Resubmissions

17-10-2022 14:19

221017-rm5emacaf4 10

17-10-2022 14:09

221017-rf8tgacbgp 10

15-10-2022 16:38

221015-t5dezafggp 10

Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2022 14:19

General

  • Target

    e41ad88438135bf0b2189701de819be1.exe

  • Size

    213KB

  • MD5

    e41ad88438135bf0b2189701de819be1

  • SHA1

    95de6449d3b39f8e5024456909c867db18f8a72b

  • SHA256

    cd3a2b42f2d770f1f870b2e3be9d0a5262b8038d65e6f95a1e63bed333150db5

  • SHA512

    3cee47029aa2fde04e16f964a5d0c661a623bf6a3a954f30d90ead3859ae4d02c997184d929ba66712b67731cdd17cd664f620ca16241ac04c58e16aea500515

  • SSDEEP

    3072:yXp4AqLOlFA/gtXw4Q5VgHnk9pIZ/cs95SSYPmEpZ0KPDUX56o:ycLOlFPwtgHk9pIpLSSsZ0bo

Malware Config

Extracted

Family

erbium

C2

http://77.73.133.53/cloud/index.php

Signatures

  • Detects Smokeloader packer 1 IoCs
  • Erbium

    Erbium is an infostealer written in C++ and first seen in July 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e41ad88438135bf0b2189701de819be1.exe
    "C:\Users\Admin\AppData\Local\Temp\e41ad88438135bf0b2189701de819be1.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:3024
  • C:\Users\Admin\AppData\Local\Temp\196.exe
    C:\Users\Admin\AppData\Local\Temp\196.exe
    1⤵
    • Executes dropped EXE
    PID:960
  • C:\Users\Admin\AppData\Local\Temp\4F2.exe
    C:\Users\Admin\AppData\Local\Temp\4F2.exe
    1⤵
    • Executes dropped EXE
    PID:184
  • C:\Users\Admin\AppData\Local\Temp\6553.exe
    C:\Users\Admin\AppData\Local\Temp\6553.exe
    1⤵
    • Executes dropped EXE
    PID:1448
  • C:\Users\Admin\AppData\Local\Temp\71B8.exe
    C:\Users\Admin\AppData\Local\Temp\71B8.exe
    1⤵
    • Executes dropped EXE
    PID:4280
  • C:\Users\Admin\AppData\Local\Temp\90AB.exe
    C:\Users\Admin\AppData\Local\Temp\90AB.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4500
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p3245510188437331521472513953 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4988
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:364
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4628
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2980
        • C:\Windows\system32\attrib.exe
          attrib +H "isaas.exe"
          3⤵
          • Views/modifies file attributes
          PID:936
        • C:\Users\Admin\AppData\Local\Temp\main\isaas.exe
          "isaas.exe"
          3⤵
          • Executes dropped EXE
          PID:2920
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:2796
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:2108
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:3324
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:4604
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3680
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:4196
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:4516
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:2604
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:4636

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\196.exe

                        Filesize

                        415KB

                        MD5

                        a776d3bd9dd9de8d6c26771ef598c303

                        SHA1

                        32138208ab70f464373b2a705471856df40bc5f0

                        SHA256

                        1c5bffcb4f1b72017173d7342e52737e81bad54e9aca9ab344542737943d46f9

                        SHA512

                        4f089fa1cdb1fe0d09fca68d4d8c74810290638b50c723f14e9d5aa355e4802c0bfd28f40349793bf5eb97791a9bf29b5f13336f767fc3224b1145f0b8a32158

                      • C:\Users\Admin\AppData\Local\Temp\196.exe

                        Filesize

                        415KB

                        MD5

                        a776d3bd9dd9de8d6c26771ef598c303

                        SHA1

                        32138208ab70f464373b2a705471856df40bc5f0

                        SHA256

                        1c5bffcb4f1b72017173d7342e52737e81bad54e9aca9ab344542737943d46f9

                        SHA512

                        4f089fa1cdb1fe0d09fca68d4d8c74810290638b50c723f14e9d5aa355e4802c0bfd28f40349793bf5eb97791a9bf29b5f13336f767fc3224b1145f0b8a32158

                      • C:\Users\Admin\AppData\Local\Temp\4F2.exe

                        Filesize

                        352KB

                        MD5

                        69fd013cbe94d275dd2492d9d4bb0437

                        SHA1

                        e48331074d6045f07659206534effe770e07c04a

                        SHA256

                        cc47d3db024920205db9a6ed2742d6f6522a5838ddfac9b6347a938907e86b15

                        SHA512

                        ac967b53966446ba1c123fc01e40f922aac08a6c1dff0b72d8974ce7f2bbece84bf796f2f6a8358039eac930b1416cfdd100919227535f038d8437ce0090fe0b

