Analysis

  • max time kernel
    151s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-03-2023 13:04

General

  • Target

    file.exe

  • Size

    2.8MB

  • MD5

    0da8ff86305920cfdb0ab123d45ffa9d

  • SHA1

    aa31cd0743a25e2f7b4f4f0a217553afdb8e2678

  • SHA256

    60289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a

  • SHA512

    8a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4

  • SSDEEP

    24576:cY1WguK2pXcwC2BTPDLk4U1sFq1v1ZsCgz/Ktu1Dze6HDpLCbJzl7PELTs5KzC9a:QeQC2BT7UeFqZsCgLTLOXfNMd2u6G

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:324
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      C:\Users\Admin\AppData\Local\Temp\file.exe
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\system32\dllhost.exe
        "C:\Windows\system32\dllhost.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:448
  • C:\Users\Admin\AppData\Local\Temp\7FCF.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\7FCF.tmp.exe"
    1⤵
    • Executes dropped EXE
    PID:3760
  • C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2368
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3244
    • C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1900
  • C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe"
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4392
    • C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
      2⤵
      • Executes dropped EXE
      PID:4160
  • C:\Users\Admin\AppData\Roaming\8473.tmp.exe
    C:\Users\Admin\AppData\Roaming\8473.tmp.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3332
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
    • C:\Users\Admin\AppData\Roaming\8473.tmp.exe
      C:\Users\Admin\AppData\Roaming\8473.tmp.exe
      2⤵
      • Executes dropped EXE
      PID:336

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Email Collection

1
T1114

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\8473.tmp.exe.log
    Filesize

    1KB

    MD5

    235b41624578f64a6c072de2ef1541d8

    SHA1

    e88702535e990b24f5aadadfe9bf799ab693cef7

    SHA256

    8d61b54193d0a69e21ed33b2114372d27320a379139aee3d8b5077255bbe17ff

    SHA512

    5453ab5a05c19d3ac00162c32898c628f64b3b77326fdc8b4cdb6e7dfb15a26e51654efb6add6d6b345da4e3727d6ba9c9ce9e134c747445b6ebb81e32edb440

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    2KB

    MD5

    2f57fde6b33e89a63cf0dfdd6e60a351

    SHA1

    445bf1b07223a04f8a159581a3d37d630273010f

    SHA256

    3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

    SHA512

    42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    53KB

    MD5

    06ad34f9739c5159b4d92d702545bd49

    SHA1

    9152a0d4f153f3f40f7e606be75f81b582ee0c17

    SHA256

    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

    SHA512

    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    53KB

    MD5

    687ff3bb8a8b15736d686119a681097c

    SHA1

    18f43aa14e56d4fb158a8804f79fc3c604903991

    SHA256

    51fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2

    SHA512

    047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    691544ed1540d391f6548dae9e3d5732

    SHA1

    d80012c50135fde87f001427da9e66a3894ce322

    SHA256

    0a402bda0f510de22941158a0f4d014c81a220cba05a1f06f83ed7a9b02f50f5

    SHA512

    de2def2e31fb5da02e119e2b3187b5e6f4667263c77f58ea522f3508d74f2f15ec41bd190938c57d5e5e763fc018183e9af9e4d727768d8e2bf79658bc0010e1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    77d622bb1a5b250869a3238b9bc1402b

    SHA1

    d47f4003c2554b9dfc4c16f22460b331886b191b

    SHA256

    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

    SHA512

    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    104B

    MD5

    886a960b3d360e2d92fd706060645a84

    SHA1

    e3cd04a8c2518c32619c82b54bd795cdc9433d28

    SHA256

    6a46be2a8466d94a04342e6c0da9c84583dacb95a85aef283b9ec2c16e2b5912

    SHA512

    23fcac86c0d1a6d07174a1f7de7b413004ff821b9cd387e4861bc41c2e45dfdf326f5783a9c1f07eb9f8a4b7778393a2129a990921bc14c297d67d0dff092305

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    bb1c33a1a3bbff8ced39d26308f77211

    SHA1

    c59c693e72c74c349b245b33b907dfb4e4ba4c3a

    SHA256

    8685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90

    SHA512

    2d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    70219f0f5124c176633eda3df05c6188

    SHA1

    776cf286b5b36fe75db664af1fcd63b56ed75b91

    SHA256

    ad4e1fe2a878e6b09da0da726cbb6495221facaaa397e27391aeb6f46a3f8cd4

    SHA512

    8ffccf29c12bf3f17e189658949668b76308ca441f715ad7f05fe82e2be908652283a12b4a22ce9de99afcf0476ce0fe2ef363de4718cc05c4f987d22beb239d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    944B

