Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    07-08-2023 02:29

General

  • Target

    eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771.exe

  • Size

    164KB

  • MD5

    1b94e6504da7365a7ac9e5f1c37ea714

  • SHA1

    b2c784470f5400680f275943aacfcbef6cda5c88

  • SHA256

    eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771

  • SHA512

    6b86bdea9ed18fc11e32c0ce7e6883677fa5e3dfad053200e6757a51cc4b11a5adf0757853c9b4421796e7789d75af17c686ca513a9d442a7a0fa093920d012e

  • SSDEEP

    3072:sSGL9TvjYP99HQjQQeTXE61nB1KpyehJqCFQUDjp5AJ:IL9jjYlaQ9E6B2yeHPOJ

Malware Config

Extracted

Family

smokeloader

Botnet

summ

Extracted

Family

smokeloader

Version

2022

C2

http://stalagmijesarl.com/

http://ukdantist-sarl.com/

http://cpcorprotationltd.com/

rc4.i32
rc4.i32

Extracted

Family

systembc

C2

discordcdn8839248.com:4327

chinabar821994.com:4327

Signatures

  • Detect rhadamanthys stealer shellcode 9 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • SystemBC

    SystemBC is a proxy and remote administration tool first seen in 2019.

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771.exe
      "C:\Users\Admin\AppData\Local\Temp\eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2316
    • C:\Users\Admin\AppData\Local\Temp\1CC2.exe
      C:\Users\Admin\AppData\Local\Temp\1CC2.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:436
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 96
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1184
    • C:\Users\Admin\AppData\Local\Temp\8066.exe
      C:\Users\Admin\AppData\Local\Temp\8066.exe
      2⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1956
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      2⤵
        PID:3040
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        2⤵
          PID:2272
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          2⤵
            PID:2120
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            2⤵
              PID:2620
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              2⤵
                PID:1948
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                2⤵
                  PID:396
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  2⤵
                    PID:1912
                  • C:\Windows\system32\certreq.exe
                    "C:\Windows\system32\certreq.exe"
                    2⤵
                      PID:2916
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      2⤵
                        PID:1736
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        2⤵
                          PID:1812
                      • C:\Windows\system32\taskeng.exe
                        taskeng.exe {DE798640-7C44-4034-BA61-75A0EC77F857} S-1-5-21-1024678951-1535676557-2778719785-1000:KDGGTDCU\Admin:Interactive:[1]
                        1⤵
                        • Suspicious use of WriteProcessMemory
                        PID:784
                        • C:\Users\Admin\AppData\Roaming\ujbhvdj
                          C:\Users\Admin\AppData\Roaming\ujbhvdj
                          2⤵
                          • Executes dropped EXE
                          • Suspicious behavior: MapViewOfSection
                          PID:2572
                      • C:\Users\Admin\AppData\Local\Microsoft\OyjjrgD4.exe
                        "C:\Users\Admin\AppData\Local\Microsoft\OyjjrgD4.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:2236

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                        Filesize

                        344B

                        MD5

                        c5a5ef7183867a8b2ee983f79063ecac

                        SHA1

                        abbfdc8edea5c57cced1b41a064597767e4c3c1c

                        SHA256

                        f1d3a356b8d7090c2b4ff09837a6120734bb9c10cb87a4d634dca990ec10b253

                        SHA512

                        c3af7385f25b57914d9449216e824d0c074f77e5dfaa107ba6e1d19a7eda5f4c2f8cec5aa204997c0e315d4e5af55dc8da4b8a68a6b1633f87f7b5edcf211147

                      • C:\Users\Admin\AppData\Local\Microsoft\OyjjrgD4.exe

                        Filesize

                        274KB

                        MD5

                        0ec87a33cee1594c1808267bc677d827

                        SHA1

                        1e078fb607d12ccdd11da03f9503ca64cb9fde32

                        SHA256

                        111cc14cd4d6e43d11cd1bef261e75313c9f7f9528abf6dc0f98878cc14b189a

                        SHA512

                        03613e2615d47701893e784f39a82fdcb8d30f563d65f3f890d73e0ccfd07a38cbcd2e8976cabc64478880b03cf3c334e4712f6c20ed25f2c562ea942abf4551

                      • C:\Users\Admin\AppData\Local\Temp\1CC2.exe

                        Filesize

                        2.9MB

                        MD5

                        54631210ad8202513b794956c59e67a7

                        SHA1

                        dccb8282ba756c270ef7d1f0f2a034f164ec123b

                        SHA256

                        1decacd4ba1021711f1a1ff1d14a2453965e211bee8e50533c4d6a2997ace6d4

                        SHA512

                        c1086de1ef79d3e4f7f35f18ea678546bd2e7cc2d5dde0e17d63eaee4ae6a0be9796d61bcad125b974b5372286ee08fe284faeca71296859892756b8cbdf91c3