                      • C:\Users\Admin\AppData\Local\Temp\4F2.exe

                        Filesize

                        352KB

                        MD5

                        69fd013cbe94d275dd2492d9d4bb0437

                        SHA1

                        e48331074d6045f07659206534effe770e07c04a

                        SHA256

                        cc47d3db024920205db9a6ed2742d6f6522a5838ddfac9b6347a938907e86b15

                        SHA512

                        ac967b53966446ba1c123fc01e40f922aac08a6c1dff0b72d8974ce7f2bbece84bf796f2f6a8358039eac930b1416cfdd100919227535f038d8437ce0090fe0b

                      • C:\Users\Admin\AppData\Local\Temp\6553.exe

                        Filesize

                        352KB

                        MD5

                        429b43781906b8aa9938d492dc4c7389

                        SHA1

                        064514d71daaca6dddf904797391b99c7f345643

                        SHA256

                        1925f577470837e7b7706ea41838fe3917a214ab05bb6e49ab94ac70f5600636

                        SHA512

                        6377f7f25f2dc470f626be51752d731fc45ff7c600dce12a938aacccc15cfc9c757ff2a49def55651ad9362e80e775b69c9ba473fde259afacbb6258a36b062e

                      • C:\Users\Admin\AppData\Local\Temp\6553.exe

                        Filesize

                        352KB

                        MD5

                        429b43781906b8aa9938d492dc4c7389

                        SHA1

                        064514d71daaca6dddf904797391b99c7f345643

                        SHA256

                        1925f577470837e7b7706ea41838fe3917a214ab05bb6e49ab94ac70f5600636

                        SHA512

                        6377f7f25f2dc470f626be51752d731fc45ff7c600dce12a938aacccc15cfc9c757ff2a49def55651ad9362e80e775b69c9ba473fde259afacbb6258a36b062e

                      • C:\Users\Admin\AppData\Local\Temp\71B8.exe

                        Filesize

                        352KB

                        MD5

                        0450fbfb26c4f37a9965814a632b02ce

                        SHA1

                        a24a358d46e0ffb55ab6f95d165bc275718eee15

                        SHA256

                        87a81819b988a608cedd75e459aeb82cde6448a81d6ad7666fd14d22f60520ab

                        SHA512

                        3c0af53f9c535cab0d634d47584c3bd19395911d3bb8241fa4835253eb1628af4fec88839e8c2a72d81b77ed22fe5b3ff52af1734b94e36b578668abedcbea84

                      • C:\Users\Admin\AppData\Local\Temp\71B8.exe

                        Filesize

                        352KB

                        MD5

                        0450fbfb26c4f37a9965814a632b02ce

                        SHA1

                        a24a358d46e0ffb55ab6f95d165bc275718eee15

                        SHA256

                        87a81819b988a608cedd75e459aeb82cde6448a81d6ad7666fd14d22f60520ab

                        SHA512

                        3c0af53f9c535cab0d634d47584c3bd19395911d3bb8241fa4835253eb1628af4fec88839e8c2a72d81b77ed22fe5b3ff52af1734b94e36b578668abedcbea84

                      • C:\Users\Admin\AppData\Local\Temp\90AB.exe

                        Filesize

                        2.5MB

                        MD5

                        27f20c2a1c93010d089ab8278b1bf550

                        SHA1

                        c8a94971f7777f835f5a0565b43f37cd212dfaba

                        SHA256

                        00abe64f9c24a1db29e1d470ab638d0cdd802984947fe0708e3f3e217e447afb

                        SHA512

                        5046f52f90cf4a5ccc4a2d1409d58b9a05f992172b61b909183d06466ad7913bcb849b4f23193617e4200cedf168bcb5f457260fc199566cf9f76e3300cfcaf7

                      • C:\Users\Admin\AppData\Local\Temp\90AB.exe

                        Filesize

                        2.5MB

                        MD5

                        27f20c2a1c93010d089ab8278b1bf550

                        SHA1

                        c8a94971f7777f835f5a0565b43f37cd212dfaba

                        SHA256

                        00abe64f9c24a1db29e1d470ab638d0cdd802984947fe0708e3f3e217e447afb

                        SHA512

                        5046f52f90cf4a5ccc4a2d1409d58b9a05f992172b61b909183d06466ad7913bcb849b4f23193617e4200cedf168bcb5f457260fc199566cf9f76e3300cfcaf7

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                        Filesize

