Analysis

  • max time kernel
    116s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2023 08:10

General

  • Target

    8859e08fc4a08676c19d7be232972eabf9a90c280bc85c1b19c91ba23d451503.exe

  • Size

    253KB

  • MD5

    ca27dc529c734eea48a7e222aa6ae6bb

  • SHA1

    dfcf96edb94d71a88afcd56603be67bbbc2eebbe

  • SHA256

    8859e08fc4a08676c19d7be232972eabf9a90c280bc85c1b19c91ba23d451503

  • SHA512

    9964d8699ba1cefc80b0a978612c8d15562af7df1d151eefb96ef6287c565460fc5078bf90a6abf0bf832d2af06a4f667a51cbcbb35ddd9658d56a44554611df

  • SSDEEP

    3072:SagURWfZ4stagrRpydBtWwOi7HphAsKjihKhdRGWYF1OuaoUA6uvhpRbXrE:sfbtxdpOBfhFy5JGV1OuaDA6itv

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

http://humydrole.com/tmp/index.php

http://trunk-co.ru/tmp/index.php

http://weareelight.com/tmp/index.php

http://pirateking.online/tmp/index.php

http://piratia.pw/tmp/index.php

http://go-piratia.ru/tmp/index.php

rc4.i32
rc4.i32
rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LogsDiller Cloud (Bot: @logsdillabot)

C2

194.49.94.181:40264

Extracted

Family

smokeloader

Botnet

pub1

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8859e08fc4a08676c19d7be232972eabf9a90c280bc85c1b19c91ba23d451503.exe
    "C:\Users\Admin\AppData\Local\Temp\8859e08fc4a08676c19d7be232972eabf9a90c280bc85c1b19c91ba23d451503.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3784
  • C:\Users\Admin\AppData\Local\Temp\61F1.exe
    C:\Users\Admin\AppData\Local\Temp\61F1.exe
    1⤵
    • Executes dropped EXE
    PID:2736
  • C:\Users\Admin\AppData\Local\Temp\63E6.exe
    C:\Users\Admin\AppData\Local\Temp\63E6.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5072
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
      2⤵
        PID:4432
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
            PID:4704
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          2⤵
            PID:1404
        • C:\Users\Admin\AppData\Local\Temp\6C34.exe
          C:\Users\Admin\AppData\Local\Temp\6C34.exe
          1⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious behavior: MapViewOfSection
          PID:1704
        • C:\Users\Admin\AppData\Local\Temp\7415.exe
          C:\Users\Admin\AppData\Local\Temp\7415.exe
          1⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe
            "C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe"
            2⤵
            • Executes dropped EXE
            PID:2972
          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe
            "C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1200
            • C:\Users\Admin\AppData\Local\Temp\Broom.exe
              C:\Users\Admin\AppData\Local\Temp\Broom.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3336
        • C:\Users\Admin\AppData\Local\Temp\7927.exe
          C:\Users\Admin\AppData\Local\Temp\7927.exe
          1⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:5060
        • C:\Users\Admin\AppData\Local\Temp\7AED.exe
          C:\Users\Admin\AppData\Local\Temp\7AED.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3528
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3456
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
          • Accesses Microsoft Outlook profiles
          • outlook_office_path
          • outlook_win_path
          PID:1532
        • C:\Windows\SysWOW64\regsvr32.exe
          /s C:\Users\Admin\AppData\Local\Temp\7DBD.dll
          1⤵
          • Loads dropped DLL
          PID:1432
        • C:\Windows\system32\regsvr32.exe
          regsvr32 /s C:\Users\Admin\AppData\Local\Temp\7DBD.dll
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4452
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe
          1⤵
            PID:5024

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

            Filesize

            4.2MB

            MD5

            890bfdf3c7eecbb505c0fdc415f466b3

            SHA1

            90889e27be89519f23d85915956d989b75793c8d

            SHA256

            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

            SHA512

            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

            Filesize

            4.2MB

            MD5

            890bfdf3c7eecbb505c0fdc415f466b3

            SHA1

            90889e27be89519f23d85915956d989b75793c8d

            SHA256

            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

            SHA512

            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

          • C:\Users\Admin\AppData\Local\Temp\288c47bbc1871b439df19ff4df68f076.exe

            Filesize

            4.2MB

            MD5

            890bfdf3c7eecbb505c0fdc415f466b3

            SHA1

            90889e27be89519f23d85915956d989b75793c8d

            SHA256

            e617e19dce9f15496c331be6daf2006a03573d50e42b34f2ae9ee4aee2bc8c72

            SHA512

            e08f327a03ede89a8e8df0a50244458095ed8afd132be8f21323cb81cfe5fb09d18266d0f5186dfd12d48649ffbb2dd1c8ec35951702f2b99adb1075fd776ece