                      • C:\Users\Admin\AppData\Local\Temp\1CC2.exe

                        Filesize

                        2.9MB

                        MD5

                        54631210ad8202513b794956c59e67a7

                        SHA1

                        dccb8282ba756c270ef7d1f0f2a034f164ec123b

                        SHA256

                        1decacd4ba1021711f1a1ff1d14a2453965e211bee8e50533c4d6a2997ace6d4

                        SHA512

                        c1086de1ef79d3e4f7f35f18ea678546bd2e7cc2d5dde0e17d63eaee4ae6a0be9796d61bcad125b974b5372286ee08fe284faeca71296859892756b8cbdf91c3

                      • C:\Users\Admin\AppData\Local\Temp\8066.exe

                        Filesize

                        495KB

                        MD5

                        4c224ad23e402d58bbd23023bf883dc0

                        SHA1

                        67cbaf4b24ccf90ca845626d1ed97831ef0dd55b

                        SHA256

                        74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983

                        SHA512

                        5aad2b848d6098c8cdbf58ce115ac832826e82f803aaaca5625197c445d3849f6cb256aaeeebed4bd3a5b0db92f0f957ee5de79312f4fc4b9769f8deae0b5766

                      • C:\Users\Admin\AppData\Local\Temp\8066.exe

                        Filesize

                        495KB

                        MD5

                        4c224ad23e402d58bbd23023bf883dc0

                        SHA1

                        67cbaf4b24ccf90ca845626d1ed97831ef0dd55b

                        SHA256

                        74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983

                        SHA512

                        5aad2b848d6098c8cdbf58ce115ac832826e82f803aaaca5625197c445d3849f6cb256aaeeebed4bd3a5b0db92f0f957ee5de79312f4fc4b9769f8deae0b5766

                      • C:\Users\Admin\AppData\Local\Temp\8066.exe

                        Filesize

                        495KB

                        MD5

                        4c224ad23e402d58bbd23023bf883dc0

                        SHA1

                        67cbaf4b24ccf90ca845626d1ed97831ef0dd55b

                        SHA256

                        74a434ab27dee2234cc149fa8d34c6d5af5beaa0060ffad7523fde8ec923f983

                        SHA512

                        5aad2b848d6098c8cdbf58ce115ac832826e82f803aaaca5625197c445d3849f6cb256aaeeebed4bd3a5b0db92f0f957ee5de79312f4fc4b9769f8deae0b5766

                      • C:\Users\Admin\AppData\Local\Temp\Cab1F6.tmp

                        Filesize

                        62KB

                        MD5

                        3ac860860707baaf32469fa7cc7c0192

                        SHA1

                        c33c2acdaba0e6fa41fd2f00f186804722477639

                        SHA256

                        d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                        SHA512

                        d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                      • C:\Users\Admin\AppData\Local\Temp\Tar257.tmp

                        Filesize

                        164KB

                        MD5

                        4ff65ad929cd9a367680e0e5b1c08166

                        SHA1

                        c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                        SHA256

                        c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                        SHA512

                        f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                      • C:\Users\Admin\AppData\Roaming\ujbhvdj

                        Filesize

                        164KB

                        MD5

                        1b94e6504da7365a7ac9e5f1c37ea714

                        SHA1

                        b2c784470f5400680f275943aacfcbef6cda5c88

                        SHA256

                        eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771

                        SHA512

                        6b86bdea9ed18fc11e32c0ce7e6883677fa5e3dfad053200e6757a51cc4b11a5adf0757853c9b4421796e7789d75af17c686ca513a9d442a7a0fa093920d012e

                      • C:\Users\Admin\AppData\Roaming\ujbhvdj

                        Filesize

                        164KB

                        MD5

                        1b94e6504da7365a7ac9e5f1c37ea714

                        SHA1

                        b2c784470f5400680f275943aacfcbef6cda5c88

                        SHA256

                        eeb18dec0f9402e96fb629ab201890d8b2fcfeb45e890e42e3a79a799e575771

                        SHA512

                        6b86bdea9ed18fc11e32c0ce7e6883677fa5e3dfad053200e6757a51cc4b11a5adf0757853c9b4421796e7789d75af17c686ca513a9d442a7a0fa093920d012e

                      • \Users\Admin\AppData\Local\Temp\1CC2.exe

                        Filesize

                        2.9MB

                        MD5

                        54631210ad8202513b794956c59e67a7

                        SHA1

                        dccb8282ba756c270ef7d1f0f2a034f164ec123b

                        SHA256

                        1decacd4ba1021711f1a1ff1d14a2453965e211bee8e50533c4d6a2997ace6d4

                        SHA512

                        c1086de1ef79d3e4f7f35f18ea678546bd2e7cc2d5dde0e17d63eaee4ae6a0be9796d61bcad125b974b5372286ee08fe284faeca71296859892756b8cbdf91c3

