Analysis

  • max time kernel
    295s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-05-2024 02:14

General

  • Target

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe

  • Size

    596KB

  • MD5

    1d3535cc01b2cc54b808a55e945707a0

  • SHA1

    a9a563b8ee37f17c847248bb207b28086d9f4628

  • SHA256

    f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19

  • SHA512

    4c344a2abc7ace17a3fced1e3fcf09ac959b47d8bc1a5bf4280d46c3dccd015254a42ce722f93bbbe28f9866696db685df6209b4e863fa9e02772753eeb2ebbc

  • SSDEEP

    12288:15/Sm4/r42toIX4IaZo2BOtdMKX8MbICwAvV6LwfAnxMlpxxWmBNIg9SWvAK:70/rX8IJ2BwNQcfAnxgDzBx

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

beshomandotestbesnd.run.place:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    taskmgr.exe

  • telegram

    https://api.telegram.org/bot2128988424:AAEkYnwvOQA95riqRZwlqBxg4GV-odRNOyo/sendMessage?chat_id=966649672

Extracted

Family

redline

Botnet

Vic

C2

beshomandotestbesnd.run.place:1111

Extracted

Family

redline

Botnet

DOCX

C2

beshomandotestbesnd.run.place:1111

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 3 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe
    "C:\Users\Admin\AppData\Local\Temp\f5faa2b827aaae846580fe313cfc3562fcf04dbf26320c7190247621c7e10f19.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\ProgramData\system.exe
      "C:\ProgramData\system.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4580
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'system.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3816
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3600
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'taskmgr.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:2608
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "taskmgr" /tr "C:\ProgramData\taskmgr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5068
    • C:\ProgramData\build.exe
      "C:\ProgramData\build.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4712
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    PID:1832
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    PID:4224
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    PID:204
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    PID:5052
  • C:\ProgramData\taskmgr.exe
    C:\ProgramData\taskmgr.exe
    1⤵
    • Executes dropped EXE
    PID:3720

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\build.exe
    Filesize

    95KB

    MD5

    16280875fdcf55ab4c8f1dff6dabc72e

    SHA1

    39880e6fbb258f4f4fa5c79337ec893acae55fb7

    SHA256

    91455ac8837ff1fdba7067cd3e7f790c1649ae70164ccbdf0483eae831a7253a

    SHA512

    53ba4e5e88a8f19ba3faa2f1244501c2d62827a9178ec0fdc995582e03e7d8e39f2dfd7bde11285781a65a021d4f4aab48b94be66a8a1cebbd47ab0cb819202e

  • C:\ProgramData\system.exe
    Filesize

    75KB

    MD5

    70b9f8ef4c4ce24fe372b292aebcd138

    SHA1

    5fd7ce9318727b27db0dd50effbb632686d53f8c

    SHA256

    15af516d88e83cfc8d3deebe7aeb9ccaebc558fc93544ef31b612113fcce907b

    SHA512

    b4658ccb665aa9f43cc049a51c477a0b314c5c13d254d648e34f9feca9feb06021bbf271857f73998e31cc7f877fa5457fbe7420beb58f3563fbfbe121a4cbad

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    3KB

    MD5

    8592ba100a78835a6b94d5949e13dfc1

    SHA1

    63e901200ab9a57c7dd4c078d7f75dcd3b357020

    SHA256

    fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

    SHA512

    87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\taskmgr.exe.log
    Filesize

    654B

    MD5

    16c5fce5f7230eea11598ec11ed42862

    SHA1

    75392d4824706090f5e8907eee1059349c927600

    SHA256

    87ba77c13905298acbac72be90949c4fe0755b6eff9777615aa37f252515f151

    SHA512

    153edd6da59beea6cc411ed7383c32916425d6ebb65f04c65aab7c1d6b25443d143aa8449aa92149de0ad8a975f6ecaa60f9f7574536eec6b38fe5fd3a6c6adc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    90387d6614de578177c9802fe87f9991

    SHA1

    7685d7d2f012d619ce0159af5006b36193220251

    SHA256

    87cac4aafa918dd9b22af4b03cd304a12fde1bb381e3c1a1001886c58867d557

    SHA512

    b85d4abcbb444ef44e3f5955999c24a8e56d7cc6081b76107cb798c893771bd114b8c5a27a50a57d4a63d10357e80de62ffa51661e8b1599f69aa6cc54cb747c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    20997f54d898cd6e572aff9166311b69

    SHA1

    88d64b4f3ecc36493f42ad025f7fdd8c07d625cb

    SHA256

    08a93e39cc8dfbfc0eac6c325bfacc709bac0c0a87acd581d7e69944c35c67cd

    SHA512

    089e7dbc49dca1f3f53843070416f3e130af82a1eee673920ebe1498cb3a9e6cd697cc773d0c7576703d3a473ea9bd1ee3605a2709ee8cdf2a1e31f3ee55433a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    45358e51b923bed044cceb310e829c78

