Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 09:47

General

  • Target

    sample2.exe

  • Size

    279KB

  • MD5

    b14157355db39f0cfe5eabd2336f034e

  • SHA1

    c62f026ce8ea7bf614e33a535ab71ef7dc03682d

  • SHA256

    e5b84c2a8be1ba64822a131eebf088a0f05befe529f21b5f490da9d72c36f63d

  • SHA512

    b12addcd16c65b9d07147bf5b40c53de8ccd2fed7cc2fdbb947b008f88761993e967f2f953df72a0aca1ef3e48ad3e17b3104fcf17a589bfb50d39cb9e294798

  • SSDEEP

    3072:XXET3wiC3VLsyWgDq5cO757VRrTJtAMJ7N6BrpHqpXa588O9SF+MfnE2m4FwCpj2:HDTL/q5cO5h4rpsKrO9SInEmQLr

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

rc4.i32
rc4.i32

Extracted

Family

amadey

Version

3.87

C2

http://79.137.192.18/9bDc8sQ/index.php

Attributes
  • install_dir

    577f58beff

  • install_file

    yiueea.exe

  • strings_key

    a5085075a537f09dec81cc154ec0af4d

rc4.plain

Extracted

Family

djvu

C2

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .ttap

  • offline_id

    9qw1wmu1ty4GEiHZdxilHPjCyX6ENKTotjt6MIt1

  • payload_url

    http://colisumy.com/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-4vhLUot4Kz Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0800JOsie

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.255.152.132:36011

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detected Djvu ransomware 9 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample2.exe
    "C:\Users\Admin\AppData\Local\Temp\sample2.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:208
  • C:\Users\Admin\AppData\Local\Temp\E407.exe
    C:\Users\Admin\AppData\Local\Temp\E407.exe
    1⤵
    • Executes dropped EXE
    PID:5040
  • C:\Users\Admin\AppData\Local\Temp\E7E0.exe
    C:\Users\Admin\AppData\Local\Temp\E7E0.exe
    1⤵
    • Executes dropped EXE
    PID:1256
  • C:\Users\Admin\AppData\Local\Temp\EB5C.exe
    C:\Users\Admin\AppData\Local\Temp\EB5C.exe
    1⤵
    • Checks computer location settings
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
      "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN yiueea.exe /TR "C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe" /F
        3⤵
        • Creates scheduled task(s)
        PID:2824
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "yiueea.exe" /P "Admin:N"&&CACLS "yiueea.exe" /P "Admin:R" /E&&echo Y|CACLS "..\577f58beff" /P "Admin:N"&&CACLS "..\577f58beff" /P "Admin:R" /E&&Exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3900
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          4⤵
            PID:2628
          • C:\Windows\SysWOW64\cacls.exe
            CACLS "yiueea.exe" /P "Admin:N"
            4⤵
              PID:4108
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "yiueea.exe" /P "Admin:R" /E
              4⤵
                PID:3324
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                4⤵
                  PID:392
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "..\577f58beff" /P "Admin:N"
                  4⤵
                    PID:4944
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\577f58beff" /P "Admin:R" /E
                    4⤵
                      PID:3668
              • C:\Users\Admin\AppData\Local\Temp\ED03.exe
                C:\Users\Admin\AppData\Local\Temp\ED03.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4564
                • C:\Users\Admin\AppData\Local\Temp\ED03.exe
                  C:\Users\Admin\AppData\Local\Temp\ED03.exe
                  2⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:4832
                  • C:\Windows\SysWOW64\icacls.exe
                    icacls "C:\Users\Admin\AppData\Local\fe06cfe9-5696-4d0f-8817-c1f9967222de" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                    3⤵
                    • Modifies file permissions
                    PID:180
                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe
                    "C:\Users\Admin\AppData\Local\Temp\ED03.exe" --Admin IsNotAutoStart IsNotTask
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3656
                    • C:\Users\Admin\AppData\Local\Temp\ED03.exe
                      "C:\Users\Admin\AppData\Local\Temp\ED03.exe" --Admin IsNotAutoStart IsNotTask
                      4⤵
                      • Executes dropped EXE
                      PID:1872
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 568
                        5⤵
                        • Program crash
                        PID:228
              • C:\Users\Admin\AppData\Local\Temp\EEAA.exe
                C:\Users\Admin\AppData\Local\Temp\EEAA.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:3696
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1432
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 148
                  2⤵
                  • Program crash
                  PID:3808
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3696 -ip 3696
                1⤵
                  PID:1244
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1872 -ip 1872
                  1⤵
                    PID:4792
                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                    C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4052
                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                    C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe
                    1⤵
                    • Executes dropped EXE
                    PID:2164