    MD5

    77d622bb1a5b250869a3238b9bc1402b

    SHA1

    d47f4003c2554b9dfc4c16f22460b331886b191b

    SHA256

    f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

    SHA512

    d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

  • C:\Users\Admin\AppData\Local\Temp\7FCF.tmp.exe
    Filesize

    665KB

    MD5

    e0e3613d55dc4d1a6b689f36f701a743

    SHA1

    cb59ff5da37429d5e49cbdff2a45ed9b5168fe96

    SHA256

    c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6

    SHA512

    8a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e

  • C:\Users\Admin\AppData\Local\Temp\7FCF.tmp.exe
    Filesize

    665KB

    MD5

    e0e3613d55dc4d1a6b689f36f701a743

    SHA1

    cb59ff5da37429d5e49cbdff2a45ed9b5168fe96

    SHA256

    c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6

    SHA512

    8a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e

  • C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • C:\Users\Admin\AppData\Local\Temp\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
    Filesize

    2.7MB

    MD5

    f59f5f3f89c71811be2512ee230c3790

    SHA1

    abe340c34343ecbc67a848de74d98b105876f5ea

    SHA256

    8edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6

    SHA512

    1f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b

  • C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
    Filesize

    2.7MB

    MD5

    f59f5f3f89c71811be2512ee230c3790

    SHA1

    abe340c34343ecbc67a848de74d98b105876f5ea

    SHA256

    8edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6

    SHA512

    1f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b

  • C:\Users\Admin\AppData\Local\Temp\8B98.tmp.exe
    Filesize

    2.7MB

    MD5

    f59f5f3f89c71811be2512ee230c3790

    SHA1

    abe340c34343ecbc67a848de74d98b105876f5ea

    SHA256

    8edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6

    SHA512

    1f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_szw3i35l.4o4.ps1
    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • C:\Users\Admin\AppData\Roaming\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • C:\Users\Admin\AppData\Roaming\8473.tmp.exe
    Filesize

    3.4MB

    MD5

    98d5ab6991c6fc569e5c90a6241633d9

    SHA1

    44990ac5227ea16bbdf9d0b20cf94b738932ec66

    SHA256

    77f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5

    SHA512

    49a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3

  • memory/324-157-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-201-0x0000000000070000-0x0000000000332000-memory.dmp
    Filesize

    2.8MB

  • memory/324-138-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-136-0x0000000002910000-0x0000000002946000-memory.dmp
    Filesize

    216KB

  • memory/324-232-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/324-140-0x0000000005810000-0x0000000005876000-memory.dmp
    Filesize

    408KB

  • memory/324-202-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/324-151-0x0000000005F00000-0x0000000005F1E000-memory.dmp
    Filesize

    120KB

  • memory/324-137-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-158-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-156-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-139-0x00000000050E0000-0x0000000005708000-memory.dmp
    Filesize

    6.2MB

  • memory/324-154-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/324-153-0x00000000063E0000-0x00000000063FA000-memory.dmp
    Filesize

    104KB

  • memory/324-152-0x0000000007780000-0x0000000007DFA000-memory.dmp
    Filesize

    6.5MB

  • memory/324-141-0x0000000005880000-0x00000000058E6000-memory.dmp
    Filesize

    408KB

  • memory/448-183-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-175-0x000001EC8C330000-0x000001EC8C331000-memory.dmp
    Filesize

    4KB

  • memory/448-184-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-182-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-185-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-228-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-177-0x000001EC8C380000-0x000001EC8C387000-memory.dmp
    Filesize

    28KB

  • memory/448-178-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/448-179-0x00007FF40A5B0000-0x00007FF40A6AA000-memory.dmp
    Filesize

    1000KB

  • memory/840-198-0x00000196784D0000-0x00000196784F2000-memory.dmp
    Filesize

    136KB

  • memory/840-196-0x000001965FA50000-0x000001965FA60000-memory.dmp
    Filesize

    64KB

  • memory/840-195-0x000001965DB30000-0x000001965DE94000-memory.dmp
    Filesize

    3.4MB

  • memory/840-230-0x000001965FA50000-0x000001965FA60000-memory.dmp
    Filesize

    64KB

  • memory/1052-155-0x00000000058B0000-0x00000000058C0000-memory.dmp
    Filesize

    64KB

  • memory/1052-135-0x00000000060F0000-0x0000000006112000-memory.dmp
    Filesize

    136KB

  • memory/1052-134-0x00000000058B0000-0x00000000058C0000-memory.dmp
    Filesize

    64KB

  • memory/1052-133-0x0000000000C90000-0x0000000000F60000-memory.dmp
    Filesize

    2.8MB

  • memory/1364-166-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1364-165-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1364-169-0x00000000031E0000-0x00000000031FC000-memory.dmp
    Filesize

    112KB

  • memory/1364-181-0x00000000031E0000-0x00000000031FC000-memory.dmp
    Filesize

    112KB

  • memory/1364-167-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1364-172-0x0000000003200000-0x000000000321A000-memory.dmp
    Filesize