          • C:\Users\Admin\AppData\Local\Temp\61F1.exe

            Filesize

            789KB

            MD5

            a210a90552763d656fde75a803331986

            SHA1

            456430e59f1a575a320dd04d380e286a31cf77e1

            SHA256

            c1a93f1ae87b5dbc144d5957724bfb6e6c9a97954f87beb31325de7e4f46130f

            SHA512

            4da5a6ecc4b510798f8b06652cd95440420c1f192539a28e5ff8dec6af2fae399669fd0c12eabb355ca24a0efa1bec07203010af25765a90f34bdc9e3e053688

          • C:\Users\Admin\AppData\Local\Temp\61F1.exe

            Filesize

            789KB

            MD5

            a210a90552763d656fde75a803331986

            SHA1

            456430e59f1a575a320dd04d380e286a31cf77e1

            SHA256

            c1a93f1ae87b5dbc144d5957724bfb6e6c9a97954f87beb31325de7e4f46130f

            SHA512

            4da5a6ecc4b510798f8b06652cd95440420c1f192539a28e5ff8dec6af2fae399669fd0c12eabb355ca24a0efa1bec07203010af25765a90f34bdc9e3e053688

          • C:\Users\Admin\AppData\Local\Temp\63E6.exe

            Filesize

            1.8MB

            MD5

            fac406eb3a620ec45654e087f68ccd9e

            SHA1

            02c21bd71ec411685102670cd4342a332ebaade0

            SHA256

            de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340

            SHA512

            2668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11

          • C:\Users\Admin\AppData\Local\Temp\63E6.exe

            Filesize

            1.8MB

            MD5

            fac406eb3a620ec45654e087f68ccd9e

            SHA1

            02c21bd71ec411685102670cd4342a332ebaade0

            SHA256

            de955b499b42824606d86071bdb1f1555df518b3f12b0254d674a20876e9d340

            SHA512

            2668c162ccc01f61a1a9ffec6b35a0c2f64b6f0f5a724f1563b3b23460ed17faa7e64d6817f0eaf7f9c38f3a1ac4fb730351d197b9fff051f25d6e1aac4d2b11

          • C:\Users\Admin\AppData\Local\Temp\6C34.exe

            Filesize

            253KB

            MD5

            2b4c6c20201e6bd5d4ed2c7bf319697b

            SHA1

            f82e36cd754b882fa12522059fd39a910abff3a5

            SHA256

            3e4b5c9a68dd8d70e58f5fa4ced224f74208dc9a975248d6f2f12ba571b50e91

            SHA512

            e89af398a2dcba5d9ef947b2a187f0e2011b419acd445ad5a7914e64e4bac618edd9545903a73ccd3b7ac4347ec1428802fa77c742712e5ca9589b0316688281

          • C:\Users\Admin\AppData\Local\Temp\6C34.exe

            Filesize

            253KB

            MD5

            2b4c6c20201e6bd5d4ed2c7bf319697b

            SHA1

            f82e36cd754b882fa12522059fd39a910abff3a5

            SHA256

            3e4b5c9a68dd8d70e58f5fa4ced224f74208dc9a975248d6f2f12ba571b50e91

            SHA512

            e89af398a2dcba5d9ef947b2a187f0e2011b419acd445ad5a7914e64e4bac618edd9545903a73ccd3b7ac4347ec1428802fa77c742712e5ca9589b0316688281

          • C:\Users\Admin\AppData\Local\Temp\7415.exe

            Filesize

            6.4MB

            MD5

            faa78f58b4f091f8c56ea622d8576703

            SHA1

            2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

            SHA256

            464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

            SHA512

            3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

          • C:\Users\Admin\AppData\Local\Temp\7415.exe

            Filesize

            6.4MB

            MD5

            faa78f58b4f091f8c56ea622d8576703

            SHA1

            2bd05e7cf298f79bc7408f400e2f2fd37fc8bdf1

            SHA256

            464c7ab944886103d617e334c94320344761a543de5395c6b541ae386b448ea0

            SHA512

            3037aef0866b9957fd9f56691baa0e6557a9f46cd3695016dc3c829fc270393360b05e39fba19dc10cac06c2f51998716b3c15c57c3f0afe8c11b2a3709d467b

