Resubmissions

17/10/2022, 14:20

221017-rnkfvacaf6 10

15/10/2022, 17:37

221015-v65raafhaq 10

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2022, 14:20

General

  • Target

    ab606f1f97bbc65edd55952a2daf2252.exe

  • Size

    213KB

  • MD5

    ab606f1f97bbc65edd55952a2daf2252

  • SHA1

    1ec0354c1f2a2ef61f3193511ea172f947734b13

  • SHA256

    2123f46b435c2e8765a882624a35060d86226424c97a2b2a9edad4b75bd0ba3f

  • SHA512

    483f86ad28e5c61a52eb8d874d82fbe559f3386b189b5e856fd5fabf9ad3fa604790828164e4e6249462fefb7183ee1f9f4a3ab93166501f29e740510eaafdac

  • SSDEEP

    6144:Tv2LdFDqNR8H1N108GtQlOM0d80N6tzOZ:Tv2BFDqNRMN108iQlOxN6ROZ

Malware Config

Extracted

Family

erbium

C2

http://77.73.133.53/cloud/index.php

Signatures

  • Detects Smokeloader packer 1 IoCs
  • Erbium

    Erbium is an infostealer written in C++ and first seen in July 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab606f1f97bbc65edd55952a2daf2252.exe
    "C:\Users\Admin\AppData\Local\Temp\ab606f1f97bbc65edd55952a2daf2252.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:1664
  • C:\Users\Admin\AppData\Local\Temp\29CF.exe
    C:\Users\Admin\AppData\Local\Temp\29CF.exe
    1⤵
    • Executes dropped EXE
    PID:720
  • C:\Users\Admin\AppData\Local\Temp\2C12.exe
    C:\Users\Admin\AppData\Local\Temp\2C12.exe
    1⤵
    • Executes dropped EXE
    PID:3768
  • C:\Users\Admin\AppData\Local\Temp\3B94.exe
    C:\Users\Admin\AppData\Local\Temp\3B94.exe
    1⤵
    • Executes dropped EXE
    PID:2960
  • C:\Users\Admin\AppData\Local\Temp\4672.exe
    C:\Users\Admin\AppData\Local\Temp\4672.exe
    1⤵
    • Executes dropped EXE
    PID:1656
  • C:\Users\Admin\AppData\Local\Temp\8958.exe
    C:\Users\Admin\AppData\Local\Temp\8958.exe
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:4796
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p3245510188437331521472513953 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4120
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4204
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1852
        • C:\Windows\system32\attrib.exe
          attrib +H "isaas.exe"
          3⤵
          • Views/modifies file attributes
          PID:4924
        • C:\Users\Admin\AppData\Local\Temp\main\isaas.exe
          "isaas.exe"
          3⤵
          • Executes dropped EXE
          PID:1128
    • C:\Windows\SysWOW64\explorer.exe
      C:\Windows\SysWOW64\explorer.exe
      1⤵
        PID:4164
      • C:\Windows\explorer.exe
        C:\Windows\explorer.exe
        1⤵
          PID:1328
        • C:\Windows\SysWOW64\explorer.exe
          C:\Windows\SysWOW64\explorer.exe
          1⤵
            PID:4652
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe
            1⤵
              PID:3108
            • C:\Windows\SysWOW64\explorer.exe
              C:\Windows\SysWOW64\explorer.exe
              1⤵
                PID:3256
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1468
                • C:\Windows\SysWOW64\explorer.exe
                  C:\Windows\SysWOW64\explorer.exe
                  1⤵
                    PID:3104
                  • C:\Windows\explorer.exe
                    C:\Windows\explorer.exe
                    1⤵
                      PID:4948
                    • C:\Windows\SysWOW64\explorer.exe
                      C:\Windows\SysWOW64\explorer.exe
                      1⤵
                        PID:3516

                      Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\29CF.exe

                              Filesize

                              415KB

                              MD5

                              a776d3bd9dd9de8d6c26771ef598c303

                              SHA1

                              32138208ab70f464373b2a705471856df40bc5f0

                              SHA256

                              1c5bffcb4f1b72017173d7342e52737e81bad54e9aca9ab344542737943d46f9

                              SHA512

                              4f089fa1cdb1fe0d09fca68d4d8c74810290638b50c723f14e9d5aa355e4802c0bfd28f40349793bf5eb97791a9bf29b5f13336f767fc3224b1145f0b8a32158

                            • C:\Users\Admin\AppData\Local\Temp\29CF.exe

                              Filesize

                              415KB

                              MD5

                              a776d3bd9dd9de8d6c26771ef598c303

                              SHA1

                              32138208ab70f464373b2a705471856df40bc5f0

                              SHA256

                              1c5bffcb4f1b72017173d7342e52737e81bad54e9aca9ab344542737943d46f9

                              SHA512

                              4f089fa1cdb1fe0d09fca68d4d8c74810290638b50c723f14e9d5aa355e4802c0bfd28f40349793bf5eb97791a9bf29b5f13336f767fc3224b1145f0b8a32158

                            • C:\Users\Admin\AppData\Local\Temp\2C12.exe

                              Filesize

                              352KB

                              MD5

                              69fd013cbe94d275dd2492d9d4bb0437

                              SHA1

                              e48331074d6045f07659206534effe770e07c04a

                              SHA256

                              cc47d3db024920205db9a6ed2742d6f6522a5838ddfac9b6347a938907e86b15

                              SHA512

                              ac967b53966446ba1c123fc01e40f922aac08a6c1dff0b72d8974ce7f2bbece84bf796f2f6a8358039eac930b1416cfdd100919227535f038d8437ce0090fe0b

                            • C:\Users\Admin\AppData\Local\Temp\2C12.exe

                              Filesize

                              352KB

                              MD5

                              69fd013cbe94d275dd2492d9d4bb0437

                              SHA1

                              e48331074d6045f07659206534effe770e07c04a

                              SHA256

                              cc47d3db024920205db9a6ed2742d6f6522a5838ddfac9b6347a938907e86b15

                              SHA512

                              ac967b53966446ba1c123fc01e40f922aac08a6c1dff0b72d8974ce7f2bbece84bf796f2f6a8358039eac930b1416cfdd100919227535f038d8437ce0090fe0b

                            • C:\Users\Admin\AppData\Local\Temp\3B94.exe

                              Filesize

                              352KB

                              MD5

                              429b43781906b8aa9938d492dc4c7389

                              SHA1

                              064514d71daaca6dddf904797391b99c7f345643

                              SHA256

                              1925f577470837e7b7706ea41838fe3917a214ab05bb6e49ab94ac70f5600636

                              SHA512

                              6377f7f25f2dc470f626be51752d731fc45ff7c600dce12a938aacccc15cfc9c757ff2a49def55651ad9362e80e775b69c9ba473fde259afacbb6258a36b062e

                            • C:\Users\Admin\AppData\Local\Temp\3B94.exe

                              Filesize

                              352KB

                              MD5

                              429b43781906b8aa9938d492dc4c7389

                              SHA1

                              064514d71daaca6dddf904797391b99c7f345643

                              SHA256

                              1925f577470837e7b7706ea41838fe3917a214ab05bb6e49ab94ac70f5600636

                              SHA512

                              6377f7f25f2dc470f626be51752d731fc45ff7c600dce12a938aacccc15cfc9c757ff2a49def55651ad9362e80e775b69c9ba473fde259afacbb6258a36b062e

                            • C:\Users\Admin\AppData\Local\Temp\4672.exe

                              Filesize

                              352KB

                              MD5

                              0450fbfb26c4f37a9965814a632b02ce

                              SHA1

                              a24a358d46e0ffb55ab6f95d165bc275718eee15

                              SHA256

                              87a81819b988a608cedd75e459aeb82cde6448a81d6ad7666fd14d22f60520ab

                              SHA512

                              3c0af53f9c535cab0d634d47584c3bd19395911d3bb8241fa4835253eb1628af4fec88839e8c2a72d81b77ed22fe5b3ff52af1734b94e36b578668abedcbea84

                            • C:\Users\Admin\AppData\Local\Temp\4672.exe

                              Filesize

                              352KB

                              MD5

                              0450fbfb26c4f37a9965814a632b02ce

                              SHA1

                              a24a358d46e0ffb55ab6f95d165bc275718eee15

                              SHA256

                              87a81819b988a608cedd75e459aeb82cde6448a81d6ad7666fd14d22f60520ab

                              SHA512

                              3c0af53f9c535cab0d634d47584c3bd19395911d3bb8241fa4835253eb1628af4fec88839e8c2a72d81b77ed22fe5b3ff52af1734b94e36b578668abedcbea84

                            • C:\Users\Admin\AppData\Local\Temp\8958.exe

                              Filesize

                              2.5MB

                              MD5

                              27f20c2a1c93010d089ab8278b1bf550

                              SHA1

                              c8a94971f7777f835f5a0565b43f37cd212dfaba

                              SHA256

                              00abe64f9c24a1db29e1d470ab638d0cdd802984947fe0708e3f3e217e447afb

                              SHA512

                              5046f52f90cf4a5ccc4a2d1409d58b9a05f992172b61b909183d06466ad7913bcb849b4f23193617e4200cedf168bcb5f457260fc199566cf9f76e3300cfcaf7

                            • C:\Users\Admin\AppData\Local\Temp\8958.exe

                              Filesize

                              2.5MB

                              MD5

                              27f20c2a1c93010d089ab8278b1bf550

                              SHA1

                              c8a94971f7777f835f5a0565b43f37cd212dfaba

                              SHA256

                              00abe64f9c24a1db29e1d470ab638d0cdd802984947fe0708e3f3e217e447afb

                              SHA512

                              5046f52f90cf4a5ccc4a2d1409d58b9a05f992172b61b909183d06466ad7913bcb849b4f23193617e4200cedf168bcb5f457260fc199566cf9f76e3300cfcaf7

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

                              Filesize

                              1.6MB

                              MD5

                              72491c7b87a7c2dd350b727444f13bb4

                              SHA1

                              1e9338d56db7ded386878eab7bb44b8934ab1bc7

                              SHA256

                              34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                              SHA512

                              583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                              Filesize

                              458KB

                              MD5

                              619f7135621b50fd1900ff24aade1524

                              SHA1

                              6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                              SHA256

                              344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                              SHA512

                              2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

                              Filesize

                              2.1MB

                              MD5

                              cf318065099e0095bccfc4ef94cc9ffd

                              SHA1

                              8c1f34fd991e27d9e253cc284a4d5c9b09ae22d1

                              SHA256

                              993fbff9e2154d7fefa2ce1e6e8353664f478d52d6220ae62fce480abfc2c9c0

                              SHA512

                              274895848b4e6e56ebc9c20cc76783005baa4bdb8c7a6997fdefa9488394fdb7f8330e6da8a51843872b81a04c403497d6a81476db93761c2588873158e40daf

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

                              Filesize

                              3KB

                              MD5

                              0565aa10ef62b4a55e7ff36b79a5e956

                              SHA1

                              7c3d0924206d41c98dcfe3464a0f50981cef2250

                              SHA256

                              3fe32eaebb03b409fc0edaf8b9e269dae420ac107594232011ae1464b75239eb

                              SHA512

                              2541c3838cb4d229c91737a76289ee56bd436200123c3b427272e3064451eae9ed433c148ab6d3563dbad524014635923bd978bd78e8a991ba0a41699d18ddf3

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

                              Filesize

                              3KB

                              MD5

                              2d8e6084b20a9435d36817ec76c5f001

                              SHA1

                              576b68b2f2019896cc0b5169fd7a9bd308dd8b33

                              SHA256

                              009da3b14ef5f081fd65da62fd015b5944c6a7edaf21b245f04cf9338f9d25c3

                              SHA512

                              2971082839390a94b89123b7aae2ace44ddcb0a8b1bd9f1b865048a4b0dbc3bf87fc70199bfb96eb2ab27ca29e30146d70d7c4457dea1ec821628652fea30cb0

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

                              Filesize

                              1.5MB

                              MD5

                              ea11b6df352e2b75295b4532777de94a

                              SHA1

                              0a74dac011cbdee38d48f84d9bc8d794856c136c

                              SHA256

                              47abab88c18b1e6eba7c2c030deeb86c4263d836a2cec2faf670cfa2b9836274

                              SHA512

                              55d7d24cc61d051370c4d11e62dbfc79989bf20eb41aa714843924cc5118b454c9f44635ebd511efb1c01f471d3298327ce54a95377822c0e0182cde9aef3c0f

                            • C:\Users\Admin\AppData\Local\Temp\main\extracted\isaas.exe

                              Filesize

                              10KB

                              MD5

                              65a20c499e89107378d4808cd754948b

                              SHA1

                              583ae06054d46611f63b3dfcf68d807f4a1d711e

                              SHA256

                              20837c24531ede4a540d16688badcce8e2099a12c3f83afd6db6e4b838732185

                              SHA512

                              fca86b82b3646674a650e1edfdd059566daaef3b4ec0ca0077a736ea77990ebb495a8390b3b3e241533cf5eb42622ff8db58328b9f5a218a65991db6469e3bf6

                            • C:\Users\Admin\AppData\Local\Temp\main\file.bin

                              Filesize

                              1.5MB

                              MD5

                              a0775bb39005663389b83f59dba5a0d1

                              SHA1

                              11e3ffd5dd4176e889227a486c02a9ee7da77c27

                              SHA256

                              39fb83950cb95fc0fe73fbe1dccd83335d41e3931cb1b3470e9fa472bf291dcd

                              SHA512

                              f07ca16eb7cf42356db30b1b73e91cd831fb62c9be072ed578ab71f3d75adc846d737ffa9df8528f9bbeda608977707d3dc4273f136993b8d32fce7871c9de24

                            • C:\Users\Admin\AppData\Local\Temp\main\isaas.exe

                              Filesize

                              10KB

                              MD5

                              65a20c499e89107378d4808cd754948b

                              SHA1

                              583ae06054d46611f63b3dfcf68d807f4a1d711e

                              SHA256

                              20837c24531ede4a540d16688badcce8e2099a12c3f83afd6db6e4b838732185

                              SHA512

                              fca86b82b3646674a650e1edfdd059566daaef3b4ec0ca0077a736ea77990ebb495a8390b3b3e241533cf5eb42622ff8db58328b9f5a218a65991db6469e3bf6

                            • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                              Filesize

                              454B

                              MD5

                              f6ac3ac275370636a9d1011582f65699

                              SHA1

                              92c4350e6811e295b3f78dc23aab48d4aeaa119e

                              SHA256

                              a2a036641d182b94f67a872adff2d02244722623425215eff050bab90bd5b7d5

                              SHA512

                              7ff488a015cd6315a0f0eb1c91f0b158cbcdfe70fcb7046381e69b05abb525cb9be2811b60268dd412df975a6618e905ac834af88e95deaea09344c41047725d

                            • memory/1128-210-0x0000000005CE0000-0x0000000005FA3000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1128-192-0x0000000005CE0000-0x0000000005FA3000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1128-189-0x0000000005CE0000-0x0000000005FA3000-memory.dmp

                              Filesize

                              2.8MB

                            • memory/1328-156-0x0000000000900000-0x000000000090F000-memory.dmp

                              Filesize

                              60KB

                            • memory/1328-206-0x0000000000910000-0x0000000000919000-memory.dmp

                              Filesize

                              36KB

                            • memory/1328-155-0x0000000000910000-0x0000000000919000-memory.dmp

                              Filesize

                              36KB

                            • memory/1468-211-0x0000000000B80000-0x0000000000B85000-memory.dmp

                              Filesize

                              20KB

                            • memory/1468-195-0x0000000000B70000-0x0000000000B79000-memory.dmp

                              Filesize

                              36KB

                            • memory/1468-194-0x0000000000B80000-0x0000000000B85000-memory.dmp

                              Filesize

                              20KB

                            • memory/1664-132-0x000000000079E000-0x00000000007AE000-memory.dmp

                              Filesize

                              64KB

                            • memory/1664-133-0x0000000000580000-0x0000000000589000-memory.dmp

                              Filesize

                              36KB

                            • memory/1664-135-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/1664-134-0x0000000000400000-0x000000000043B000-memory.dmp

                              Filesize

                              236KB

                            • memory/3104-197-0x0000000000AD0000-0x0000000000AD6000-memory.dmp

                              Filesize

                              24KB

                            • memory/3104-198-0x0000000000AC0000-0x0000000000ACB000-memory.dmp

                              Filesize

                              44KB

                            • memory/3104-212-0x0000000000AD0000-0x0000000000AD6000-memory.dmp

                              Filesize

                              24KB

                            • memory/3108-183-0x00000000001B0000-0x00000000001B6000-memory.dmp

                              Filesize

                              24KB

                            • memory/3108-184-0x00000000001A0000-0x00000000001AC000-memory.dmp

                              Filesize

                              48KB

                            • memory/3108-208-0x00000000001B0000-0x00000000001B6000-memory.dmp

                              Filesize

                              24KB

                            • memory/3256-190-0x0000000000470000-0x0000000000492000-memory.dmp

                              Filesize

                              136KB

                            • memory/3256-191-0x0000000000440000-0x0000000000467000-memory.dmp

                              Filesize

                              156KB

                            • memory/3256-209-0x0000000000470000-0x0000000000492000-memory.dmp

                              Filesize

                              136KB

                            • memory/3516-203-0x0000000001100000-0x0000000001108000-memory.dmp

                              Filesize

                              32KB

                            • memory/3516-214-0x0000000001100000-0x0000000001108000-memory.dmp

                              Filesize

                              32KB

                            • memory/3516-204-0x00000000010F0000-0x00000000010FB000-memory.dmp

                              Filesize

                              44KB

                            • memory/4164-205-0x0000000001120000-0x0000000001127000-memory.dmp

                              Filesize

                              28KB

                            • memory/4164-152-0x0000000001120000-0x0000000001127000-memory.dmp

                              Filesize

                              28KB

                            • memory/4164-153-0x0000000001110000-0x000000000111B000-memory.dmp

                              Filesize

                              44KB

                            • memory/4652-207-0x0000000000A20000-0x0000000000A25000-memory.dmp

                              Filesize

                              20KB

                            • memory/4652-165-0x0000000000A20000-0x0000000000A25000-memory.dmp

                              Filesize

                              20KB

                            • memory/4652-167-0x0000000000A10000-0x0000000000A19000-memory.dmp

                              Filesize

                              36KB

                            • memory/4948-201-0x0000000000560000-0x000000000056D000-memory.dmp

                              Filesize

                              52KB

                            • memory/4948-200-0x0000000000570000-0x0000000000577000-memory.dmp

                              Filesize

                              28KB

                            • memory/4948-213-0x0000000000570000-0x0000000000577000-memory.dmp

                              Filesize

                              28KB