Analysis

  • max time kernel
    147s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-11-2020 18:30

General

  • Target

    bei.dll

  • Size

    344KB

  • MD5

    0358fcd58c56d6cedec03b80c64ff988

  • SHA1

    34816e94bf4cc91c3c8bd6a8c087f6592ab28e96

  • SHA256

    10ec4e9f67028d2bf9f5e42cb2918663436e21760a5f1e08950b19ac2745e48c

  • SHA512

    677e4d1c61cfb19ca47c11d3fbfbc68f546ee5095e89075b76ba9c4b7b42ebe4f920ce0ff6b4174ce33fc87f97c398a757203c406413423751b8caa1d9d2248a

Malware Config

Extracted

Family

zloader

Botnet

nut

Campaign

23/11

C2

https://orangeboxasia.com/wp-smarts.php

https://m3izoglass.ro/wp-smarts.php

https://bayza.ro/up_img_01.php

https://cofetariarodna.ro/errors.php

https://casapintea.ro/logs.php

https://roractaseja.ml/wp-smarts.php

rc4.plain
rsa_pubkey.plain

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • Blacklisted process makes network request 14 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Discovers systems in the same network 1 TTPs 4 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of WriteProcessMemory 70 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\system32\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bei.dll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Windows\SysWOW64\regsvr32.exe
        /s C:\Users\Admin\AppData\Local\Temp\bei.dll
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          4⤵
          • Blacklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2940
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c ipconfig /all
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1176
            • C:\Windows\SysWOW64\ipconfig.exe
              ipconfig /all
              6⤵
              • Gathers network information
              PID:3656
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:812
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c net config workstation
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:908
            • C:\Windows\SysWOW64\net.exe
              net config workstation
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:3796
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 config workstation
                7⤵
                  PID:1452
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c net view /all
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:8
              • C:\Windows\SysWOW64\net.exe
                net view /all
                6⤵
                • Discovers systems in the same network
                PID:2512
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c net view /all /domain
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3596
              • C:\Windows\SysWOW64\net.exe
                net view /all /domain
                6⤵
                • Discovers systems in the same network
                PID:1512
            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\certutil.exe
              "C:\Users\Admin\AppData\Local\Temp\Ivetzuog\certutil.exe" -A -n "lecon" -t "C,C,C" -i "C:\Users\Admin\AppData\Local\Temp\asunoxma.crt" -d sql:"C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2kcxi5oi.default-release"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2900
      • C:\Windows\system32\cmd.exe
        cmd.exe /c ipconfig /all
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\ipconfig.exe
          ipconfig /all
          3⤵
          • Gathers network information
          PID:808
      • C:\Windows\system32\cmd.exe
        cmd.exe /c net config workstation
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1052
        • C:\Windows\system32\net.exe
          net config workstation
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1192
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 config workstation
            4⤵
              PID:724
        • C:\Windows\system32\cmd.exe
          cmd.exe /c net view /all
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3812
          • C:\Windows\system32\net.exe
            net view /all
            3⤵
            • Discovers systems in the same network
            PID:2748
        • C:\Windows\system32\cmd.exe
          cmd.exe /c net view /all /domain
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\system32\net.exe
            net view /all /domain
            3⤵
            • Discovers systems in the same network
            PID:1408
        • C:\Windows\system32\cmd.exe
          cmd.exe /c nltest /domain_trusts
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Windows\system32\nltest.exe
            nltest /domain_trusts
            3⤵
              PID:1272
          • C:\Windows\system32\cmd.exe
            cmd.exe /c nltest /domain_trusts /all_trusts
            2⤵
              PID:3492
              • C:\Windows\system32\nltest.exe
                nltest /domain_trusts /all_trusts
                3⤵
                  PID:748

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Execution

            Command-Line Interface

            1
            T1059

            Credential Access

            Credentials in Files

            2
            T1081

            Discovery

            Remote System Discovery

            1
            T1018

            System Information Discovery

            1
            T1082

            Collection

            Data from Local System

            2
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\MSVCR100.dll
              MD5

              0e37fbfa79d349d672456923ec5fbbe3

              SHA1

              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

              SHA256

              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

              SHA512

              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\certutil.exe
              MD5

