896d6287916a53745756ba44b3ff3c39117d

                                  SHA512

                                  43b60e1184fbf566eaf820d5aeeb649f62112d09607d6d746d562fc3e13c590c23bfa6cd80caf769005f1ba7be22d7e2d12294117e8ee618aa5e4357bcb4bb89

                                • C:\Users\Admin\AppData\Local\Temp\D304.exe

                                  Filesize

                                  330KB

                                  MD5

                                  61bf9bb6cca5549bea73511e3bb5309c

                                  SHA1

                                  e2055192326bd529214883e6183fdcf7fbd09dfe

                                  SHA256

                                  63566438f17e880d08435cc329b75f75f2c58773f3b2d046d4f3867cd8f2b810

                                  SHA512

                                  d79745a0c5f72daa3e323340496bcce48411f1e843402d5bc3cb0732328952c36188bd2b961b16e9d424b2b5c1f5470efe0fce302dd71c8d6377c4b7cf455393

                                • C:\Users\Admin\AppData\Local\Temp\D304.exe

                                  Filesize

                                  330KB

                                  MD5

                                  61bf9bb6cca5549bea73511e3bb5309c

                                  SHA1

                                  e2055192326bd529214883e6183fdcf7fbd09dfe

                                  SHA256

                                  63566438f17e880d08435cc329b75f75f2c58773f3b2d046d4f3867cd8f2b810

                                  SHA512

                                  d79745a0c5f72daa3e323340496bcce48411f1e843402d5bc3cb0732328952c36188bd2b961b16e9d424b2b5c1f5470efe0fce302dd71c8d6377c4b7cf455393

                                • C:\Users\Admin\AppData\Local\Temp\DAF4.exe

                                  Filesize

                                  4.2MB

                                  MD5

                                  a62965dde47512afd390806c88f6821b

                                  SHA1

                                  f389db3ccfd224c398e33375521ae18b5dc6b8fd

                                  SHA256

                                  e3277990b72605b6007680f0709c1d6b7e2e178b71d6d3f45635ae1d085b1400

                                  SHA512

                                  89dc8bd1ace718ba9326b3b12ac9aeca4e7d32afffd58676657966fa8e6c984eb346e88654e97603f47d0194d452e8da03d97acfd64be34ac10191f7ff30cacf

                                • C:\Users\Admin\AppData\Local\Temp\E527.exe

                                  Filesize

                                  356KB

                                  MD5

                                  354d20e21be15dd24eb8a9b2b18a8407

                                  SHA1

                                  f3c9182f5a8a45ee8f9cbcf2e4584c38ff670533

                                  SHA256

                                  0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44

                                  SHA512

                                  7bcfd0d2bca8a7bc3f0836c012438125cabdac11e7978f3d8a55ace928fe98ceac8ddf7cab146847ad9c9299c9231711df5b52cb0e429bcb5f519fae7353edb5

                                • C:\Users\Admin\AppData\Local\Temp\E527.exe

                                  Filesize

                                  356KB

                                  MD5

                                  354d20e21be15dd24eb8a9b2b18a8407

                                  SHA1

                                  f3c9182f5a8a45ee8f9cbcf2e4584c38ff670533

                                  SHA256

                                  0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44

                                  SHA512

                                  7bcfd0d2bca8a7bc3f0836c012438125cabdac11e7978f3d8a55ace928fe98ceac8ddf7cab146847ad9c9299c9231711df5b52cb0e429bcb5f519fae7353edb5

                                • C:\Users\Admin\AppData\Local\Temp\E527.exe

                                  Filesize

                                  356KB

                                  MD5

                                  354d20e21be15dd24eb8a9b2b18a8407

                                  SHA1

                                  f3c9182f5a8a45ee8f9cbcf2e4584c38ff670533

                                  SHA256

                                  0cfd96c0bef9061e95adbc2f00f6e0bd39c1103ca4761c9af850528d28455b44

                                  SHA512

                                  7bcfd0d2bca8a7bc3f0836c012438125cabdac11e7978f3d8a55ace928fe98ceac8ddf7cab146847ad9c9299c9231711df5b52cb0e429bcb5f519fae7353edb5

                                • C:\Users\Admin\AppData\Local\Temp\F814.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  36da8ca92f8725823be3112ad6387a19

                                  SHA1

                                  daff6fee3427fcc8d5578c38473e9cef64af8bf6

                                  SHA256

                                  c1ec537c48cc89eb36163eea90e1b6de9a0d5a23ee1b9fd6b9188057bb168fe2

                                  SHA512

                                  a52e8ff50df8260bfb8368a1c53959fedf0b609c5cf5fb1d3fde5de0b800603e637f9afac939bddb7234e2215ba2b83a28af0fbc4cc5fbb2c7c2012c1b30ac2d

                                • C:\Users\Admin\AppData\Local\Temp\F814.exe

                                  Filesize

                                  3.0MB

                                  MD5

                                  36da8ca92f8725823be3112ad6387a19

                                  SHA1

                                  daff6fee3427fcc8d5578c38473e9cef64af8bf6

                                  SHA256

                                  c1ec537c48cc89eb36163eea90e1b6de9a0d5a23ee1b9fd6b9188057bb168fe2

                                  SHA512

                                  a52e8ff50df8260bfb8368a1c53959fedf0b609c5cf5fb1d3fde5de0b800603e637f9afac939bddb7234e2215ba2b83a28af0fbc4cc5fbb2c7c2012c1b30ac2d

