Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2023 11:53

General

  • Target

    3e72376b77cf85efa884a2259985e15495e346e8d2ee44284539fcdfbade38e3.exe

  • Size

    229KB

  • MD5

    d15d33333f9f1b9fbe2a8af8be70b412

  • SHA1

    83fe1f7ee77f4ad9a4103cedfc24680d345127b5

  • SHA256

    3e72376b77cf85efa884a2259985e15495e346e8d2ee44284539fcdfbade38e3

  • SHA512

    7408d5c093d1c2bea082f73774ef8f7f20ee4434284facb87693276b2921982b7a4ed71c043279b5dbf600958b3e810f04f3d36978d91462e7ceb5e006bca32b

  • SSDEEP

    3072:T+3IwhDYcLYhP1Qsp2ERVgQPaiB0XiXaubDsLiZYxNk1DPswlf9:lwhUcLKQQ7+CD1+k1DUg

Malware Config

Signatures

  • Detects Smokeloader packer 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e72376b77cf85efa884a2259985e15495e346e8d2ee44284539fcdfbade38e3.exe
    "C:\Users\Admin\AppData\Local\Temp\3e72376b77cf85efa884a2259985e15495e346e8d2ee44284539fcdfbade38e3.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4596
  • C:\Users\Admin\AppData\Local\Temp\D91F.exe
    C:\Users\Admin\AppData\Local\Temp\D91F.exe
    1⤵
    • Executes dropped EXE
    PID:3036
  • C:\Users\Admin\AppData\Local\Temp\E68D.exe
    C:\Users\Admin\AppData\Local\Temp\E68D.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1912
  • C:\Users\Admin\AppData\Local\Temp\EB41.exe
    C:\Users\Admin\AppData\Local\Temp\EB41.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 152
      2⤵
      • Program crash
      PID:4708
  • C:\Users\Admin\AppData\Local\Temp\F295.exe
    C:\Users\Admin\AppData\Local\Temp\F295.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
        PID:1232
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2532 -ip 2532
      1⤵
        PID:4988
      • C:\Users\Admin\AppData\Local\Temp\F6AD.exe
        C:\Users\Admin\AppData\Local\Temp\F6AD.exe
        1⤵
        • Executes dropped EXE
        PID:2428
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4068
      • C:\Users\Admin\AppData\Local\Temp\C0B.exe
        C:\Users\Admin\AppData\Local\Temp\C0B.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          2⤵
            PID:1216
        • C:\Users\Admin\AppData\Local\Temp\14C6.exe
          C:\Users\Admin\AppData\Local\Temp\14C6.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5092
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4476
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:3616
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3116
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:1448
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                1⤵
                  PID:3192
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:4216
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:1828
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3628
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe
                        1⤵
                          PID:3348
                        • C:\Windows\SysWOW64\explorer.exe
                          C:\Windows\SysWOW64\explorer.exe
                          1⤵
                            PID:3596

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

                            Filesize

                            2KB

                            MD5

                            c961aab67ffcbe3e0cea40f248afcd02

                            SHA1

                            19fc0efd1c8c21f3d35eedf184eb720e56fbd4d5

                            SHA256

                            cd48dca7a80d49f88cd533267b86667bb64e0500efafb55cbf6bb64e09ac6140

                            SHA512

                            20ae10185b500fe9db9cef625af86e2bc8d508dbe304f737e0f767978128441079cd8a4d93386f8383c39b9815285ff752145a074d53805c789516c6ffc95775

                          • C:\Users\Admin\AppData\Local\Temp\14C6.exe

                            Filesize

                            1.2MB

                            MD5

                            ac5421f69b815966aca187815f1f64d0

                            SHA1

                            202d8f4c4ff4bb39c498b08d28629f2a0977e764

                            SHA256

                            ea55452ae8cc044d9b8fcc52af0d9aabfa72cf4c498d9fb4be7922b1658b68c1

                            SHA512

                            8f9b2da0fccf1f94b065b186fa080c6198b6cd3ebcbcb8ccdddfcfd0724e879715cff06d4f688c0557384bcefee77b0cdfc6a3b62c0ccfc3085b71dd6620dbb0

                          • C:\Users\Admin\AppData\Local\Temp\14C6.exe

                            Filesize

                            1.2MB

                            MD5

                            ac5421f69b815966aca187815f1f64d0

                            SHA1

                            202d8f4c4ff4bb39c498b08d28629f2a0977e764

                            SHA256

                            ea55452ae8cc044d9b8fcc52af0d9aabfa72cf4c498d9fb4be7922b1658b68c1

                            SHA512

                            8f9b2da0fccf1f94b065b186fa080c6198b6cd3ebcbcb8ccdddfcfd0724e879715cff06d4f688c0557384bcefee77b0cdfc6a3b62c0ccfc3085b71dd6620dbb0