              0c6b43c9602f4d5ac9dcf907103447c4

              SHA1

              7a77c7ae99d400243845cce0e0931f029a73f79a

              SHA256

              5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

              SHA512

              b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\certutil.exe
              MD5

              0c6b43c9602f4d5ac9dcf907103447c4

              SHA1

              7a77c7ae99d400243845cce0e0931f029a73f79a

              SHA256

              5950722034c8505daa9b359127feb707f16c37d2f69e79d16ee6d9ec37690478

              SHA512

              b21b34a5886a3058ce26a6a5a6ead3b1ebae62354540492fb6508be869e7d292b351c0913461b47c4cc0c6a73333aad33cd9399bcb1f83c7dacfdb7f2ee1f7a9

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\freebl3.dll
              MD5

              269beb631b580c6d54db45b5573b1de5

              SHA1

              64050c1159c2bcfc0e75da407ef0098ad2de17c8

              SHA256

              ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

              SHA512

              649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\libnspr4.dll
              MD5

              6e84af2875700285309dd29294365c6a

              SHA1

              fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

              SHA256

              1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

              SHA512

              0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\libplc4.dll
              MD5

              1fae68b740f18290b98b2f9e23313cc2

              SHA1

              fa3545dc8db38b3b27f1009e1d61dc2949df3878

              SHA256

              751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

              SHA512

              5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\libplds4.dll
              MD5

              9ae76db13972553a5de5bdd07b1b654d

              SHA1

              0c4508eb6f13b9b178237ccc4da759bff10af658

              SHA256

              38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

              SHA512

              db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\nss3.dll
              MD5

              a1c4628d184b6ab25550b1ce74f44792

              SHA1

              c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

              SHA256

              3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

              SHA512

              07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\nssutil3.dll
              MD5

              c26e940b474728e728cafe5912ba418a

              SHA1

              7256e378a419f8d87de71835e6ad12faadaaaf73

              SHA256

              1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

              SHA512

              bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\smime3.dll
              MD5

              a5c670edf4411bf7f132f4280026137b

              SHA1

              c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

              SHA256

              aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

              SHA512

              acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\softokn3.dll
              MD5

              2ab31c9401870adb4e9d88b5a6837abf

              SHA1

              4f0fdd699e63f614d79ed6e47ef61938117d3b7a

              SHA256

              22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

              SHA512

              bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

            • C:\Users\Admin\AppData\Local\Temp\Ivetzuog\sqlite3.dll
              MD5

              b58848a28a1efb85677e344db1fd67e6

              SHA1

              dad48e2b2b3b936efc15ac2c5f9099b7a1749976

              SHA256

              00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

              SHA512

              762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

            • C:\Users\Admin\AppData\Local\Temp\asunoxma.crt
              MD5

              a3e3120b4522373c8789758fb85e839b

              SHA1

              e94dec7fbd794af9d3b447ec777923c16e8effb9

              SHA256

              275931878ed454fa17c9328e9ac9a04a5074d21809a304b8244f625d924bea02

              SHA512

              a2811b07b287b89d0909d01993e5444ed74df510bf044e297847db40740a81294f92413dd8cf4669959fa65efde60842219044c4d628bf57e527a4e68d16a0a9

            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2kcxi5oi.default-release\cert9.db
              MD5

              30752ce0bbcebe36a517a2372e5ed823

              SHA1

              88ecc228f08a5a7849aac22d5a6797b17c4a4a53

              SHA256

              68fc58f0d023aba76cef9e5022cb62e9934639268de8f8b4092379ebcbc77c55

              SHA512

              d68f72c07a3d40656431a0dbe278dab8f8338c4a40e04f7904293d9f7d7b5d2f12146e03183f0deddd2cc40327d53733b9234892f14180e0c4108a6e9e7431c7

            • C:\Users\Admin\AppData\Roaming\Opto\ewi.ip
              MD5

              bc3f603982eaf02d7062d4c6541681f7

              SHA1

              d177c33e9e9020a351e94e677d611b865881e69e

              SHA256

              ab89482feb2cacd232b23452d236db9ceabb934670ad67545534c8c732c822ec

              SHA512

              54057fcb286aa0cb3e42a37a9eae4c660b1404b8140b6ae03e52b4fca6de19750f4c5f6e43e471f7d2c5b6d53a3566722d423cdbf1193b6f05ead78fcdc33da4