    SHA1

    e7b855fd42a750a3bd7f6d57469136979e1428b6

    SHA256

    f969ca4c4494e9857fa3b8e66dc6fd49ec55cc60417be4aa5ddf9797566262f7

    SHA512

    707e22f74e066e39955670f9196be948936cca0b14f270bc8fed86a4f1176bcb0dbc0b91124b06235d83a8f9e8b67b3acb57cf190446269a0acc90355e89319a

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uq4lt4s0.db4.ps1
    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\tmp2AF7.tmp
    Filesize

    11KB

    MD5

    a33e5b189842c5867f46566bdbf7a095

    SHA1

    e1c06359f6a76da90d19e8fd95e79c832edb3196

    SHA256

    5abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454

    SHA512

    f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b

  • C:\Users\Admin\AppData\Local\Temp\tmp2AF8.tmp
    Filesize

    11KB

    MD5

    4a8fbd593a733fc669169d614021185b

    SHA1

    166e66575715d4c52bcb471c09bdbc5a9bb2f615

    SHA256

    714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42

    SHA512

    6b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b

  • C:\Users\Admin\AppData\Local\Temp\tmp2AF9.tmp
    Filesize

    2.1MB

    MD5

    d41db097c14bb1361ffd34f8c7130488

    SHA1

    b403ea8fcffec8371783a80d7ae17ae0f4614fe5

    SHA256

    5da42926d082c52dfd87980d0ef011df9ddab1f864cfb99c409653c3f133904c

    SHA512

    7846a97ab38f77a7434f110306f4822aa452787ddfbf811c84bee35e2bb123535a50e094d33d622ea57d1977bb59fd22fb7af25e9e861ec19f318e2c2db70e04

  • C:\Users\Admin\AppData\Local\Temp\tmp2AFA.tmp
    Filesize

    11KB

    MD5

    bfbc1a403197ac8cfc95638c2da2cf0e

    SHA1

    634658f4dd9747e87fa540f5ba47e218acfc8af2

    SHA256

    272ed278e82c84cf4f80f48ec7989e1fc35f2055d6d05b63c8a31880846597a6

    SHA512

    b8938526fcbf7152805aec130ca553e3ec949cb825430a5d0a25c90ec5eb0863857010484a4b31fdc4bb65a4c92ad7127c812b93114be4569a677f60debe43b1

  • C:\Users\Admin\AppData\Local\Temp\tmp2AFB.tmp
    Filesize

    11KB

    MD5

    3b068f508d40eb8258ff0b0592ca1f9c

    SHA1

    59ac025c3256e9c6c86165082974fe791ff9833a

    SHA256

    07db44a8d6c3a512b15f1cb7262a2d7e4b63ced2130bc9228515431699191cc7

    SHA512

    e29624bc8fecb0e2a9d917642375bd97b42502e5f23812195a61a4920cae5b6ed540e74dfcf8432dcceb7de906ad0501cdd68056f9b0ec86a6bb0c1e336bfe32

  • C:\Users\Admin\AppData\Local\Temp\tmp2B0C.tmp
    Filesize

    11KB

    MD5

    87cbab2a743fb7e0625cc332c9aac537

    SHA1

    50f858caa7f4ac3a93cf141a5d15b4edeb447ee7

    SHA256

    57e3b0d22fa619da90237d8bcf8f922b142c9f6abf47efc5a1f5b208c4d3f023

    SHA512

    6b678f0dd0030806effe6825fd52a6a30b951e0c3dcf91dfd7a713d387aa8b39ec24368e9623c463360acba5e929e268f75ce996526c5d4485894b8ac6b2e0fa

  • C:\Users\Admin\AppData\Local\Temp\tmp2B0D.tmp
    Filesize

    1.2MB

    MD5

    fa4b36127d693daf0e2cd4fa2c79c74a

    SHA1

    b0ce1c5d11a417159ea7c7a639af2f206c05e2ab

    SHA256

    17da7245a70b1868e7084424bfb8c71b6b89692872545971ccf4fcf1e083df8c

    SHA512

    eb7f5985f536d06a6df4ae945733e441889362fe103f7dd108624ebc51e4bd5181b663edb11ae0358e80ce0c2546b4e6b96c2bb81e77a5c3e5246b1d250ddf42

  • C:\Users\Admin\AppData\Local\Temp\tmpA0E5.tmp
    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\Local\Temp\tmpA129.tmp
    Filesize

    92KB

    MD5

    3daad470df391b2f80f1355a73f49b47

    SHA1

    fd3d71f1d5bcca2c56518cdb061fc1e0a2465dec

    SHA256

    a0732dc29331aee2809c08b9dd1bbddcfd6badc2b90a932b1e5c220d573e7b08

    SHA512

    a03c5c17710c1ecafebca8b3066db41e1d682a619162da61d12f7f84c8ead35b49b6f390a473e23c41baff6072ffc6000a52345d5a1f73371b8711f470216b6a

  • C:\Users\Admin\AppData\Local\Temp\tmpA154.tmp
    Filesize

    96KB

    MD5

    d367ddfda80fdcf578726bc3b0bc3e3c

    SHA1

    23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

    SHA256

    0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

    SHA512

    40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

  • memory/3824-453-0x000000001B910000-0x000000001B922000-memory.dmp
    Filesize

    72KB

  • memory/3824-465-0x000000001D910000-0x000000001DAD2000-memory.dmp
    Filesize

    1.8MB

  • memory/3824-449-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3824-466-0x000000001E5D0000-0x000000001EAF6000-memory.dmp
    Filesize