                                • memory/1512-165-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-162-0x0000000005450000-0x00000000054C6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/1512-149-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-160-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-146-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-152-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-164-0x00000000063D0000-0x0000000006592000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/1512-163-0x00000000054D0000-0x0000000005520000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/1512-154-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/1512-161-0x00000000776F0000-0x0000000077893000-memory.dmp

                                  Filesize

                                  1.6MB

                                • memory/1512-158-0x0000000000400000-0x0000000000C8F000-memory.dmp

                                  Filesize

                                  8.6MB

                                • memory/2160-204-0x0000000006CC0000-0x0000000006CDA000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/2160-184-0x00000000049E0000-0x0000000004A02000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/2160-197-0x0000000005F80000-0x0000000005FB2000-memory.dmp

                                  Filesize

                                  200KB

                                • memory/2160-203-0x0000000007300000-0x000000000797A000-memory.dmp

                                  Filesize

                                  6.5MB

                                • memory/2160-198-0x000000006E720000-0x000000006E76C000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/2160-189-0x00000000059C0000-0x00000000059DE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2160-205-0x0000000006D30000-0x0000000006D3A000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/2160-182-0x00000000043E0000-0x0000000004416000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/2160-183-0x0000000004A70000-0x0000000005098000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/2160-211-0x0000000006F40000-0x0000000006FD6000-memory.dmp

                                  Filesize

                                  600KB

                                • memory/2160-199-0x0000000005F60000-0x0000000005F7E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2160-185-0x0000000005310000-0x0000000005376000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2160-228-0x0000000006F00000-0x0000000006F0E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2204-209-0x0000000000A80000-0x0000000000A8F000-memory.dmp

                                  Filesize

                                  60KB

                                • memory/2204-207-0x0000000000A90000-0x0000000000A99000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/2328-157-0x00000000000D0000-0x000000000012E000-memory.dmp

                                  Filesize

                                  376KB

                                • memory/2328-159-0x0000000004980000-0x00000000049E6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/3700-194-0x0000000000CE0000-0x0000000000D1E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/3700-218-0x0000000000400000-0x0000000000845000-memory.dmp

                                  Filesize

                                  4.3MB

                                • memory/3700-206-0x00000000009C7000-0x00000000009E6000-memory.dmp

                                  Filesize

                                  124KB

                                • memory/3700-195-0x0000000000400000-0x0000000000845000-memory.dmp

                                  Filesize

                                  4.3MB

                                • memory/3896-170-0x0000000000760000-0x0000000000782000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/3896-230-0x0000000009FB9000-0x0000000009FC2000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3896-234-0x0000000009FA1000-0x0000000009FB8000-memory.dmp

                                  Filesize

                                  92KB

                                • memory/3896-215-0x0000000009FAF000-0x0000000009FB4000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3896-210-0x0000000009FA0000-0x0000000009FA4000-memory.dmp

                                  Filesize

                                  16KB

                                • memory/3896-217-0x0000000009FB4000-0x0000000009FB9000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3896-174-0x0000000004C10000-0x0000000004CAC000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/3896-231-0x0000000009FC2000-0x0000000009FCB000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3896-213-0x0000000009FAA000-0x0000000009FAF000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/3896-232-0x0000000009FCB000-0x0000000009FD4000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/3896-227-0x0000000009FA7000-0x0000000009FAA000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3896-212-0x0000000009FA4000-0x0000000009FA7000-memory.dmp

                                  Filesize

                                  12KB

                                • memory/3896-233-0x0000000004CB0000-0x0000000005254000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3896-226-0x0000000004CB0000-0x0000000005254000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3896-225-0x0000000009FA5000-0x0000000009FB8000-memory.dmp

                                  Filesize

                                  76KB

                                • memory/3896-224-0x0000000004CB0000-0x0000000005254000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3896-177-0x0000000004CD0000-0x0000000004CDA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3896-179-0x0000000004EE0000-0x0000000004F36000-memory.dmp

                                  Filesize

                                  344KB

                                • memory/4544-193-0x0000000000CD0000-0x0000000000CDB000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/4544-192-0x0000000000CE0000-0x0000000000CE7000-memory.dmp

                                  Filesize

                                  28KB

                                • memory/4712-135-0x0000000000400000-0x000000000083C000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4712-134-0x0000000000400000-0x000000000083C000-memory.dmp

                                  Filesize

                                  4.2MB

                                • memory/4712-132-0x0000000000AC7000-0x0000000000ADD000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/4712-133-0x0000000000030000-0x0000000000039000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/4836-148-0x0000000005410000-0x000000000551A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4836-140-0x00000000021D0000-0x000000000220E000-memory.dmp

                                  Filesize

                                  248KB

                                • memory/4836-139-0x00000000005E9000-0x000000000061A000-memory.dmp

                                  Filesize

                                  196KB

                                • memory/4836-141-0x0000000000400000-0x00000000005A8000-memory.dmp

                                  Filesize

                                  1.7MB

                                • memory/4836-142-0x0000000004D40000-0x00000000052E4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4836-143-0x00000000052F0000-0x0000000005382000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/4836-180-0x0000000006890000-0x0000000006DBC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4836-147-0x00000000055E0000-0x0000000005BF8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4836-191-0x00000000005E9000-0x000000000061A000-memory.dmp

                                  Filesize

                                  196KB

                                • memory/4836-150-0x0000000005540000-0x0000000005552000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4836-151-0x0000000005560000-0x000000000559C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/4868-214-0x0000000000640000-0x0000000000645000-memory.dmp

                                  Filesize

                                  20KB

                                • memory/4868-216-0x0000000000630000-0x0000000000639000-memory.dmp

                                  Filesize

                                  36KB