Analysis

  • max time kernel
    131s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2023 14:08

General

  • Target

    d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce.exe

  • Size

    207KB

  • MD5

    9d7d6a09952da6397ff7d3b6fcb604c3

  • SHA1

    8c87a053685db523cc629f737cca8296de9cb5db

  • SHA256

    d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce

  • SHA512

    21c062272f367a42b1b10ec96061c47bb7cf2279678e25e73abb490da290cb92f4670d1a9651b3f07d9ea8eac4ceb8a69c5bf360f9803a8e2d7adf5afa87fd4b

  • SSDEEP

    3072:kXtlfKYYlomI5Og5K76G9Hyj/npg0WKa0AkSVL4hi:gfh5Jm9oxERhkS

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Signatures

  • Detects Smokeloader packer 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 18 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1052
  • C:\Users\Admin\AppData\Local\Temp\E4B7.exe
    C:\Users\Admin\AppData\Local\Temp\E4B7.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp",Qowsuiaedfeupa
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Sets service image path in registry
      • Loads dropped DLL
      • Accesses Microsoft Outlook accounts
      • Accesses Microsoft Outlook profiles
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • outlook_office_path
      • outlook_win_path
      PID:4540
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18651
        3⤵
        • Modifies registry class
        • Suspicious use of FindShellTrayWindow
        PID:4164
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
        3⤵
          PID:1420
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18651
          3⤵
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          PID:2200
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
          3⤵
            PID:3520
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18651
            3⤵
            • Modifies registry class
            • Suspicious use of FindShellTrayWindow
            PID:3832
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
            3⤵
              PID:5044
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
              3⤵
                PID:4132
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18651
                3⤵
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                PID:224
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                3⤵
                  PID:1944
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                  3⤵
                    PID:4060
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                    3⤵
                      PID:3896
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                      3⤵
                        PID:2108
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                        3⤵
                          PID:4984
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                          3⤵
                            PID:3848
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                            3⤵
                              PID:4656
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                              3⤵
                                PID:1680
                              • C:\Windows\SysWOW64\schtasks.exe
                                schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                3⤵
                                  PID:4972
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                  3⤵
                                    PID:1224
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                    3⤵
                                      PID:2040
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                      3⤵
                                        PID:4652
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                        3⤵
                                          PID:4868
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                          3⤵
                                            PID:316
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                            3⤵
                                              PID:1904
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                              3⤵
                                                PID:2132
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 540
                                              2⤵
                                              • Program crash
                                              PID:2108
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3340 -ip 3340
                                            1⤵
                                              PID:1824
                                            • C:\Users\Admin\AppData\Local\Temp\4A58.exe
                                              C:\Users\Admin\AppData\Local\Temp\4A58.exe
                                              1⤵
                                              • Executes dropped EXE
                                              PID:3536
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3536 -s 1348
                                                2⤵
                                                • Program crash
                                                PID:2216
                                            • C:\Users\Admin\AppData\Roaming\scbfcad
                                              C:\Users\Admin\AppData\Roaming\scbfcad
                                              1⤵
                                              • Executes dropped EXE
                                              • Checks SCSI registry key(s)
                                              • Suspicious behavior: MapViewOfSection
                                              PID:3112
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3536 -ip 3536
                                              1⤵
                                                PID:3320
                                              • C:\Windows\SysWOW64\svchost.exe
                                                C:\Windows\SysWOW64\svchost.exe -k LocalService
                                                1⤵
                                                • Loads dropped DLL
                                                • Checks processor information in registry
                                                • Suspicious use of WriteProcessMemory
                                                PID:2308
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\license.dll",SCwcTEpidQ==
                                                  2⤵
                                                  • Loads dropped DLL
                                                  • Checks processor information in registry
                                                  PID:4832
                                              • C:\Windows\System32\rundll32.exe
                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                1⤵
                                                  PID:376

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files (x86)\WindowsPowerShell\Modules\LICENSE.dll

                                                  Filesize

                                                  774KB

                                                  MD5

                                                  e69938ef7047950a94150495bf257057

                                                  SHA1

                                                  e863d0cddc7eb83a52bac10738b17b0ebf17322c

                                                  SHA256

                                                  c42c456d3052079a83028a67c82943a6b52bad2c652bb147060ae5c296671509

                                                  SHA512

                                                  89e4b3677293e8f76e5b656ac33c22c35b1481b3270725b5400b386a4ce883d6db15f5b92762a910e1dae82e3bf0c75c2261ee8fd36955506d093ffc034e9882