    5.1MB

  • memory/3824-452-0x000000001B8D0000-0x000000001B8EE000-memory.dmp
    Filesize

    120KB

  • memory/3824-446-0x00007FFF43B33000-0x00007FFF43B34000-memory.dmp
    Filesize

    4KB

  • memory/3824-454-0x000000001D300000-0x000000001D33E000-memory.dmp
    Filesize

    248KB

  • memory/3824-455-0x000000001B8F0000-0x000000001B8FE000-memory.dmp
    Filesize

    56KB

  • memory/3824-143-0x000000001AE70000-0x000000001AE80000-memory.dmp
    Filesize

    64KB

  • memory/3824-130-0x00000000000D0000-0x00000000000EA000-memory.dmp
    Filesize

    104KB

  • memory/3824-129-0x00007FFF43B33000-0x00007FFF43B34000-memory.dmp
    Filesize

    4KB

  • memory/3824-585-0x000000001D4C0000-0x000000001D4DE000-memory.dmp
    Filesize

    120KB

  • memory/4112-133-0x0000000000400000-0x00000000004DF000-memory.dmp
    Filesize

    892KB

  • memory/4112-37-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-11-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-63-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-53-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-43-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-23-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-17-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-9-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-8-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-118-0x0000000004D70000-0x0000000004E0C000-memory.dmp
    Filesize

    624KB

  • memory/4112-15-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-19-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-21-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-132-0x0000000000400000-0x000000000048B000-memory.dmp
    Filesize

    556KB

  • memory/4112-1-0x0000000000610000-0x0000000000710000-memory.dmp
    Filesize

    1024KB

  • memory/4112-25-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-3-0x0000000000400000-0x000000000048B000-memory.dmp
    Filesize

    556KB

  • memory/4112-2-0x00000000020F0000-0x0000000002178000-memory.dmp
    Filesize

    544KB

  • memory/4112-4-0x0000000000400000-0x00000000004DF000-memory.dmp
    Filesize

    892KB

  • memory/4112-5-0x0000000002630000-0x0000000002696000-memory.dmp
    Filesize

    408KB

  • memory/4112-6-0x0000000004E70000-0x000000000536E000-memory.dmp
    Filesize

    5.0MB

  • memory/4112-7-0x00000000026A0000-0x0000000002704000-memory.dmp
    Filesize

    400KB

  • memory/4112-33-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-41-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-27-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-71-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-69-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-29-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-31-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-35-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-13-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-39-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-67-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-65-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-61-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-45-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-47-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-49-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-59-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-57-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-55-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4112-51-0x00000000026A0000-0x00000000026FF000-memory.dmp
    Filesize

    380KB

  • memory/4580-151-0x0000027FD51E0000-0x0000027FD5256000-memory.dmp
    Filesize

    472KB

  • memory/4580-148-0x0000027FD5030000-0x0000027FD5052000-memory.dmp
    Filesize

    136KB

  • memory/4712-443-0x00000000070D0000-0x0000000007162000-memory.dmp
    Filesize

    584KB

  • memory/4712-141-0x0000000073260000-0x000000007394E000-memory.dmp
    Filesize

    6.9MB

  • memory/4712-447-0x000000007326E000-0x000000007326F000-memory.dmp
    Filesize

    4KB

  • memory/4712-321-0x0000000006640000-0x00000000066A6000-memory.dmp
    Filesize

    408KB

  • memory/4712-319-0x0000000006B00000-0x000000000702C000-memory.dmp
    Filesize

    5.2MB

  • memory/4712-318-0x0000000006400000-0x00000000065C2000-memory.dmp
    Filesize

    1.8MB

  • memory/4712-445-0x0000000007210000-0x000000000722E000-memory.dmp
    Filesize

    120KB

  • memory/4712-448-0x0000000073260000-0x000000007394E000-memory.dmp
    Filesize

    6.9MB

  • memory/4712-142-0x0000000005250000-0x000000000535A000-memory.dmp
    Filesize

    1.0MB

  • memory/4712-444-0x0000000007030000-0x00000000070A6000-memory.dmp
    Filesize

    472KB

  • memory/4712-140-0x0000000004FF0000-0x000000000503B000-memory.dmp
    Filesize

    300KB

  • memory/4712-139-0x0000000004FB0000-0x0000000004FEE000-memory.dmp
    Filesize

    248KB

  • memory/4712-138-0x0000000004F50000-0x0000000004F62000-memory.dmp
    Filesize

    72KB

  • memory/4712-137-0x00000000054E0000-0x0000000005AE6000-memory.dmp
    Filesize

    6.0MB

  • memory/4712-136-0x000000007326E000-0x000000007326F000-memory.dmp
    Filesize

    4KB

  • memory/4712-587-0x0000000073260000-0x000000007394E000-memory.dmp
    Filesize

    6.9MB

  • memory/4712-135-0x0000000000720000-0x000000000073E000-memory.dmp
    Filesize

    120KB