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\freebl3.dll
              MD5

              269beb631b580c6d54db45b5573b1de5

              SHA1

              64050c1159c2bcfc0e75da407ef0098ad2de17c8

              SHA256

              ffc7558a61a4e6546cf095bdeabea19f05247a0daa02dca20ea3605e7fc62c77

              SHA512

              649cd40f3e02c2f2711f56aa21f39ccbda9108143d4766a9728c9ad98f329d5f64f77090df769c55b66ab48fb9aa4a380944ebe54f2c450f96cf76e5a6add31e

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\libnspr4.dll
              MD5

              6e84af2875700285309dd29294365c6a

              SHA1

              fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

              SHA256

              1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

              SHA512

              0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\libnspr4.dll
              MD5

              6e84af2875700285309dd29294365c6a

              SHA1

              fc3cb3b2a704250fc36010e2ab495cdc5e7378a9

              SHA256

              1c158e680749e642e55f721f60a71314e26e03e785cd92e560bf650b83c4c3c8

              SHA512

              0add9479b2fd631bafc617c787bca331e915edc6a29dd72269b6a24490ec1c85e677698e07944f5ff3bd8d849d3d20ace61a194a044c697fefcf992c6f05e747

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\libplc4.dll
              MD5

              1fae68b740f18290b98b2f9e23313cc2

              SHA1

              fa3545dc8db38b3b27f1009e1d61dc2949df3878

              SHA256

              751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

              SHA512

              5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\libplc4.dll
              MD5

              1fae68b740f18290b98b2f9e23313cc2

              SHA1

              fa3545dc8db38b3b27f1009e1d61dc2949df3878

              SHA256

              751c2156dc00525668dd990d99f7f61c257951c3fad01c0ee6359fcdff69f933

              SHA512

              5386aad83c76c625e2d64439b2b25bda8d0f8b1eb9344b58306883b66675d1f1e98e3189c1bc29cd4b2c98a9d4a594761488aae04d3748bba5775a51425b11ec

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\libplds4.dll
              MD5

              9ae76db13972553a5de5bdd07b1b654d

              SHA1

              0c4508eb6f13b9b178237ccc4da759bff10af658

              SHA256

              38a906373419501966daf6ec19ca2f8db7b29609128ae5cb424d2aa511652c29

              SHA512

              db6fd98a2b27dd7622f10491bba08793d26ab59016d6862168aad278644f737dddbd312a690ded5091d5e999dc3c3518fd95b200124be8349829e5ce6685cf4b

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\msvcr100.dll
              MD5

              0e37fbfa79d349d672456923ec5fbbe3

              SHA1

              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

              SHA256

              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

              SHA512

              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\msvcr100.dll
              MD5

              0e37fbfa79d349d672456923ec5fbbe3

              SHA1

              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

              SHA256

              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

              SHA512

              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\msvcr100.dll
              MD5

              0e37fbfa79d349d672456923ec5fbbe3

              SHA1

              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

              SHA256

              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

              SHA512

              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\msvcr100.dll
              MD5

              0e37fbfa79d349d672456923ec5fbbe3

              SHA1

              4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

              SHA256

              8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

              SHA512

              2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\nss3.dll
              MD5

              a1c4628d184b6ab25550b1ce74f44792

              SHA1

              c2c447fd2fda68c0ec44b3529a2550d2e2a8c3bc

              SHA256

              3f997d3f1674de9fd119f275638861bc229352f12c70536d8c83a70fcc370847

              SHA512

              07737ac24c91645d9b4d376327b84cb0b470cecbad60920d7ee0e9b11ef4eeb8ee68fb38bf74b5d1f8817d104cecc65e461950242d940e8ff9ca64ce9d3ffbb7