                                                • C:\Program Files (x86)\WindowsPowerShell\Modules\LICENSE.dll

                                                  Filesize

                                                  774KB

                                                  MD5

                                                  e69938ef7047950a94150495bf257057

                                                  SHA1

                                                  e863d0cddc7eb83a52bac10738b17b0ebf17322c

                                                  SHA256

                                                  c42c456d3052079a83028a67c82943a6b52bad2c652bb147060ae5c296671509

                                                  SHA512

                                                  89e4b3677293e8f76e5b656ac33c22c35b1481b3270725b5400b386a4ce883d6db15f5b92762a910e1dae82e3bf0c75c2261ee8fd36955506d093ffc034e9882

                                                • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_~_8wekyb3d8bbwe.xml

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  d218cf550fbd777e789242cafb804d10

                                                  SHA1

                                                  05175dd84f05a7989944e48db6a811c297fa47e3

                                                  SHA256

                                                  8143763940b906ea93cd7288a08f251203d9f21da5282a6c20201ea7530df8c4

                                                  SHA512

                                                  9134ace4de9b6bae58b161af4ede7ca9b24bd396c6b1e24ec8301ecb90278bc8b61d7600be7248b2f35acc49b83fcd627045f18c61ee57a2da0e19d61330261d

                                                • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Uqioyhuair.tmp

                                                  Filesize

                                                  3.5MB

                                                  MD5

                                                  1c1d45fb168471c7c850a66ee2783a83

                                                  SHA1

                                                  bb5b94452ed02d8f2d2dc184b9b04f0f596c9aed

                                                  SHA256

                                                  d46ef78efce5f516669ce572aa5003ce4184d779bedde8cfbd2775a195badb30

                                                  SHA512

                                                  19c48e6bec8ef0e907a918e4b8eedc391356323b8ae76624423c5ea1e2cc4189642ecf79b887fc0e0fde81fb7b5a64a69874a4821701359ae155c245d22abfe8

                                                • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\osver.txt

                                                  Filesize

                                                  10B

                                                  MD5

                                                  bea59a2f25178d677087edde21c60be7

                                                  SHA1

                                                  56844a00adee7f8d2c161808de19ce6fd191fb61

                                                  SHA256

                                                  4906553c99e9225413bacd029603f2549fe8d972bf389770063f3e932b623d80

                                                  SHA512

                                                  008622e6bf66c3cc4bdfc9cda7dc10376e310b560321ee0d7040f7c6da7673cd04799ee04b9e22bb45de378fa0791dc0b6bbf43efed1366d0520c26d803d7400

                                                • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\pictures.ico

                                                  Filesize

                                                  81KB

                                                  MD5

                                                  8e3fed079e101c5dcb906371c2b546a3

                                                  SHA1

                                                  7fbf444c9361684228f643984f1333c271e86bf2

                                                  SHA256

                                                  b0203f1dc9e443dc5081b0f882934241645a5de4cc4b1e47b3460d17446a87d4

                                                  SHA512

                                                  898c825d9f20f3d20cb389328561ff70bd0c762dcc1369bd0bb633130aee9dcf60b433da66c3a37dd1d46a70614abd955a323589917ed85e0ec5698cdd0268c2

                                                • C:\Users\Admin\AppData\Local\Temp\4A58.exe

                                                  Filesize

                                                  245KB

                                                  MD5

                                                  0ccbec377710f5e58b2d01685f1ecb72

                                                  SHA1

                                                  af747d213c4a3dad010b455f42439bf60b9880a1

                                                  SHA256

                                                  aa3a7343485d41c250d2ccfe85d8efd16e9e9f1a4c648e67c109998fa6b049b5

                                                  SHA512

                                                  dabb331a125b87726c387ca24380f8d58074773ebb75dd526cbbe9ef8304efeafb81f0b7dea4dd4546c3ffd7a78fbf2bbe3afdaeb57f98f96ec3ec36902820e7

                                                • C:\Users\Admin\AppData\Local\Temp\4A58.exe

                                                  Filesize

                                                  245KB

                                                  MD5

                                                  0ccbec377710f5e58b2d01685f1ecb72

                                                  SHA1

                                                  af747d213c4a3dad010b455f42439bf60b9880a1

                                                  SHA256

                                                  aa3a7343485d41c250d2ccfe85d8efd16e9e9f1a4c648e67c109998fa6b049b5

                                                  SHA512

                                                  dabb331a125b87726c387ca24380f8d58074773ebb75dd526cbbe9ef8304efeafb81f0b7dea4dd4546c3ffd7a78fbf2bbe3afdaeb57f98f96ec3ec36902820e7

                                                • C:\Users\Admin\AppData\Local\Temp\E4B7.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  445d5dd3ad715398cc90b26543e803a5