                          • C:\Users\Admin\AppData\Local\Temp\C0B.exe

                            Filesize

                            238KB

                            MD5

                            5395fd0cc67d34cc029f212ac41a04b0

                            SHA1

                            adbf523691a026b836323ab0c0c9f088bbb778c1

                            SHA256

                            7bf89640b889797c5020c6dc6a9ab7f5befeff84a69323f59fb82ce157aa99bf

                            SHA512

                            a716a609222b4b41fba9ac11a4297872c2c1023fce739b5e726fb91a30672070804a7ef25e1c8cc5098c78bdae8d16a441917d5de77b1288d9d04096d4192a0e

                          • C:\Users\Admin\AppData\Local\Temp\C0B.exe

                            Filesize

                            238KB

                            MD5

                            5395fd0cc67d34cc029f212ac41a04b0

                            SHA1

                            adbf523691a026b836323ab0c0c9f088bbb778c1

                            SHA256

                            7bf89640b889797c5020c6dc6a9ab7f5befeff84a69323f59fb82ce157aa99bf

                            SHA512

                            a716a609222b4b41fba9ac11a4297872c2c1023fce739b5e726fb91a30672070804a7ef25e1c8cc5098c78bdae8d16a441917d5de77b1288d9d04096d4192a0e

                          • C:\Users\Admin\AppData\Local\Temp\D91F.exe

                            Filesize

                            4KB

                            MD5

                            9748489855d9dd82ab09da5e3e55b19e

                            SHA1

                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                            SHA256

                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                            SHA512

                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                          • C:\Users\Admin\AppData\Local\Temp\D91F.exe

                            Filesize

                            4KB

                            MD5

                            9748489855d9dd82ab09da5e3e55b19e

                            SHA1

                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                            SHA256

                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                            SHA512

                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                          • C:\Users\Admin\AppData\Local\Temp\E68D.exe

                            Filesize

                            5.3MB

                            MD5

                            870406ba58703185ab2c177bd7c1ecaf

                            SHA1

                            e5f688ee7319c5391ccc3215f4cae5323870aca9

                            SHA256

                            256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e

                            SHA512

                            f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2

                          • C:\Users\Admin\AppData\Local\Temp\E68D.exe

                            Filesize

                            5.3MB

                            MD5

                            870406ba58703185ab2c177bd7c1ecaf

                            SHA1

                            e5f688ee7319c5391ccc3215f4cae5323870aca9

                            SHA256

                            256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e

                            SHA512

                            f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2

                          • C:\Users\Admin\AppData\Local\Temp\EB41.exe

                            Filesize

                            1.1MB

                            MD5

                            b5cd4deb250cbeda544d8622d7ed90bf

                            SHA1

                            d8f784eba044a176e935cd6bc9a97d346a810c98

                            SHA256

                            8f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621

                            SHA512

                            1a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae

                          • C:\Users\Admin\AppData\Local\Temp\EB41.exe

                            Filesize

                            1.1MB

                            MD5

                            b5cd4deb250cbeda544d8622d7ed90bf

                            SHA1

                            d8f784eba044a176e935cd6bc9a97d346a810c98

                            SHA256

                            8f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621

                            SHA512

                            1a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae

                          • C:\Users\Admin\AppData\Local\Temp\F295.exe

                            Filesize

                            1.2MB

                            MD5

                            060c2516969eda987c7abbbb2d1b475d

                            SHA1

                            86331b81cf8ee9177d612aa19e18be4e4c4a2adc

                            SHA256

                            2797a66fb626ae946214475a93a61c8b253207bf4f2b1bc86fb5471d750c9951

                            SHA512

                            fad7099778fafcb35e45ae61ceb7484b4d9a4e2c9e8c1d3578845404241adb95f929c1b51b0c388a5b3b70cc6db172f3aac4127ef993d97e5a7b86a4f916633b

                          • C:\Users\Admin\AppData\Local\Temp\F295.exe

                            Filesize

                            1.2MB

                            MD5

                            060c2516969eda987c7abbbb2d1b475d

                            SHA1

                            86331b81cf8ee9177d612aa19e18be4e4c4a2adc

                            SHA256

                            2797a66fb626ae946214475a93a61c8b253207bf4f2b1bc86fb5471d750c9951

                            SHA512

                            fad7099778fafcb35e45ae61ceb7484b4d9a4e2c9e8c1d3578845404241adb95f929c1b51b0c388a5b3b70cc6db172f3aac4127ef993d97e5a7b86a4f916633b