          • C:\Users\Admin\AppData\Local\Temp\7927.exe

            Filesize

            3.6MB

            MD5

            039e90762a618407e0005d5345b39a7c

            SHA1

            6d9bef6164b2bc32fc24e8e81ad7fbfb6ec356e3

            SHA256

            bf0d60f358b53bd940c24b195472d880bf9363d2f2094a460710e782e9530f6a

            SHA512

            204c9083338a714723a5f5c60b6aad39df3e74ec4cc43c17e8a1afea18290547063155ecf4332caceed96246be948ed623d70d09a24fc05bbd0b1949daaff0b1

          • C:\Users\Admin\AppData\Local\Temp\7927.exe

            Filesize

            3.6MB

            MD5

            039e90762a618407e0005d5345b39a7c

            SHA1

            6d9bef6164b2bc32fc24e8e81ad7fbfb6ec356e3

            SHA256

            bf0d60f358b53bd940c24b195472d880bf9363d2f2094a460710e782e9530f6a

            SHA512

            204c9083338a714723a5f5c60b6aad39df3e74ec4cc43c17e8a1afea18290547063155ecf4332caceed96246be948ed623d70d09a24fc05bbd0b1949daaff0b1

          • C:\Users\Admin\AppData\Local\Temp\7AED.exe

            Filesize

            467KB

            MD5

            3956d59020e29b34e2d88b38fa26e629

            SHA1

            44937859602c9cd7377dc60aba9c978cb6ad79d2

            SHA256

            0f63ad5dd9011a560f0613ac4ea959d7deecb9088a4b2a37e8a5e4112b602b5e

            SHA512

            b6c949e9c4d745dba60e2dfeeb698bb2636a0c1f2fb794d13e05b53e68295c5ac79387e8730b0d19c3f8913689cb32d701788ea31f6ee948ee1175a41faf336a

          • C:\Users\Admin\AppData\Local\Temp\7AED.exe

            Filesize

            467KB

            MD5

            3956d59020e29b34e2d88b38fa26e629

            SHA1

            44937859602c9cd7377dc60aba9c978cb6ad79d2

            SHA256

            0f63ad5dd9011a560f0613ac4ea959d7deecb9088a4b2a37e8a5e4112b602b5e

            SHA512

            b6c949e9c4d745dba60e2dfeeb698bb2636a0c1f2fb794d13e05b53e68295c5ac79387e8730b0d19c3f8913689cb32d701788ea31f6ee948ee1175a41faf336a

          • C:\Users\Admin\AppData\Local\Temp\7DBD.dll

            Filesize

            1.8MB

            MD5

            5a6ba927a945e87a33a67b8e03913f9b

            SHA1

            ecd1f825c1201fa156c17dd0865faefa5cae56d8

            SHA256

            93476e38f8d4454362afc5f4762a1ce41c698b385659e09876dcf2995fe5db81

            SHA512

            5d8cf0633741402ce7bac4076e771bc680e1963df0a17ed1714a8f2ca7fc9cdf3150c01b85e1e64512b109506af3c238db1b02f204136cc78c6c54bf4f034557

          • C:\Users\Admin\AppData\Local\Temp\7DBD.dll

            Filesize

            1.8MB

            MD5

            5a6ba927a945e87a33a67b8e03913f9b

            SHA1

            ecd1f825c1201fa156c17dd0865faefa5cae56d8

            SHA256

            93476e38f8d4454362afc5f4762a1ce41c698b385659e09876dcf2995fe5db81

            SHA512

            5d8cf0633741402ce7bac4076e771bc680e1963df0a17ed1714a8f2ca7fc9cdf3150c01b85e1e64512b109506af3c238db1b02f204136cc78c6c54bf4f034557