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\nssutil3.dll
              MD5

              c26e940b474728e728cafe5912ba418a

              SHA1

              7256e378a419f8d87de71835e6ad12faadaaaf73

              SHA256

              1af1ac51a92b36de8d85d1f572369815404912908c3a489a6cd7ca2350c2a93d

              SHA512

              bd8673facd416c8f2eb9a45c4deef50e53d0bc41e6b3941fc20cda8e2d88267205526dadb44bd89869bd333bf7d6f8db589c95997e1f3322f7a66a09d562b1df

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\smime3.dll
              MD5

              a5c670edf4411bf7f132f4280026137b

              SHA1

              c0e3cbdde7d3cebf41a193eeca96a11ce2b6da58

              SHA256

              aba2732c7a016730e94e645dd04e8fafcc173fc2e5e2aac01a1c0c66ead1983e

              SHA512

              acfcde89a968d81363ae1cd599a6a362b047ae207722fea8541577ac609bc5fefb2231ed946e13f0b4b3bcd56b947c13837c1b9e360d521ec7d580befcbb0f46

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\softokn3.dll
              MD5

              2ab31c9401870adb4e9d88b5a6837abf

              SHA1

              4f0fdd699e63f614d79ed6e47ef61938117d3b7a

              SHA256

              22ecece561510f77b100cff8109e5ed492c34707b7b14e0774aaa9ca813de4ad

              SHA512

              bc58c4da15e902351f1f161e9d8c1ee4d10aceb5eda7def4b4454cadf4cd9f437118ba9d63f25f4f0a5694e9d34a4def33d40ad51efb1cdebb6f02a81c481871

            • \Users\Admin\AppData\Local\Temp\Ivetzuog\sqlite3.dll
              MD5

              b58848a28a1efb85677e344db1fd67e6

              SHA1

              dad48e2b2b3b936efc15ac2c5f9099b7a1749976

              SHA256

              00db98ab4d50e9b26ecd193bfad6569e1dd395db14246f8c233febba93965f7a

              SHA512

              762b3bd7f1f1a5c3accde8c36406b9beadd4270c570eb95a05935c1f7731513938ae5e99950c648b1eacdd2a85f002319b78b7e4ea9577c72335a2fa54796b13

            • memory/8-87-0x0000000000000000-mapping.dmp
            • memory/724-151-0x0000000000000000-mapping.dmp
            • memory/748-160-0x0000000000000000-mapping.dmp
            • memory/792-0-0x0000000000000000-mapping.dmp
            • memory/808-148-0x0000000000000000-mapping.dmp
            • memory/812-83-0x0000000000000000-mapping.dmp
            • memory/908-84-0x0000000000000000-mapping.dmp
            • memory/1052-149-0x0000000000000000-mapping.dmp
            • memory/1176-12-0x0000000000000000-mapping.dmp
            • memory/1192-150-0x0000000000000000-mapping.dmp
            • memory/1272-158-0x0000000000000000-mapping.dmp
            • memory/1408-155-0x0000000000000000-mapping.dmp
            • memory/1452-86-0x0000000000000000-mapping.dmp
            • memory/1488-156-0x0000000000000000-mapping.dmp
            • memory/1512-90-0x0000000000000000-mapping.dmp
            • memory/1688-147-0x0000000000000000-mapping.dmp
            • memory/2156-154-0x0000000000000000-mapping.dmp
            • memory/2512-88-0x0000000000000000-mapping.dmp
            • memory/2748-153-0x0000000000000000-mapping.dmp
            • memory/2900-162-0x0000000000000000-mapping.dmp
            • memory/2940-161-0x0000000006623000-0x000000000677D000-memory.dmp
              Filesize

              1.4MB

            • memory/2940-1-0x00000000002D0000-0x00000000002F5000-memory.dmp
              Filesize

              148KB

            • memory/2940-2-0x0000000000000000-mapping.dmp
            • memory/3012-146-0x0000000000C20000-0x0000000000C55000-memory.dmp
              Filesize

              212KB

            • memory/3492-159-0x0000000000000000-mapping.dmp
            • memory/3596-89-0x0000000000000000-mapping.dmp
            • memory/3656-57-0x0000000000000000-mapping.dmp
            • memory/3796-85-0x0000000000000000-mapping.dmp
            • memory/3812-152-0x0000000000000000-mapping.dmp