                          • C:\Users\Admin\AppData\Local\Temp\F6AD.exe

                            Filesize

                            4KB

                            MD5

                            9748489855d9dd82ab09da5e3e55b19e

                            SHA1

                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                            SHA256

                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                            SHA512

                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                          • C:\Users\Admin\AppData\Local\Temp\F6AD.exe

                            Filesize

                            4KB

                            MD5

                            9748489855d9dd82ab09da5e3e55b19e

                            SHA1

                            6ed2bf6a1a53a59cd2137812cb43b5032817f6a1

                            SHA256

                            05bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b

                            SHA512

                            7eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be

                          • memory/1216-192-0x0000000000340000-0x000000000036A000-memory.dmp

                            Filesize

                            168KB

                          • memory/1216-184-0x0000000000000000-mapping.dmp

                          • memory/1216-185-0x0000000000340000-0x000000000036A000-memory.dmp

                            Filesize

                            168KB

                          • memory/1232-161-0x0000000000000000-mapping.dmp

                          • memory/1448-207-0x0000000000000000-mapping.dmp

                          • memory/1448-208-0x0000000001110000-0x0000000001115000-memory.dmp

                            Filesize

                            20KB

                          • memory/1448-210-0x0000000001100000-0x0000000001109000-memory.dmp

                            Filesize

                            36KB

                          • memory/1448-230-0x0000000001110000-0x0000000001115000-memory.dmp

                            Filesize

                            20KB

                          • memory/1828-217-0x0000000000FB0000-0x0000000000FB5000-memory.dmp

                            Filesize

                            20KB

                          • memory/1828-216-0x0000000000000000-mapping.dmp

                          • memory/1828-218-0x0000000000FA0000-0x0000000000FA9000-memory.dmp

                            Filesize

                            36KB

                          • memory/1828-233-0x0000000000FB0000-0x0000000000FB5000-memory.dmp

                            Filesize

                            20KB

                          • memory/1912-141-0x0000000000000000-mapping.dmp

                          • memory/1912-199-0x0000000000310000-0x000000000101E000-memory.dmp

                            Filesize

                            13.1MB

                          • memory/1912-204-0x0000000000310000-0x000000000101E000-memory.dmp

                            Filesize

                            13.1MB

                          • memory/1912-152-0x0000000005880000-0x00000000058E6000-memory.dmp

                            Filesize

                            408KB

                          • memory/1912-151-0x0000000000310000-0x000000000101E000-memory.dmp

                            Filesize

                            13.1MB

                          • memory/1912-150-0x0000000000310000-0x000000000101E000-memory.dmp

                            Filesize

                            13.1MB

                          • memory/1912-144-0x0000000000310000-0x000000000101E000-memory.dmp

                            Filesize

                            13.1MB

                          • memory/2428-168-0x0000000000000000-mapping.dmp

                          • memory/2428-173-0x00007FFE7DBA0000-0x00007FFE7E661000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/2532-170-0x0000000000BB0000-0x0000000000CC8000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/2532-145-0x0000000000000000-mapping.dmp

                          • memory/2768-156-0x0000000000000000-mapping.dmp

                          • memory/2768-169-0x00000000054E0000-0x000000000551C000-memory.dmp

                            Filesize

                            240KB

                          • memory/2768-157-0x0000000000FA0000-0x0000000000FE4000-memory.dmp

                            Filesize

                            272KB

                          • memory/2768-179-0x00000000074B0000-0x00000000079DC000-memory.dmp

                            Filesize

                            5.2MB

                          • memory/2768-165-0x00000000059C0000-0x0000000005FD8000-memory.dmp

                            Filesize

                            6.1MB

                          • memory/2768-177-0x00000000067F0000-0x00000000069B2000-memory.dmp

                            Filesize

                            1.8MB

                          • memory/2768-167-0x0000000005580000-0x000000000568A000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/2768-174-0x0000000006380000-0x0000000006412000-memory.dmp

                            Filesize

                            584KB

                          • memory/3036-139-0x0000000000010000-0x0000000000018000-memory.dmp

                            Filesize

                            32KB

                          • memory/3036-136-0x0000000000000000-mapping.dmp

                          • memory/3036-140-0x00007FFE7DBA0000-0x00007FFE7E661000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/3116-203-0x0000000000000000-mapping.dmp