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\577f58beff\yiueea.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\E407.exe

                    Filesize

                    732KB

                    MD5

                    8f4c3da1585a072e6502ac568601601b

                    SHA1

                    35b0ed8212cee181bf43686b4e5425e2c7d0ffc5

                    SHA256

                    1b13cd2633c86e3aa4b216534b7e516a55f89945270a5485ca7cc9411dd5728d

                    SHA512

                    aecef7bea0e43c616862e0544b1fcfcb594b1e28b5615d4387d9cca0ad00cb1e52b9c7dea0cf652594cbbf1d9210ebf9af78427cab56cf321c3d7a67174bc36a

                  • C:\Users\Admin\AppData\Local\Temp\E407.exe

                    Filesize

                    732KB

                    MD5

                    8f4c3da1585a072e6502ac568601601b

                    SHA1

                    35b0ed8212cee181bf43686b4e5425e2c7d0ffc5

                    SHA256

                    1b13cd2633c86e3aa4b216534b7e516a55f89945270a5485ca7cc9411dd5728d

                    SHA512

                    aecef7bea0e43c616862e0544b1fcfcb594b1e28b5615d4387d9cca0ad00cb1e52b9c7dea0cf652594cbbf1d9210ebf9af78427cab56cf321c3d7a67174bc36a

                  • C:\Users\Admin\AppData\Local\Temp\E7E0.exe

                    Filesize

                    208KB

                    MD5

                    223a38f4f12c2db31b79832a8bb73d3c

                    SHA1

                    f530e8f56f8322820a14193b1579705675fbc61a

                    SHA256

                    a716a3b57ad6a0038e69305eaeed5842c31e5a3aa496d1ac1a0af944319cc25a

                    SHA512

                    72c35e5ce3c44d3a6002ea86ed3e90c955609161454095ac4ba530891382dc155d478690f257f92af73c45912fb147b924a0a7393ed5618f11708bbc02984049

                  • C:\Users\Admin\AppData\Local\Temp\E7E0.exe

                    Filesize

                    208KB

                    MD5

                    223a38f4f12c2db31b79832a8bb73d3c

                    SHA1

                    f530e8f56f8322820a14193b1579705675fbc61a

                    SHA256

                    a716a3b57ad6a0038e69305eaeed5842c31e5a3aa496d1ac1a0af944319cc25a

                    SHA512

                    72c35e5ce3c44d3a6002ea86ed3e90c955609161454095ac4ba530891382dc155d478690f257f92af73c45912fb147b924a0a7393ed5618f11708bbc02984049

                  • C:\Users\Admin\AppData\Local\Temp\EB5C.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\EB5C.exe

                    Filesize

                    307KB

                    MD5

                    55f845c433e637594aaf872e41fda207

                    SHA1

                    1188348ca7e52f075e7d1d0031918c2cea93362e

                    SHA256

                    f9f9b154f928549c7a4b484909f41352048ce8148c678f4ec32c807c1d173a39

                    SHA512

                    5a9b5e83b41041259060e3a29163cdd5ed271c5d476fa455b40ec9bc32bf4bcddaf3aa1ba23faacc2669be420acb905677ec4fcfb3d69e7b9f7908ae5cbd18a4

                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • C:\Users\Admin\AppData\Local\Temp\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • C:\Users\Admin\AppData\Local\Temp\EEAA.exe

                    Filesize

                    1.5MB

                    MD5

                    7aa2d4005c0688fbb8c3ff8f1ad2f898

                    SHA1

                    789b429372d9eec386382a1893efb56a52890d5d

                    SHA256

                    940fcb61134684d28efa774fecdd1c6ccd179e38c1e060ea04c8270ee18a16a0

                    SHA512

                    4dd6ce4903a33ab1a8fc4a2a8e3467833b1ad60573e0ce0da250526c96f06180b52b4147e1f155c8833c082f49af04e25fff7e1f6bdea73f24ea6a118ae6e18f