                      • \Users\Admin\AppData\Local\Temp\1CC2.exe

                        Filesize

                        2.9MB

                        MD5

                        54631210ad8202513b794956c59e67a7

                        SHA1

                        dccb8282ba756c270ef7d1f0f2a034f164ec123b

                        SHA256

                        1decacd4ba1021711f1a1ff1d14a2453965e211bee8e50533c4d6a2997ace6d4

                        SHA512

                        c1086de1ef79d3e4f7f35f18ea678546bd2e7cc2d5dde0e17d63eaee4ae6a0be9796d61bcad125b974b5372286ee08fe284faeca71296859892756b8cbdf91c3

                      • \Users\Admin\AppData\Local\Temp\1CC2.exe

                        Filesize

                        2.9MB

                        MD5

                        54631210ad8202513b794956c59e67a7

                        SHA1

                        dccb8282ba756c270ef7d1f0f2a034f164ec123b

                        SHA256

                        1decacd4ba1021711f1a1ff1d14a2453965e211bee8e50533c4d6a2997ace6d4

                        SHA512

                        c1086de1ef79d3e4f7f35f18ea678546bd2e7cc2d5dde0e17d63eaee4ae6a0be9796d61bcad125b974b5372286ee08fe284faeca71296859892756b8cbdf91c3

                      • memory/396-204-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/396-203-0x0000000000080000-0x00000000000A7000-memory.dmp

                        Filesize

                        156KB

                      • memory/396-201-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/436-140-0x0000000000940000-0x0000000000C7E000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/436-141-0x0000000000940000-0x0000000000C7E000-memory.dmp

                        Filesize

                        3.2MB

                      • memory/1360-154-0x0000000074B20000-0x000000007520E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1360-147-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

                        Filesize

                        4KB

                      • memory/1360-149-0x0000000000090000-0x00000000000B8000-memory.dmp

                        Filesize

                        160KB

                      • memory/1360-142-0x0000000000090000-0x00000000000B8000-memory.dmp

                        Filesize

                        160KB

                      • memory/1360-143-0x0000000000090000-0x00000000000B8000-memory.dmp

                        Filesize

                        160KB

                      • memory/1360-150-0x0000000000090000-0x00000000000B8000-memory.dmp

                        Filesize

                        160KB

                      • memory/1360-155-0x00000000071A0000-0x00000000071E0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1360-156-0x0000000074B20000-0x000000007520E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1432-133-0x000007FEA55C0000-0x000007FEA55CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/1432-59-0x0000000002670000-0x0000000002686000-memory.dmp

                        Filesize

                        88KB

                      • memory/1432-63-0x000007FEF6410000-0x000007FEF6553000-memory.dmp

                        Filesize

                        1.3MB

                      • memory/1432-132-0x000007FEF6410000-0x000007FEF6553000-memory.dmp

                        Filesize

                        1.3MB

                      • memory/1432-64-0x000007FEA55C0000-0x000007FEA55CA000-memory.dmp

                        Filesize

                        40KB

                      • memory/1432-189-0x0000000003950000-0x0000000003966000-memory.dmp

                        Filesize

                        88KB

                      • memory/1736-213-0x0000000000060000-0x000000000006D000-memory.dmp

                        Filesize

                        52KB

                      • memory/1736-212-0x0000000000070000-0x0000000000077000-memory.dmp

                        Filesize

                        28KB

                      • memory/1736-211-0x0000000000060000-0x000000000006D000-memory.dmp

                        Filesize

                        52KB

                      • memory/1812-217-0x0000000000090000-0x0000000000098000-memory.dmp

                        Filesize

                        32KB

                      • memory/1812-215-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1812-218-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1812-233-0x0000000000090000-0x0000000000098000-memory.dmp

                        Filesize

                        32KB

                      • memory/1912-208-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1912-207-0x0000000000090000-0x0000000000096000-memory.dmp

                        Filesize

                        24KB

                      • memory/1912-205-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/1912-232-0x0000000000090000-0x0000000000096000-memory.dmp

                        Filesize

                        24KB

                      • memory/1948-226-0x00000000000F0000-0x0000000000112000-memory.dmp

                        Filesize

                        136KB

                      • memory/1948-200-0x0000000000080000-0x00000000000A7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1948-199-0x00000000000F0000-0x0000000000112000-memory.dmp