                                                  SHA1

                                                  5d40ebae274cd5162cd24f8a86a13e174ec8114f

                                                  SHA256

                                                  8f04f0b97c69bc8748c3d5bfaf9f054a4c634548a592684285a3be5974b2d3fb

                                                  SHA512

                                                  6548ff7e0a65d05e78efea93110cc5175c579dcc99dc74a691ef20ff59b4ac10dccdaf598f23e0413f8f7f3e8e214c3e6dbc48f10ad70efba0be37b1b03018cf

                                                • C:\Users\Admin\AppData\Local\Temp\E4B7.exe

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  445d5dd3ad715398cc90b26543e803a5

                                                  SHA1

                                                  5d40ebae274cd5162cd24f8a86a13e174ec8114f

                                                  SHA256

                                                  8f04f0b97c69bc8748c3d5bfaf9f054a4c634548a592684285a3be5974b2d3fb

                                                  SHA512

                                                  6548ff7e0a65d05e78efea93110cc5175c579dcc99dc74a691ef20ff59b4ac10dccdaf598f23e0413f8f7f3e8e214c3e6dbc48f10ad70efba0be37b1b03018cf

                                                • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp

                                                  Filesize

                                                  774KB

                                                  MD5

                                                  e06fb66bfbe1444cc091f0297b8d32db

                                                  SHA1

                                                  c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

                                                  SHA256

                                                  b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

                                                  SHA512

                                                  c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

                                                • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp

                                                  Filesize

                                                  774KB

                                                  MD5

                                                  e06fb66bfbe1444cc091f0297b8d32db

                                                  SHA1

                                                  c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

                                                  SHA256

                                                  b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

                                                  SHA512

                                                  c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

                                                • C:\Users\Admin\AppData\Roaming\scbfcad

                                                  Filesize

                                                  207KB

                                                  MD5

                                                  9d7d6a09952da6397ff7d3b6fcb604c3

                                                  SHA1

                                                  8c87a053685db523cc629f737cca8296de9cb5db

                                                  SHA256

                                                  d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce

                                                  SHA512

                                                  21c062272f367a42b1b10ec96061c47bb7cf2279678e25e73abb490da290cb92f4670d1a9651b3f07d9ea8eac4ceb8a69c5bf360f9803a8e2d7adf5afa87fd4b

                                                • C:\Users\Admin\AppData\Roaming\scbfcad

                                                  Filesize

                                                  207KB

                                                  MD5

                                                  9d7d6a09952da6397ff7d3b6fcb604c3

                                                  SHA1

                                                  8c87a053685db523cc629f737cca8296de9cb5db

                                                  SHA256

                                                  d5f744e39a1c58cdc50018233882c5cb2762ceba9fefad7fbb623dfe548b7dce

                                                  SHA512

                                                  21c062272f367a42b1b10ec96061c47bb7cf2279678e25e73abb490da290cb92f4670d1a9651b3f07d9ea8eac4ceb8a69c5bf360f9803a8e2d7adf5afa87fd4b

                                                • \??\c:\program files (x86)\windowspowershell\modules\license.dll

                                                  Filesize

                                                  774KB

                                                  MD5

                                                  e69938ef7047950a94150495bf257057

                                                  SHA1

                                                  e863d0cddc7eb83a52bac10738b17b0ebf17322c

                                                  SHA256

                                                  c42c456d3052079a83028a67c82943a6b52bad2c652bb147060ae5c296671509

                                                  SHA512

                                                  89e4b3677293e8f76e5b656ac33c22c35b1481b3270725b5400b386a4ce883d6db15f5b92762a910e1dae82e3bf0c75c2261ee8fd36955506d093ffc034e9882

                                                • memory/224-215-0x00007FF72D7E6890-mapping.dmp

                                                • memory/224-218-0x0000018A43720000-0x0000018A439D5000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/224-216-0x0000018A45180000-0x0000018A452C0000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/224-217-0x0000018A45180000-0x0000018A452C0000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/316-232-0x0000000000000000-mapping.dmp

                                                • memory/1052-133-0x0000000002C60000-0x0000000002C69000-memory.dmp

                                                  Filesize

                                                  36KB

                                                • memory/1052-135-0x0000000000400000-0x0000000002B9C000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/1052-134-0x0000000000400000-0x0000000002B9C000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/1052-132-0x0000000002C88000-0x0000000002C99000-memory.dmp

                                                  Filesize

                                                  68KB

                                                • memory/1224-228-0x0000000000000000-mapping.dmp

                                                • memory/1420-186-0x0000000000000000-mapping.dmp

                                                • memory/1680-226-0x0000000000000000-mapping.dmp

                                                • memory/1904-233-0x0000000000000000-mapping.dmp

                                                • memory/1944-219-0x0000000000000000-mapping.dmp

                                                • memory/2040-229-0x0000000000000000-mapping.dmp

                                                • memory/2108-222-0x0000000000000000-mapping.dmp

                                                • memory/2132-234-0x0000000000000000-mapping.dmp

                                                • memory/2200-192-0x000001CE14650000-0x000001CE14790000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/2200-191-0x00007FF72D7E6890-mapping.dmp