                          • memory/3116-229-0x0000000000CE0000-0x0000000000CE9000-memory.dmp

                            Filesize

                            36KB

                          • memory/3116-206-0x0000000000CD0000-0x0000000000CDF000-memory.dmp

                            Filesize

                            60KB

                          • memory/3116-205-0x0000000000CE0000-0x0000000000CE9000-memory.dmp

                            Filesize

                            36KB

                          • memory/3192-212-0x0000000000630000-0x0000000000636000-memory.dmp

                            Filesize

                            24KB

                          • memory/3192-213-0x0000000000620000-0x000000000062C000-memory.dmp

                            Filesize

                            48KB

                          • memory/3192-209-0x0000000000000000-mapping.dmp

                          • memory/3192-231-0x0000000000630000-0x0000000000636000-memory.dmp

                            Filesize

                            24KB

                          • memory/3348-223-0x00000000005D0000-0x00000000005D7000-memory.dmp

                            Filesize

                            28KB

                          • memory/3348-235-0x00000000005D0000-0x00000000005D7000-memory.dmp

                            Filesize

                            28KB

                          • memory/3348-222-0x0000000000000000-mapping.dmp

                          • memory/3348-224-0x00000000005C0000-0x00000000005CD000-memory.dmp

                            Filesize

                            52KB

                          • memory/3596-226-0x0000000001290000-0x0000000001298000-memory.dmp

                            Filesize

                            32KB

                          • memory/3596-227-0x0000000001280000-0x000000000128B000-memory.dmp

                            Filesize

                            44KB

                          • memory/3596-236-0x0000000001290000-0x0000000001298000-memory.dmp

                            Filesize

                            32KB

                          • memory/3596-225-0x0000000000000000-mapping.dmp

                          • memory/3616-228-0x0000000000150000-0x0000000000157000-memory.dmp

                            Filesize

                            28KB

                          • memory/3616-201-0x0000000000150000-0x0000000000157000-memory.dmp

                            Filesize

                            28KB

                          • memory/3616-200-0x0000000000000000-mapping.dmp

                          • memory/3616-202-0x0000000000140000-0x000000000014B000-memory.dmp

                            Filesize

                            44KB

                          • memory/3628-220-0x0000000001070000-0x0000000001076000-memory.dmp

                            Filesize

                            24KB

                          • memory/3628-221-0x0000000001060000-0x000000000106B000-memory.dmp

                            Filesize

                            44KB

                          • memory/3628-234-0x0000000001070000-0x0000000001076000-memory.dmp

                            Filesize

                            24KB

                          • memory/3628-219-0x0000000000000000-mapping.dmp

                          • memory/3716-166-0x00000000052B0000-0x00000000052C2000-memory.dmp

                            Filesize

                            72KB

                          • memory/3716-176-0x0000000006430000-0x00000000064A6000-memory.dmp

                            Filesize

                            472KB

                          • memory/3716-175-0x00000000068A0000-0x0000000006E44000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/3716-180-0x00000000066B0000-0x0000000006700000-memory.dmp

                            Filesize

                            320KB

                          • memory/3716-164-0x0000000000400000-0x0000000000446000-memory.dmp

                            Filesize

                            280KB

                          • memory/3716-163-0x0000000000000000-mapping.dmp

                          • memory/3716-178-0x0000000006330000-0x000000000634E000-memory.dmp

                            Filesize

                            120KB

                          • memory/4100-153-0x0000000000000000-mapping.dmp

                          • memory/4216-232-0x0000000000FC0000-0x0000000000FE2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4216-214-0x0000000000FC0000-0x0000000000FE2000-memory.dmp

                            Filesize

                            136KB

                          • memory/4216-215-0x0000000000F90000-0x0000000000FB7000-memory.dmp

                            Filesize

                            156KB

                          • memory/4216-211-0x0000000000000000-mapping.dmp

                          • memory/4476-196-0x0000000000000000-mapping.dmp

                          • memory/4476-197-0x0000000000400000-0x0000000000446000-memory.dmp

                            Filesize

                            280KB

                          • memory/4596-134-0x0000000000400000-0x000000000061A000-memory.dmp

                            Filesize

                            2.1MB

                          • memory/4596-135-0x0000000000400000-0x000000000061A000-memory.dmp

                            Filesize

                            2.1MB

                          • memory/4596-133-0x0000000002350000-0x0000000002359000-memory.dmp

                            Filesize

                            36KB

                          • memory/4596-132-0x000000000083C000-0x0000000000851000-memory.dmp

                            Filesize

                            84KB

                          • memory/5092-193-0x0000000000000000-mapping.dmp

                          • memory/5112-181-0x0000000000000000-mapping.dmp