                        1.6MB

                        MD5

                        72491c7b87a7c2dd350b727444f13bb4

                        SHA1

                        1e9338d56db7ded386878eab7bb44b8934ab1bc7

                        SHA256

                        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                        SHA512

                        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                        Filesize

                        458KB

                        MD5

                        619f7135621b50fd1900ff24aade1524

                        SHA1

                        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                        SHA256

                        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                        SHA512

                        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                        Filesize

                        2.1MB

                        MD5

                        cf318065099e0095bccfc4ef94cc9ffd

                        SHA1

                        8c1f34fd991e27d9e253cc284a4d5c9b09ae22d1

                        SHA256

                        993fbff9e2154d7fefa2ce1e6e8353664f478d52d6220ae62fce480abfc2c9c0

                        SHA512

                        274895848b4e6e56ebc9c20cc76783005baa4bdb8c7a6997fdefa9488394fdb7f8330e6da8a51843872b81a04c403497d6a81476db93761c2588873158e40daf

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                        Filesize

                        3KB

                        MD5

                        0565aa10ef62b4a55e7ff36b79a5e956

                        SHA1

                        7c3d0924206d41c98dcfe3464a0f50981cef2250

                        SHA256

                        3fe32eaebb03b409fc0edaf8b9e269dae420ac107594232011ae1464b75239eb

                        SHA512

                        2541c3838cb4d229c91737a76289ee56bd436200123c3b427272e3064451eae9ed433c148ab6d3563dbad524014635923bd978bd78e8a991ba0a41699d18ddf3

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                        Filesize

                        3KB

                        MD5

                        2d8e6084b20a9435d36817ec76c5f001

                        SHA1

                        576b68b2f2019896cc0b5169fd7a9bd308dd8b33

                        SHA256

                        009da3b14ef5f081fd65da62fd015b5944c6a7edaf21b245f04cf9338f9d25c3

                        SHA512

                        2971082839390a94b89123b7aae2ace44ddcb0a8b1bd9f1b865048a4b0dbc3bf87fc70199bfb96eb2ab27ca29e30146d70d7c4457dea1ec821628652fea30cb0

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                        Filesize

                        1.5MB

                        MD5

                        ea11b6df352e2b75295b4532777de94a

                        SHA1

                        0a74dac011cbdee38d48f84d9bc8d794856c136c

                        SHA256

                        47abab88c18b1e6eba7c2c030deeb86c4263d836a2cec2faf670cfa2b9836274

                        SHA512

                        55d7d24cc61d051370c4d11e62dbfc79989bf20eb41aa714843924cc5118b454c9f44635ebd511efb1c01f471d3298327ce54a95377822c0e0182cde9aef3c0f

                      • C:\Users\Admin\AppData\Local\Temp\main\extracted\isaas.exe

                        Filesize

                        10KB

                        MD5

                        65a20c499e89107378d4808cd754948b

                        SHA1

                        583ae06054d46611f63b3dfcf68d807f4a1d711e

                        SHA256

                        20837c24531ede4a540d16688badcce8e2099a12c3f83afd6db6e4b838732185

                        SHA512

                        fca86b82b3646674a650e1edfdd059566daaef3b4ec0ca0077a736ea77990ebb495a8390b3b3e241533cf5eb42622ff8db58328b9f5a218a65991db6469e3bf6

                      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                        Filesize

                        1.5MB

                        MD5

                        a0775bb39005663389b83f59dba5a0d1

                        SHA1

                        11e3ffd5dd4176e889227a486c02a9ee7da77c27

                        SHA256

                        39fb83950cb95fc0fe73fbe1dccd83335d41e3931cb1b3470e9fa472bf291dcd

                        SHA512

                        f07ca16eb7cf42356db30b1b73e91cd831fb62c9be072ed578ab71f3d75adc846d737ffa9df8528f9bbeda608977707d3dc4273f136993b8d32fce7871c9de24

                      • C:\Users\Admin\AppData\Local\Temp\main\isaas.exe

                        Filesize

                        10KB

                        MD5

                        65a20c499e89107378d4808cd754948b

                        SHA1

                        583ae06054d46611f63b3dfcf68d807f4a1d711e

                        SHA256

                        20837c24531ede4a540d16688badcce8e2099a12c3f83afd6db6e4b838732185

                        SHA512

                        fca86b82b3646674a650e1edfdd059566daaef3b4ec0ca0077a736ea77990ebb495a8390b3b3e241533cf5eb42622ff8db58328b9f5a218a65991db6469e3bf6

                      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                        Filesize