                                                • memory/2200-193-0x000001CE14650000-0x000001CE14790000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/2200-194-0x000001CE12D80000-0x000001CE13035000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/2200-196-0x000001CE12D80000-0x000001CE13035000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/2308-177-0x0000000003B10000-0x0000000004665000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/2308-206-0x0000000003B10000-0x0000000004665000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/2308-183-0x0000000003B10000-0x0000000004665000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/3112-158-0x0000000000400000-0x0000000002B9C000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/3112-156-0x0000000000400000-0x0000000002B9C000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/3112-155-0x0000000002C50000-0x0000000002D50000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/3340-143-0x00000000049E0000-0x0000000004B0E000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/3340-136-0x0000000000000000-mapping.dmp

                                                • memory/3340-144-0x0000000000400000-0x0000000002C74000-memory.dmp

                                                  Filesize

                                                  40.5MB

                                                • memory/3340-142-0x00000000048F6000-0x00000000049DE000-memory.dmp

                                                  Filesize

                                                  928KB

                                                • memory/3520-195-0x0000000000000000-mapping.dmp

                                                • memory/3536-153-0x00000000047A0000-0x00000000047CA000-memory.dmp

                                                  Filesize

                                                  168KB

                                                • memory/3536-152-0x0000000002BB0000-0x0000000002CB0000-memory.dmp

                                                  Filesize

                                                  1024KB

                                                • memory/3536-154-0x0000000000400000-0x0000000002BA5000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/3536-145-0x0000000000000000-mapping.dmp

                                                • memory/3536-157-0x0000000000400000-0x0000000002BA5000-memory.dmp

                                                  Filesize

                                                  39.6MB

                                                • memory/3832-201-0x00007FF72D7E6890-mapping.dmp

                                                • memory/3832-204-0x0000018E2F430000-0x0000018E2F570000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/3832-202-0x0000018E2F430000-0x0000018E2F570000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/3832-205-0x0000018E2DB60000-0x0000018E2DE15000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3832-208-0x0000018E2DB60000-0x0000018E2DE15000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/3848-224-0x0000000000000000-mapping.dmp

                                                • memory/3896-221-0x0000000000000000-mapping.dmp

                                                • memory/4060-220-0x0000000000000000-mapping.dmp

                                                • memory/4132-210-0x0000000000000000-mapping.dmp

                                                • memory/4164-185-0x00000237DAB30000-0x00000237DADE5000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/4164-176-0x00000237DAB30000-0x00000237DADE5000-memory.dmp

                                                  Filesize

                                                  2.7MB

                                                • memory/4164-168-0x00007FF72D7E6890-mapping.dmp

                                                • memory/4164-170-0x00000237DA9E0000-0x00000237DAB20000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4164-171-0x00000237DA9E0000-0x00000237DAB20000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4164-175-0x00000000006E0000-0x0000000000984000-memory.dmp

                                                  Filesize

                                                  2.6MB

                                                • memory/4540-164-0x0000000007510000-0x0000000007650000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-198-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-188-0x0000000007510000-0x0000000007650000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-187-0x0000000007510000-0x0000000007650000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-139-0x0000000000000000-mapping.dmp

                                                • memory/4540-159-0x00000000054B0000-0x0000000006005000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/4540-160-0x00000000054B0000-0x0000000006005000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/4540-161-0x00000000054B0000-0x0000000006005000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/4540-203-0x0000000007645000-0x0000000007647000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/4540-211-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-212-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-213-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-214-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-190-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-200-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-199-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-169-0x0000000007645000-0x0000000007647000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/4540-189-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-167-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-166-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-165-0x0000000007510000-0x0000000007650000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-162-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-197-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4540-163-0x0000000004AD0000-0x0000000004C10000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/4652-230-0x0000000000000000-mapping.dmp

                                                • memory/4656-225-0x0000000000000000-mapping.dmp

                                                • memory/4832-209-0x0000000005110000-0x0000000005C65000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/4832-181-0x0000000000000000-mapping.dmp

                                                • memory/4832-184-0x0000000005110000-0x0000000005C65000-memory.dmp

                                                  Filesize

                                                  11.3MB

                                                • memory/4868-231-0x0000000000000000-mapping.dmp

                                                • memory/4972-227-0x0000000000000000-mapping.dmp

                                                • memory/4984-223-0x0000000000000000-mapping.dmp

                                                • memory/5044-207-0x0000000000000000-mapping.dmp