          • C:\Users\Admin\AppData\Local\Temp\Broom.exe

            Filesize

            5.3MB

            MD5

            00e93456aa5bcf9f60f84b0c0760a212

            SHA1

            6096890893116e75bd46fea0b8c3921ceb33f57d

            SHA256

            ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

            SHA512

            abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

            Filesize

            2.3MB

            MD5

            d56df2995b539368495f3300e48d8e18

            SHA1

            8d2d02923afb5fb5e09ce1592104db17a3128246

            SHA256

            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

            SHA512

            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

            Filesize

            2.3MB

            MD5

            d56df2995b539368495f3300e48d8e18

            SHA1

            8d2d02923afb5fb5e09ce1592104db17a3128246

            SHA256

            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

            SHA512

            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

          • C:\Users\Admin\AppData\Local\Temp\InstallSetup8.exe

            Filesize

            2.3MB

            MD5

            d56df2995b539368495f3300e48d8e18

            SHA1

            8d2d02923afb5fb5e09ce1592104db17a3128246

            SHA256

            b87fd3c98383089618d2f66cbbecd2b0ed91db6923135235eb52a671f8dd7cb6

            SHA512

            2b25f9b2ff56abafcd8aa0a5fbae4ea78e9e95cec3d4cb832a7a3c5ec13af7d9ecf3ef26ec5c7144805868801aacb8de4113490c3bd665fda4e23ec05b9d8008

          • C:\Users\Admin\AppData\Roaming\isfaitw

            Filesize

            253KB

            MD5

            2b4c6c20201e6bd5d4ed2c7bf319697b

            SHA1

            f82e36cd754b882fa12522059fd39a910abff3a5

            SHA256

            3e4b5c9a68dd8d70e58f5fa4ced224f74208dc9a975248d6f2f12ba571b50e91

            SHA512

            e89af398a2dcba5d9ef947b2a187f0e2011b419acd445ad5a7914e64e4bac618edd9545903a73ccd3b7ac4347ec1428802fa77c742712e5ca9589b0316688281

          • memory/1404-182-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/1404-183-0x0000000000400000-0x0000000000416000-memory.dmp

            Filesize

            88KB

          • memory/1432-127-0x00000000023A0000-0x00000000024C7000-memory.dmp

            Filesize

            1.2MB

          • memory/1432-106-0x0000000010000000-0x00000000101D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1432-133-0x00000000024E0000-0x00000000025EB000-memory.dmp

            Filesize

            1.0MB

          • memory/1432-143-0x00000000024E0000-0x00000000025EB000-memory.dmp

            Filesize

            1.0MB

          • memory/1432-136-0x00000000024E0000-0x00000000025EB000-memory.dmp

            Filesize

            1.0MB

          • memory/1432-130-0x0000000010000000-0x00000000101D3000-memory.dmp

            Filesize

            1.8MB

          • memory/1432-132-0x00000000024E0000-0x00000000025EB000-memory.dmp

            Filesize

            1.0MB

          • memory/1432-114-0x0000000002240000-0x0000000002246000-memory.dmp

            Filesize

            24KB

          • memory/1532-123-0x0000000001120000-0x000000000118B000-memory.dmp

            Filesize

            428KB

          • memory/1532-64-0x0000000001120000-0x000000000118B000-memory.dmp

            Filesize

            428KB

          • memory/1532-74-0x0000000001400000-0x0000000001475000-memory.dmp

            Filesize

            468KB

          • memory/1704-142-0x0000000000800000-0x0000000000900000-memory.dmp

            Filesize

            1024KB

          • memory/1704-139-0x0000000000400000-0x00000000007C8000-memory.dmp

            Filesize

            3.8MB

          • memory/1704-141-0x00000000007E0000-0x00000000007EB000-memory.dmp

            Filesize

            44KB

          • memory/1704-150-0x0000000000400000-0x00000000007C8000-memory.dmp

            Filesize

            3.8MB

          • memory/3288-4-0x0000000002E10000-0x0000000002E26000-memory.dmp

            Filesize

            88KB

          • memory/3288-146-0x0000000000FA0000-0x0000000000FB6000-memory.dmp

            Filesize

            88KB

          • memory/3336-119-0x0000000000B30000-0x0000000000B31000-memory.dmp

            Filesize

            4KB

          • memory/3336-169-0x0000000000B30000-0x0000000000B31000-memory.dmp

            Filesize

            4KB

          • memory/3336-134-0x0000000000400000-0x0000000000965000-memory.dmp

            Filesize

            5.4MB

          • memory/3336-163-0x0000000000400000-0x0000000000965000-memory.dmp

            Filesize

            5.4MB

          • memory/3456-128-0x0000000000400000-0x000000000043C000-memory.dmp

            Filesize

            240KB

          • memory/3456-140-0x00000000075C0000-0x00000000075D0000-memory.dmp

            Filesize

            64KB

          • memory/3456-162-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/3456-131-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/3784-5-0x0000000000400000-0x00000000007C8000-memory.dmp