                        454B

                        MD5

                        f6ac3ac275370636a9d1011582f65699

                        SHA1

                        92c4350e6811e295b3f78dc23aab48d4aeaa119e

                        SHA256

                        a2a036641d182b94f67a872adff2d02244722623425215eff050bab90bd5b7d5

                        SHA512

                        7ff488a015cd6315a0f0eb1c91f0b158cbcdfe70fcb7046381e69b05abb525cb9be2811b60268dd412df975a6618e905ac834af88e95deaea09344c41047725d

                      • memory/2108-158-0x0000000000C20000-0x0000000000C2F000-memory.dmp

                        Filesize

                        60KB

                      • memory/2108-157-0x0000000000C30000-0x0000000000C39000-memory.dmp

                        Filesize

                        36KB

                      • memory/2108-206-0x0000000000C30000-0x0000000000C39000-memory.dmp

                        Filesize

                        36KB

                      • memory/2604-200-0x0000000000900000-0x0000000000907000-memory.dmp

                        Filesize

                        28KB

                      • memory/2604-201-0x00000000008F0000-0x00000000008FD000-memory.dmp

                        Filesize

                        52KB

                      • memory/2604-213-0x0000000000900000-0x0000000000907000-memory.dmp

                        Filesize

                        28KB

                      • memory/2796-205-0x00000000001F0000-0x00000000001F7000-memory.dmp

                        Filesize

                        28KB

                      • memory/2796-156-0x00000000001E0000-0x00000000001EB000-memory.dmp

                        Filesize

                        44KB

                      • memory/2796-152-0x00000000001F0000-0x00000000001F7000-memory.dmp

                        Filesize

                        28KB

                      • memory/2920-190-0x0000000005AB0000-0x0000000005D73000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/2920-188-0x0000000005AB0000-0x0000000005D73000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/2920-209-0x0000000005AB0000-0x0000000005D73000-memory.dmp

                        Filesize

                        2.8MB

                      • memory/3024-132-0x000000000066E000-0x000000000067E000-memory.dmp

                        Filesize

                        64KB

                      • memory/3024-133-0x0000000000A20000-0x0000000000A29000-memory.dmp

                        Filesize

                        36KB

                      • memory/3024-135-0x0000000000400000-0x000000000043A000-memory.dmp

                        Filesize

                        232KB

                      • memory/3024-134-0x0000000000400000-0x000000000043A000-memory.dmp

                        Filesize

                        232KB

                      • memory/3324-179-0x00000000009C0000-0x00000000009C9000-memory.dmp

                        Filesize

                        36KB

                      • memory/3324-207-0x00000000009D0000-0x00000000009D5000-memory.dmp

                        Filesize

                        20KB

                      • memory/3324-178-0x00000000009D0000-0x00000000009D5000-memory.dmp

                        Filesize

                        20KB

                      • memory/3680-210-0x0000000000F50000-0x0000000000F72000-memory.dmp

                        Filesize

                        136KB

                      • memory/3680-191-0x0000000000F50000-0x0000000000F72000-memory.dmp

                        Filesize

                        136KB

                      • memory/3680-192-0x0000000000F20000-0x0000000000F47000-memory.dmp

                        Filesize

                        156KB

                      • memory/4196-194-0x0000000000840000-0x0000000000845000-memory.dmp

                        Filesize

                        20KB

                      • memory/4196-195-0x0000000000830000-0x0000000000839000-memory.dmp

                        Filesize

                        36KB

                      • memory/4196-211-0x0000000000840000-0x0000000000845000-memory.dmp

                        Filesize

                        20KB

                      • memory/4516-197-0x0000000000F30000-0x0000000000F36000-memory.dmp

                        Filesize

                        24KB

                      • memory/4516-198-0x0000000000F20000-0x0000000000F2B000-memory.dmp

                        Filesize

                        44KB

                      • memory/4516-212-0x0000000000F30000-0x0000000000F36000-memory.dmp

                        Filesize

                        24KB

                      • memory/4604-186-0x00000000009D0000-0x00000000009D6000-memory.dmp

                        Filesize

                        24KB

                      • memory/4604-208-0x00000000009D0000-0x00000000009D6000-memory.dmp

                        Filesize

                        24KB

                      • memory/4604-187-0x00000000009C0000-0x00000000009CC000-memory.dmp

                        Filesize

                        48KB

                      • memory/4636-204-0x00000000007A0000-0x00000000007AB000-memory.dmp

                        Filesize

                        44KB

                      • memory/4636-203-0x00000000007B0000-0x00000000007B8000-memory.dmp

                        Filesize

                        32KB

                      • memory/4636-214-0x00000000007B0000-0x00000000007B8000-memory.dmp

                        Filesize

                        32KB