    104KB

  • memory/1364-173-0x0000000003410000-0x0000000004410000-memory.dmp
    Filesize

    16.0MB

  • memory/1364-180-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1364-174-0x00000000031E0000-0x00000000031FC000-memory.dmp
    Filesize

    112KB

  • memory/1364-176-0x0000000003230000-0x0000000003232000-memory.dmp
    Filesize

    8KB

  • memory/1364-171-0x00000000031E0000-0x00000000031FC000-memory.dmp
    Filesize

    112KB

  • memory/1364-164-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1364-162-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1900-2475-0x00000136C56B0000-0x00000136C56C0000-memory.dmp
    Filesize

    64KB

  • memory/1900-2476-0x00000136C56B0000-0x00000136C56C0000-memory.dmp
    Filesize

    64KB

  • memory/1900-2502-0x00007FF4CF6D0000-0x00007FF4CF6E0000-memory.dmp
    Filesize

    64KB

  • memory/2368-231-0x0000028F94620000-0x0000028F950E1000-memory.dmp
    Filesize

    10.8MB

  • memory/2368-234-0x0000028FAD3D0000-0x0000028FAD3E0000-memory.dmp
    Filesize

    64KB

  • memory/2368-203-0x0000028FAD3D0000-0x0000028FAD3E0000-memory.dmp
    Filesize

    64KB

  • memory/2368-241-0x0000028F94620000-0x0000028F950E1000-memory.dmp
    Filesize

    10.8MB

  • memory/2368-225-0x0000028FAD3D0000-0x0000028FAD3E0000-memory.dmp
    Filesize

    64KB

  • memory/2368-233-0x0000028FAD3D0000-0x0000028FAD3E0000-memory.dmp
    Filesize

    64KB

  • memory/2636-2508-0x000001E44BF60000-0x000001E44BF70000-memory.dmp
    Filesize

    64KB

  • memory/2636-2507-0x000001E44BF60000-0x000001E44BF70000-memory.dmp
    Filesize

    64KB

  • memory/2636-2492-0x000001E44BF60000-0x000001E44BF70000-memory.dmp
    Filesize

    64KB

  • memory/2636-2491-0x000001E44BF60000-0x000001E44BF70000-memory.dmp
    Filesize

    64KB

  • memory/2636-2490-0x000001E44BF60000-0x000001E44BF70000-memory.dmp
    Filesize

    64KB

  • memory/3244-279-0x0000024EC81C0000-0x0000024EC81D0000-memory.dmp
    Filesize

    64KB

  • memory/3244-305-0x0000024EC8540000-0x0000024EC9001000-memory.dmp
    Filesize

    10.8MB

  • memory/3244-281-0x00007FF4BF040000-0x00007FF4BF050000-memory.dmp
    Filesize

    64KB

  • memory/3244-272-0x0000024EE1410000-0x0000024EE142C000-memory.dmp
    Filesize

    112KB

  • memory/3244-274-0x0000024EC91F0000-0x0000024EC91FA000-memory.dmp
    Filesize

    40KB

  • memory/3244-275-0x0000024EE1430000-0x0000024EE1438000-memory.dmp
    Filesize

    32KB

  • memory/3244-282-0x0000024EE1440000-0x0000024EE144A000-memory.dmp
    Filesize

    40KB

  • memory/3760-189-0x00000000021B0000-0x00000000021DC000-memory.dmp
    Filesize

    176KB

  • memory/3760-191-0x0000000000770000-0x0000000000771000-memory.dmp
    Filesize

    4KB

  • memory/3760-229-0x0000000000400000-0x00000000004B0000-memory.dmp
    Filesize

    704KB

  • memory/4160-314-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4160-317-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4160-291-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4160-298-0x0000000000400000-0x0000000000420000-memory.dmp
    Filesize

    128KB

  • memory/4392-226-0x0000000002F60000-0x0000000002F70000-memory.dmp
    Filesize

    64KB

  • memory/4392-235-0x0000000002F60000-0x0000000002F70000-memory.dmp
    Filesize

    64KB

  • memory/4392-227-0x0000000002F60000-0x0000000002F70000-memory.dmp
    Filesize

    64KB

  • memory/4392-236-0x0000000002F60000-0x0000000002F70000-memory.dmp
    Filesize

    64KB

  • memory/4744-312-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-308-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-315-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-296-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-310-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-318-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-320-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-322-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-324-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-326-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-1634-0x00000273AC0E0000-0x00000273AC0F0000-memory.dmp
    Filesize

    64KB

  • memory/4744-278-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-277-0x00000273AC0E0000-0x00000273AC0F0000-memory.dmp
    Filesize

    64KB

  • memory/4744-299-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-306-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-301-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-283-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-290-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-286-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-273-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-288-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-260-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-257-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-258-0x00000273ABFA0000-0x00000273AC078000-memory.dmp
    Filesize

    864KB

  • memory/4744-242-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/4940-2480-0x00000258C0050000-0x00000258C0060000-memory.dmp
    Filesize

    64KB