            Filesize

            3.8MB

          • memory/3784-2-0x0000000000950000-0x000000000095B000-memory.dmp

            Filesize

            44KB

          • memory/3784-3-0x0000000000400000-0x00000000007C8000-memory.dmp

            Filesize

            3.8MB

          • memory/3784-1-0x0000000000830000-0x0000000000930000-memory.dmp

            Filesize

            1024KB

          • memory/4432-174-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/4432-177-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/4432-173-0x0000000000400000-0x00000000004CE000-memory.dmp

            Filesize

            824KB

          • memory/4432-178-0x00000000055D0000-0x00000000055E0000-memory.dmp

            Filesize

            64KB

          • memory/4876-35-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/4876-36-0x0000000000890000-0x0000000000F04000-memory.dmp

            Filesize

            6.5MB

          • memory/4876-85-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5024-81-0x00000000005E0000-0x00000000005E7000-memory.dmp

            Filesize

            28KB

          • memory/5024-87-0x00000000005D0000-0x00000000005DC000-memory.dmp

            Filesize

            48KB

          • memory/5024-76-0x00000000005D0000-0x00000000005DC000-memory.dmp

            Filesize

            48KB

          • memory/5060-155-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-46-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-116-0x0000000000DC0000-0x00000000016E2000-memory.dmp

            Filesize

            9.1MB

          • memory/5060-125-0x0000000007B80000-0x0000000007BCC000-memory.dmp

            Filesize

            304KB

          • memory/5060-61-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-59-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-124-0x0000000007B30000-0x0000000007B6C000-memory.dmp

            Filesize

            240KB

          • memory/5060-58-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-137-0x0000000000DC0000-0x00000000016E2000-memory.dmp

            Filesize

            9.1MB

          • memory/5060-138-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-122-0x0000000007AD0000-0x0000000007AE2000-memory.dmp

            Filesize

            72KB

          • memory/5060-121-0x0000000008340000-0x000000000844A000-memory.dmp

            Filesize

            1.0MB

          • memory/5060-120-0x0000000008960000-0x0000000008F78000-memory.dmp

            Filesize

            6.1MB

          • memory/5060-65-0x0000000077124000-0x0000000077126000-memory.dmp

            Filesize

            8KB

          • memory/5060-56-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-144-0x0000000008550000-0x00000000085B6000-memory.dmp

            Filesize

            408KB

          • memory/5060-145-0x0000000009390000-0x0000000009552000-memory.dmp

            Filesize

            1.8MB

          • memory/5060-44-0x0000000000DC0000-0x00000000016E2000-memory.dmp

            Filesize

            9.1MB

          • memory/5060-147-0x0000000009A90000-0x0000000009FBC000-memory.dmp

            Filesize

            5.2MB

          • memory/5060-55-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-153-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-47-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-154-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-156-0x0000000006600000-0x0000000006650000-memory.dmp

            Filesize

            320KB

          • memory/5060-159-0x00000000756D0000-0x00000000757C0000-memory.dmp

            Filesize

            960KB

          • memory/5060-160-0x0000000000DC0000-0x00000000016E2000-memory.dmp

            Filesize

            9.1MB

          • memory/5072-23-0x0000000000650000-0x0000000000818000-memory.dmp

            Filesize

            1.8MB

          • memory/5072-82-0x00000000064F0000-0x0000000006534000-memory.dmp

            Filesize

            272KB

          • memory/5072-164-0x0000000006AE0000-0x0000000006AFA000-memory.dmp

            Filesize

            104KB

          • memory/5072-165-0x0000000007720000-0x0000000007726000-memory.dmp

            Filesize

            24KB

          • memory/5072-118-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/5072-22-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5072-30-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/5072-24-0x0000000005630000-0x00000000056CC000-memory.dmp

            Filesize

            624KB

          • memory/5072-112-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB

          • memory/5072-25-0x0000000005D00000-0x00000000062A4000-memory.dmp

            Filesize

            5.6MB

          • memory/5072-176-0x0000000003020000-0x0000000003030000-memory.dmp

            Filesize

            64KB

          • memory/5072-107-0x00000000065B0000-0x00000000065BA000-memory.dmp

            Filesize

            40KB

          • memory/5072-84-0x0000000006600000-0x0000000006692000-memory.dmp

            Filesize

            584KB

          • memory/5072-185-0x0000000074530000-0x0000000074CE0000-memory.dmp

            Filesize

            7.7MB