                        Filesize

                        136KB

                      • memory/1948-198-0x0000000000080000-0x00000000000A7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1956-228-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-188-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-231-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-230-0x0000000000400000-0x0000000002322000-memory.dmp

                        Filesize

                        31.1MB

                      • memory/1956-227-0x0000000003B90000-0x0000000003BC6000-memory.dmp

                        Filesize

                        216KB

                      • memory/1956-219-0x0000000003B90000-0x0000000003BC6000-memory.dmp

                        Filesize

                        216KB

                      • memory/1956-196-0x0000000002500000-0x0000000002600000-memory.dmp

                        Filesize

                        1024KB

                      • memory/1956-171-0x0000000000280000-0x00000000002F0000-memory.dmp

                        Filesize

                        448KB

                      • memory/1956-197-0x0000000000400000-0x0000000002322000-memory.dmp

                        Filesize

                        31.1MB

                      • memory/1956-182-0x0000000000230000-0x0000000000237000-memory.dmp

                        Filesize

                        28KB

                      • memory/1956-184-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-186-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-187-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-170-0x0000000002500000-0x0000000002600000-memory.dmp

                        Filesize

                        1024KB

                      • memory/1956-173-0x0000000000400000-0x0000000002322000-memory.dmp

                        Filesize

                        31.1MB

                      • memory/1956-214-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/1956-209-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2120-206-0x0000000000090000-0x0000000000095000-memory.dmp

                        Filesize

                        20KB

                      • memory/2120-185-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/2120-181-0x0000000000090000-0x0000000000095000-memory.dmp

                        Filesize

                        20KB

                      • memory/2120-180-0x0000000000080000-0x0000000000089000-memory.dmp

                        Filesize

                        36KB

                      • memory/2236-255-0x00000000023D0000-0x00000000024D0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2236-261-0x00000000023D0000-0x00000000024D0000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2236-258-0x0000000000400000-0x00000000022EB000-memory.dmp

                        Filesize

                        30.9MB

                      • memory/2236-257-0x0000000000220000-0x0000000000225000-memory.dmp

                        Filesize

                        20KB

                      • memory/2272-202-0x0000000000070000-0x0000000000079000-memory.dmp

                        Filesize

                        36KB

                      • memory/2272-179-0x0000000000060000-0x000000000006F000-memory.dmp

                        Filesize

                        60KB

                      • memory/2272-177-0x0000000000060000-0x000000000006F000-memory.dmp

                        Filesize

                        60KB

                      • memory/2272-178-0x0000000000070000-0x0000000000079000-memory.dmp

                        Filesize

                        36KB

                      • memory/2316-60-0x0000000000400000-0x00000000004E3000-memory.dmp

                        Filesize

                        908KB

                      • memory/2316-56-0x0000000000400000-0x00000000004E3000-memory.dmp

                        Filesize

                        908KB

                      • memory/2316-57-0x0000000000220000-0x0000000000229000-memory.dmp

                        Filesize

                        36KB

                      • memory/2316-55-0x0000000000690000-0x0000000000790000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2572-183-0x0000000000270000-0x0000000000370000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2572-161-0x0000000000400000-0x00000000004E3000-memory.dmp

                        Filesize

                        908KB

                      • memory/2572-192-0x0000000000400000-0x00000000004E3000-memory.dmp

                        Filesize

                        908KB

                      • memory/2572-160-0x0000000000270000-0x0000000000370000-memory.dmp

                        Filesize

                        1024KB

                      • memory/2620-193-0x0000000000060000-0x000000000006C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2620-195-0x0000000000060000-0x000000000006C000-memory.dmp

                        Filesize

                        48KB

                      • memory/2620-194-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2620-216-0x0000000003CD0000-0x00000000040D0000-memory.dmp

                        Filesize

                        4.0MB

                      • memory/2916-235-0x0000000000060000-0x0000000000063000-memory.dmp

                        Filesize

                        12KB

                      • memory/2916-249-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-240-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-241-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-243-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-245-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-246-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-247-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-248-0x0000000077C90000-0x0000000077E39000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2916-238-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-250-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-239-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-253-0x000007FFFFE80000-0x000007FFFFFAF000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2916-236-0x0000000000120000-0x0000000000127000-memory.dmp

                        Filesize

                        28KB

                      • memory/2916-256-0x0000000077C90000-0x0000000077E39000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2916-210-0x0000000000060000-0x0000000000063000-memory.dmp

                        Filesize

                        12KB

                      • memory/2916-260-0x0000000077C90000-0x0000000077E39000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2916-259-0x0000000000120000-0x0000000000122000-memory.dmp

                        Filesize

                        8KB

                      • memory/3040-176-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB

                      • memory/3040-175-0x0000000000080000-0x000000000008B000-memory.dmp

                        Filesize

                        44KB