                  • C:\Users\Admin\AppData\Local\Temp\EEAA.exe

                    Filesize

                    1.5MB

                    MD5

                    7aa2d4005c0688fbb8c3ff8f1ad2f898

                    SHA1

                    789b429372d9eec386382a1893efb56a52890d5d

                    SHA256

                    940fcb61134684d28efa774fecdd1c6ccd179e38c1e060ea04c8270ee18a16a0

                    SHA512

                    4dd6ce4903a33ab1a8fc4a2a8e3467833b1ad60573e0ce0da250526c96f06180b52b4147e1f155c8833c082f49af04e25fff7e1f6bdea73f24ea6a118ae6e18f

                  • C:\Users\Admin\AppData\Local\fe06cfe9-5696-4d0f-8817-c1f9967222de\ED03.exe

                    Filesize

                    803KB

                    MD5

                    57d66bc14d0dc3903ede210e01d6baac

                    SHA1

                    46f64ca57ab62628ee054e6a9b7e5c8d986b94ab

                    SHA256

                    1d7afdd7f0376b99dd5034c795292de369d900bb5820a73b7cb95fe8d1a3aad0

                    SHA512

                    42028b9e1e467df7b193c37015b481c7132c1320c18b488e9f5df3129163b1bab8c65e20de9ab6bde5332a14b17197b991c4e21762666483e72c1801059ed6fc

                  • memory/208-8-0x0000000002D50000-0x0000000002D59000-memory.dmp

                    Filesize

                    36KB

                  • memory/208-5-0x0000000000400000-0x0000000002BAD000-memory.dmp

                    Filesize

                    39.7MB

                  • memory/208-3-0x0000000000400000-0x0000000002BAD000-memory.dmp

                    Filesize

                    39.7MB

                  • memory/208-2-0x0000000002D50000-0x0000000002D59000-memory.dmp

                    Filesize

                    36KB

                  • memory/208-1-0x0000000002E10000-0x0000000002F10000-memory.dmp

                    Filesize

                    1024KB

                  • memory/1432-57-0x0000000072B20000-0x00000000732D0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1432-84-0x00000000089C0000-0x0000000008A26000-memory.dmp

                    Filesize

                    408KB

                  • memory/1432-54-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/1432-90-0x0000000072B20000-0x00000000732D0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1432-60-0x0000000008300000-0x00000000088A4000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/1432-61-0x0000000007DF0000-0x0000000007E82000-memory.dmp

                    Filesize

                    584KB

                  • memory/1432-62-0x0000000008040000-0x0000000008050000-memory.dmp

                    Filesize

                    64KB

                  • memory/1432-63-0x0000000007DD0000-0x0000000007DDA000-memory.dmp

                    Filesize

                    40KB

                  • memory/1432-88-0x000000000AEB0000-0x000000000B3DC000-memory.dmp

                    Filesize

                    5.2MB

                  • memory/1432-65-0x0000000008ED0000-0x00000000094E8000-memory.dmp

                    Filesize

                    6.1MB

                  • memory/1432-66-0x00000000088B0000-0x00000000089BA000-memory.dmp

                    Filesize

                    1.0MB

                  • memory/1432-87-0x000000000A7B0000-0x000000000A972000-memory.dmp

                    Filesize

                    1.8MB

                  • memory/1432-86-0x0000000009780000-0x00000000097D0000-memory.dmp

                    Filesize

                    320KB

                  • memory/1432-69-0x0000000008050000-0x0000000008062000-memory.dmp

                    Filesize

                    72KB

                  • memory/1432-71-0x00000000080B0000-0x00000000080EC000-memory.dmp

                    Filesize

                    240KB

                  • memory/1432-73-0x00000000080F0000-0x000000000813C000-memory.dmp

                    Filesize

                    304KB

                  • memory/1432-85-0x0000000008040000-0x0000000008050000-memory.dmp

                    Filesize

                    64KB

                  • memory/1432-83-0x0000000072B20000-0x00000000732D0000-memory.dmp

                    Filesize

                    7.7MB

                  • memory/1872-77-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1872-78-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1872-80-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3168-4-0x0000000002F70000-0x0000000002F86000-memory.dmp

                    Filesize

                    88KB

                  • memory/3656-74-0x0000000003E30000-0x0000000003EC2000-memory.dmp

                    Filesize

                    584KB

                  • memory/4564-43-0x0000000004080000-0x000000000419B000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/4564-42-0x0000000002370000-0x000000000240B000-memory.dmp

                    Filesize

                    620KB

                  • memory/4832-49-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/4832-67-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/4832-46-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/4832-44-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/4832-48-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB