Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 17:10

General

  • Target

    file.exe

  • Size

    269KB

  • MD5

    9cad5b4d70563e0502bd9448fda8d17c

  • SHA1

    f081a4b20fe8899994867490ae1329c6d90de47d

  • SHA256

    3ff3a06b10b6158ac51d74487dd5c108dc113b3e7a2bb598e37c2d02e37f4631

  • SHA512

    112b75f557b7ad76405eec278fbbeb8efaea3ad1b58f3954a63d1f72121db29e0d7a760d4f2627f6293bd20acfa51163d3ce9549132cf19ad963602032c46dff

  • SSDEEP

    3072:KHl3/MPPIYsGkrWxEuTABIsO9UL0RzPlQmUucvTtcSZk2d:g30YayWxpTQ+UL05vUbp

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://onualituyrs.org/

http://sumagulituyo.org/

http://snukerukeutit.org/

http://lightseinsteniki.org/

http://liuliuoumumy.org/

http://stualialuyastrelia.net/

http://kumbuyartyty.net/

http://criogetikfenbut.org/

http://tonimiuyaytre.org/

http://tyiuiunuewqy.org/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

redtest

C2

107.173.58.91:32870

Signatures

  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V2 payload 3 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Deletes itself
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1748
    • C:\Users\Admin\AppData\Local\Temp\B413.exe
      C:\Users\Admin\AppData\Local\Temp\B413.exe
      2⤵
      • Executes dropped EXE
      PID:2892
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\B904.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\B904.dll
        3⤵
        • Loads dropped DLL
        PID:2768
    • C:\Users\Admin\AppData\Local\Temp\C479.exe
      C:\Users\Admin\AppData\Local\Temp\C479.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Users\Admin\AppData\Local\Temp\D09B.exe
      C:\Users\Admin\AppData\Local\Temp\D09B.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k cmd < Properly & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1628
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2428
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
            5⤵
              PID:2924
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:1932
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "wrsa.exe"
              5⤵
                PID:2068
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c mkdir 28937
                5⤵
                  PID:592
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c copy /b Mandatory + Aging + Fathers + Granny + Plymouth 28937\Imported.pif
                  5⤵
                    PID:1852
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c copy /b Rod + Animation 28937\t
                    5⤵
                      PID:2948
                    • C:\Users\Admin\AppData\Local\Temp\59500\28937\Imported.pif
                      28937\Imported.pif 28937\t
                      5⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:1808
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 5 localhost
                      5⤵
                      • Runs ping.exe
                      PID:2332
              • C:\Users\Admin\AppData\Local\Temp\DB65.exe
                C:\Users\Admin\AppData\Local\Temp\DB65.exe
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2000
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1860
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                2⤵
                • Accesses Microsoft Outlook profiles
                • outlook_office_path
                • outlook_win_path
                PID:1728
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe
                2⤵
                  PID:2156
                • C:\Users\Admin\AppData\Local\Temp\59500\28937\jsc.exe
                  C:\Users\Admin\AppData\Local\Temp\59500\28937\jsc.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:808

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Defense Evasion

              Virtualization/Sandbox Evasion

              1
              T1497

              Credential Access

              Unsecured Credentials

              2
              T1552

              Credentials In Files

              2
              T1552.001

              Discovery

              Query Registry

              4
              T1012

              Virtualization/Sandbox Evasion

              1
              T1497

              System Information Discovery

              3
              T1082

              Peripheral Device Discovery

              1
              T1120

              Process Discovery

              1
              T1057

              Remote System Discovery

              1
              T1018

              Collection

              Data from Local System

              2
              T1005

              Email Collection

              1
              T1114

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\59500\28937\Imported.pif
                Filesize

                924KB

                MD5

                848164d084384c49937f99d5b894253e

                SHA1

                3055ef803eeec4f175ebf120f94125717ee12444

                SHA256

                f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                SHA512

                aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

              • C:\Users\Admin\AppData\Local\Temp\59500\28937\Imported.pif
                Filesize

                924KB

                MD5

                848164d084384c49937f99d5b894253e

                SHA1

                3055ef803eeec4f175ebf120f94125717ee12444

                SHA256

                f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                SHA512

                aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

              • C:\Users\Admin\AppData\Local\Temp\59500\28937\jsc.exe
                Filesize

                45KB

                MD5

                f1feead2143c07ca411d82a29fa964af

                SHA1

                2198e7bf402773757bb2a25311ffd2644e5a1645

                SHA256

                8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                SHA512

                e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

              • C:\Users\Admin\AppData\Local\Temp\59500\28937\jsc.exe
                Filesize

                45KB

                MD5

                f1feead2143c07ca411d82a29fa964af

                SHA1

                2198e7bf402773757bb2a25311ffd2644e5a1645

                SHA256

                8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                SHA512

                e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

              • C:\Users\Admin\AppData\Local\Temp\59500\28937\t
                Filesize

                633KB

                MD5

                fe3cdb342fa79c9e1cb79f4544a8a975

                SHA1

                0c37d9c0b63af3bd99f7e1612024a469d757ae1d

                SHA256

                fad17a4f9fc911f208337c2fb9b38dff422373297ce9fab60faae36771307803

                SHA512

                b50cf641b621eaac56a6805c59298b9857bc149b2d51202aefb53247d2410ca723320db624e4b6b24638809e3f87dfa332ae7dde00c624b12784a825490b9697

              • C:\Users\Admin\AppData\Local\Temp\59500\Aging
                Filesize

                265KB

                MD5

                c724d5bd5c18d2bbe5fe2c7946c1b6b2

                SHA1

                7beed9c36d52db96557049da7fb3fd9765ab06da

                SHA256

                86b3e35e182ef64c4119084416a1009c365629360d954a4a9a53ec6d737a2d8f

                SHA512

                8841cb5ff4425ecaa89f691510276e42cb68450514439766d1e82769f0a498295961681e02bd2c0251b082e50eee599a516b19f7dde345a30f81f743f94e48a7

              • C:\Users\Admin\AppData\Local\Temp\59500\Animation
                Filesize

                156KB

                MD5

                5dbdebec65c149f9303357aeb35f3f13

                SHA1

                971b53aad088edbbd9185c5390b82e41324e964b

                SHA256

                50e9ea749c805b70e45e35d0ec59f5380e5ff8f0b677d099e19b3d6b782163c6

                SHA512

                df410166f1eff8f08453dc110227e947f3c94de59da6a4c5953ff27d8d133df3acad89640f948d4133f4e367809a754f43586bf397acd01133cb291111b7f065

              • C:\Users\Admin\AppData\Local\Temp\59500\Fathers
                Filesize

                134KB

                MD5

                19840b560c884e4575f325fbf6dde028

                SHA1

                58a5840b9163d586ea83535d02197a30fe04f3d0

                SHA256

                698f94e57b0edc595e35cd9ea0a6ded21fd383c559e349b2d4b6bae01a0a445f

                SHA512

                1a3921f8a9a3fd2d0394b811dbfa0fffdc72be5047fe17533cdeae3d2ec6cbdf5a0951a0744f0c1a372de809f3af502ff940fc679f3ff40d0eb55cb78b9d460e

              • C:\Users\Admin\AppData\Local\Temp\59500\Granny
                Filesize

                290KB

                MD5

                4ee0ce02c9a6966cf83884c8b614077f

                SHA1

                2052c40fbc6ae0bd2fc085161e42e500556c27dd

                SHA256

                ec33283a90016ceae05ad793143d10679d430c2aa3fc2d1026f6c6acc5b028fb

                SHA512

                8dbee460fb43696834f62352852f58fdb6e4f160dcdfb1d4a7d81b2fe8cfb730e797af4c97095abbbce19f5569afac6da3eeadb6465ff5c216b6a4e79964a4df

              • C:\Users\Admin\AppData\Local\Temp\59500\Mandatory
                Filesize

                161KB

                MD5

                f95a9af4657f69267464287ead8d12d2

                SHA1

                6171891ae7a8206b76ef4d9cf88f274987f21485

                SHA256

                96aa51fdf657cdc4e28744f2383ad53d45085d7f312264c9d786c751bc778307

                SHA512

                0ee28b7b6a767958058c775a1df42e81a97151b37511686902b29f54d0bc5769d10978c297a90f166018cd34fbc5d85f8f146576a19d78ddc5ed37083de1f6d3

              • C:\Users\Admin\AppData\Local\Temp\59500\Plymouth
                Filesize

                74KB

                MD5

                265a4f252616accea4a910e76e612f0b

                SHA1

                7002ca5e385a2bfa58200c08fd2821acf0072122

                SHA256

                22424b9c63b2b5d882cc25335dbfb2f1872c1186f43fe1caf16d87b808f6e3e9

                SHA512

                f77dfe13c67ba3235bc1dc88041a7266430bedd6f35d3f2ba0c46314346de61305256b144eb9c49842edb4d21741e31161fbe025a92cb85b7aeface781cdd5e4

              • C:\Users\Admin\AppData\Local\Temp\59500\Properly
                Filesize

                12KB

                MD5

                fdf171249c22f3f45c53408bfa0d2f2b

                SHA1

                95e96312015058c60c83a8e38733371311722593

                SHA256

                b0d4a9769a644c418419050c5b2b7f796f06a7d4c48010e8498e2596c7a935bd

                SHA512

                52d21473972162cd29e403d1e3eee209ac5e4c2051a7e07455ec96971a94f5ac045ba3c539066bf5abd2fe3995334a4683f58f0f11dc5c28488ae1dbce91968d

              • C:\Users\Admin\AppData\Local\Temp\59500\Rod
                Filesize

                477KB

                MD5

                4ea38f8c80b7060a80c79ab03d5d1c7c

                SHA1

                cfddc34a9e809c7c3f9fc0e457522bfb0457ab67

                SHA256

                b4ea21811ef45cd914cefd4fa272715c295e7673bfdd3976ef4c1b7c2f00a85a

                SHA512

                0e2e22e503b9938fe356aaef78197621f98ece3c705a2451b6b87ccd50cff92a67d809f81673b66e58ea8c5f82ffb28e955a8eac2782a00430a134fe522cc06a

              • C:\Users\Admin\AppData\Local\Temp\B413.exe
                Filesize

                291KB

                MD5

                1de5eb2944545479b07139c4b4227cb4

                SHA1

                6baf1786af938b22a92b5f515f9d4ee131e6495a

                SHA256

                876ba20dfdae7014531937bf45a1a94757b01e72ae4e6ce5bee66665f1763dd1

                SHA512

                75322c0a9f12a74a69fc342c24ab3fe622dff26545f679b4baa9ffca6e1962e13d7455146bf332db24162aac595d31f5d9f28a4c8dc5685bd94e8ce87aec023a

              • C:\Users\Admin\AppData\Local\Temp\B413.exe
                Filesize

                291KB

                MD5

                1de5eb2944545479b07139c4b4227cb4

                SHA1

                6baf1786af938b22a92b5f515f9d4ee131e6495a

                SHA256

                876ba20dfdae7014531937bf45a1a94757b01e72ae4e6ce5bee66665f1763dd1

                SHA512

                75322c0a9f12a74a69fc342c24ab3fe622dff26545f679b4baa9ffca6e1962e13d7455146bf332db24162aac595d31f5d9f28a4c8dc5685bd94e8ce87aec023a

              • C:\Users\Admin\AppData\Local\Temp\B904.dll
                Filesize

                2.6MB

                MD5

                c73569915305ac15c46f6b0565bc39b0

                SHA1

                744e80ad9f09ee6a2e32fd1700f93ac45a270d53

                SHA256

                e08c706b8e7c518be2606ff7f3274918330b03ed2cd0bf2120a6676fb85dec8b

                SHA512

                a4c85815b872475858913c3dbad6a3820ceb93a317b0749c034948b80ddd4fb3c3a4b9da9740f578a662b8a9f7b8fe2841ef5ddf7152840182d6a0b76f6eca40

              • C:\Users\Admin\AppData\Local\Temp\C479.exe
                Filesize

                4.1MB

                MD5

                41960f214e4314caa2f5157b11b00a18

                SHA1

                c405bffc785505bab364208c24e29eefe80f1e32

                SHA256

                69f5aca8d40511fbf3523b1e8e2cee4ff64b65ab94a7e734e9810ef0f617a327

                SHA512

                7cfcb85c84e493fc2362d96495da0b40f01d7884ba5cc0346714d487cb249379b2dec689f9958177aae49e71f6dafbfb9b7b9c046decb1b4356937052f8e9140

              • C:\Users\Admin\AppData\Local\Temp\D09B.exe
                Filesize

                1.3MB

                MD5

                bf1229435270f85c47a561c29ee5e1e0

                SHA1

                129857639c5cb4feffb0a674be2baf81f1c90bd3

                SHA256

                08ac62d87943f67a0ec0a16d1f9c3f7dc9cef7479afed610847fbb926c9cd1af

                SHA512

                941cb25b836e769dfe68f42df7ba4ee8b9e4e2fac2bd985b3a8b2d1da53c04f46f2380d8977f3a22650b2be37b962f4a7f54552699ebdfdf93adfce2643d966d

              • C:\Users\Admin\AppData\Local\Temp\DB65.exe
                Filesize

                1.8MB

                MD5

                6d3e2ee8f723889b7c3cc7dd7f7b7326

                SHA1

                c739c825908d47921033fbe65db217a7550de798

                SHA256

                e5fef0ed227cef479a29f10d15f0740a4d47747893c69e0b1514e7069da844de

                SHA512

                9530762217ab46bd08d2d8e0004c673a1583949ecfc63407baf7c1dd8c4dad2f8d598f7bcebc9706ba4d14d96169cec88930cc0efddbebcfbb1313ea449536d2

              • C:\Users\Admin\AppData\Local\Temp\DB65.exe
                Filesize

                1.8MB

                MD5

                6d3e2ee8f723889b7c3cc7dd7f7b7326

                SHA1

                c739c825908d47921033fbe65db217a7550de798

                SHA256

                e5fef0ed227cef479a29f10d15f0740a4d47747893c69e0b1514e7069da844de

                SHA512

                9530762217ab46bd08d2d8e0004c673a1583949ecfc63407baf7c1dd8c4dad2f8d598f7bcebc9706ba4d14d96169cec88930cc0efddbebcfbb1313ea449536d2

              • \Users\Admin\AppData\Local\Temp\59500\28937\Imported.pif
                Filesize

                924KB

                MD5

                848164d084384c49937f99d5b894253e

                SHA1

                3055ef803eeec4f175ebf120f94125717ee12444

                SHA256

                f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3

                SHA512

                aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a

              • \Users\Admin\AppData\Local\Temp\59500\28937\jsc.exe
                Filesize

                45KB

                MD5

                f1feead2143c07ca411d82a29fa964af

                SHA1

                2198e7bf402773757bb2a25311ffd2644e5a1645

                SHA256

                8f2800ac8af72e8038e146b3988a30651952f20ed6cdf7be3ae4709fbb026af1

                SHA512

                e7e2266ec862a793da7cea01c926b7a874453cf2efb0b4b77776c26042dc2ded74f17c390fad97bd2d8c0c4971a1b9d9e6c705a13edbc9e48570922e5e6cc9df

              • \Users\Admin\AppData\Local\Temp\B904.dll
                Filesize

                2.6MB

                MD5

                c73569915305ac15c46f6b0565bc39b0

                SHA1

                744e80ad9f09ee6a2e32fd1700f93ac45a270d53

                SHA256

                e08c706b8e7c518be2606ff7f3274918330b03ed2cd0bf2120a6676fb85dec8b

                SHA512

                a4c85815b872475858913c3dbad6a3820ceb93a317b0749c034948b80ddd4fb3c3a4b9da9740f578a662b8a9f7b8fe2841ef5ddf7152840182d6a0b76f6eca40

              • memory/808-161-0x0000000000080000-0x00000000000BC000-memory.dmp
                Filesize

                240KB

              • memory/808-165-0x00000000072A0000-0x00000000072E0000-memory.dmp
                Filesize

                256KB

              • memory/808-169-0x00000000739B0000-0x000000007409E000-memory.dmp
                Filesize

                6.9MB

              • memory/808-163-0x00000000739B0000-0x000000007409E000-memory.dmp
                Filesize

                6.9MB

              • memory/808-156-0x0000000000080000-0x00000000000BC000-memory.dmp
                Filesize

                240KB

              • memory/808-159-0x0000000000080000-0x00000000000BC000-memory.dmp
                Filesize

                240KB

              • memory/1232-4-0x0000000002AF0000-0x0000000002B06000-memory.dmp
                Filesize

                88KB

              • memory/1584-134-0x0000000000400000-0x0000000000552000-memory.dmp
                Filesize

                1.3MB

              • memory/1584-69-0x0000000000240000-0x0000000000241000-memory.dmp
                Filesize

                4KB

              • memory/1728-84-0x00000000003C0000-0x000000000042B000-memory.dmp
                Filesize

                428KB

              • memory/1728-79-0x00000000003C0000-0x000000000042B000-memory.dmp
                Filesize

                428KB

              • memory/1728-94-0x00000000003C0000-0x000000000042B000-memory.dmp
                Filesize

                428KB

              • memory/1728-83-0x0000000000430000-0x00000000004A5000-memory.dmp
                Filesize

                468KB

              • memory/1748-1-0x0000000000C80000-0x0000000000D80000-memory.dmp
                Filesize

                1024KB

              • memory/1748-3-0x0000000000400000-0x0000000000B9E000-memory.dmp
                Filesize

                7.6MB

              • memory/1748-5-0x0000000000400000-0x0000000000B9E000-memory.dmp
                Filesize

                7.6MB

              • memory/1748-2-0x0000000000220000-0x000000000022B000-memory.dmp
                Filesize

                44KB

              • memory/1808-153-0x00000000002B0000-0x00000000002B1000-memory.dmp
                Filesize

                4KB

              • memory/1860-100-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-109-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-106-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-102-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-101-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
                Filesize

                4KB

              • memory/1860-99-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-133-0x00000000739B0000-0x000000007409E000-memory.dmp
                Filesize

                6.9MB

              • memory/1860-97-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/1860-95-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/2156-110-0x0000000000060000-0x000000000006C000-memory.dmp
                Filesize

                48KB

              • memory/2156-108-0x00000000003C0000-0x000000000042B000-memory.dmp
                Filesize

                428KB

              • memory/2156-104-0x0000000000060000-0x000000000006C000-memory.dmp
                Filesize

                48KB

              • memory/2156-164-0x0000000000060000-0x000000000006C000-memory.dmp
                Filesize

                48KB

              • memory/2264-50-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-58-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-52-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-53-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-70-0x0000000000C00000-0x0000000000C40000-memory.dmp
                Filesize

                256KB

              • memory/2264-57-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-66-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-67-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-55-0x0000000076B40000-0x0000000076B87000-memory.dmp
                Filesize

                284KB

              • memory/2264-68-0x0000000076B40000-0x0000000076B87000-memory.dmp
                Filesize

                284KB

              • memory/2264-65-0x00000000739B0000-0x000000007409E000-memory.dmp
                Filesize

                6.9MB

              • memory/2264-56-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-48-0x0000000000CC0000-0x0000000001642000-memory.dmp
                Filesize

                9.5MB

              • memory/2264-49-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-43-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-44-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-45-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-47-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-46-0x0000000076B40000-0x0000000076B87000-memory.dmp
                Filesize

                284KB

              • memory/2264-63-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-54-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-64-0x0000000077290000-0x0000000077292000-memory.dmp
                Filesize

                8KB

              • memory/2264-36-0x0000000000CC0000-0x0000000001642000-memory.dmp
                Filesize

                9.5MB

              • memory/2264-154-0x0000000000C00000-0x0000000000C40000-memory.dmp
                Filesize

                256KB

              • memory/2264-61-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-138-0x0000000000CC0000-0x0000000001642000-memory.dmp
                Filesize

                9.5MB

              • memory/2264-140-0x00000000739B0000-0x000000007409E000-memory.dmp
                Filesize

                6.9MB

              • memory/2264-142-0x0000000076B40000-0x0000000076B87000-memory.dmp
                Filesize

                284KB

              • memory/2264-143-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-141-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-145-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-146-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-147-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2264-148-0x00000000768D0000-0x00000000769E0000-memory.dmp
                Filesize

                1.1MB

              • memory/2768-34-0x0000000002380000-0x0000000002488000-memory.dmp
                Filesize

                1.0MB

              • memory/2768-30-0x0000000002250000-0x0000000002374000-memory.dmp
                Filesize

                1.1MB

              • memory/2768-29-0x0000000000120000-0x0000000000126000-memory.dmp
                Filesize

                24KB

              • memory/2768-27-0x0000000010000000-0x000000001028E000-memory.dmp
                Filesize

                2.6MB

              • memory/2768-37-0x0000000002380000-0x0000000002488000-memory.dmp
                Filesize

                1.0MB

              • memory/2768-39-0x0000000002380000-0x0000000002488000-memory.dmp
                Filesize

                1.0MB

              • memory/2768-41-0x0000000002380000-0x0000000002488000-memory.dmp
                Filesize

                1.0MB

              • memory/2892-78-0x0000000000400000-0x0000000002ABF000-memory.dmp
                Filesize

                38.7MB

              • memory/2892-23-0x0000000000400000-0x0000000002ABF000-memory.dmp
                Filesize

                38.7MB

              • memory/2892-22-0x0000000000220000-0x0000000000236000-memory.dmp
                Filesize

                88KB

              • memory/2892-21-0x0000000002C70000-0x0000000002D70000-memory.dmp
                Filesize

                1024KB

              • memory/2892-105-0x0000000002C70000-0x0000000002D70000-memory.dmp
                Filesize

                1024KB