Analysis

  • max time kernel
    166s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2023 08:08

General

  • Target

    821af69b1a2b6f632623612fea5037d5e79133fa530ff1b800daab60657b8109.exe

  • Size

    258KB

  • MD5

    41fd2f0598c3465dac7f618c9fb9e6ab

  • SHA1

    6442aeb994fa61edda5574207f7c4e0c8d149cfc

  • SHA256

    821af69b1a2b6f632623612fea5037d5e79133fa530ff1b800daab60657b8109

  • SHA512

    d15ea74fc7821928ea3c3e92d0599cd460629e4373ca82d4dc0eb48b7bfb93d3355bc4cf98d92f9e36c7b7bc0928af56412c80d480d99871d70c0319455708ec

  • SSDEEP

    6144:MFeIlLGa14PWmIBeDfighEiVWtqtU4zqQna:MFe6aa2PosTHELtqtFP

Malware Config

Extracted

Family

lumma

C2

77.73.134.68

Signatures

  • Detects Smokeloader packer 2 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 16 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\821af69b1a2b6f632623612fea5037d5e79133fa530ff1b800daab60657b8109.exe
    "C:\Users\Admin\AppData\Local\Temp\821af69b1a2b6f632623612fea5037d5e79133fa530ff1b800daab60657b8109.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4884
  • C:\Users\Admin\AppData\Local\Temp\50EA.exe
    C:\Users\Admin\AppData\Local\Temp\50EA.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp",Qowsuiaedfeupa
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Checks processor information in registry
      PID:2604
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 18664
        3⤵
          PID:2372
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 572
        2⤵
        • Program crash
        PID:3628
    • C:\Users\Admin\AppData\Local\Temp\851A.exe
      C:\Users\Admin\AppData\Local\Temp\851A.exe
      1⤵
      • Executes dropped EXE
      PID:2060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 1324
        2⤵
        • Program crash
        PID:1944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2368 -ip 2368
      1⤵
        PID:1716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2060 -ip 2060
        1⤵
          PID:2244
        • C:\Windows\SysWOW64\svchost.exe
          C:\Windows\SysWOW64\svchost.exe -k LocalService
          1⤵
            PID:4916
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "c:\program files (x86)\windowspowershell\modules\license.dll",fjVJ
              2⤵
                PID:4336

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\WindowsPowerShell\Modules\LICENSE.dll
              Filesize

              774KB

              MD5

              c4b95584ce0b377d3aa262994ead216b

              SHA1

              6111672be66a672e84fa2c10210892abe7f27f8a

              SHA256

              bd432803fb128896ab244ddb4427b57be5db13e9a075976e0d57963f9ed1b26a

              SHA512

              0ccbf36735dfb68e54b1dda80b39a0b4b9f8717e93a4c735b5fbcf3196580f7830e535ca0cffa9df588ca6da2025a54da06fa8caa01a987e60c16c23c9c5f3b7

            • C:\Program Files (x86)\WindowsPowerShell\Modules\LICENSE.dll
              Filesize

              774KB

              MD5

              c4b95584ce0b377d3aa262994ead216b

              SHA1

              6111672be66a672e84fa2c10210892abe7f27f8a

              SHA256

              bd432803fb128896ab244ddb4427b57be5db13e9a075976e0d57963f9ed1b26a

              SHA512

              0ccbf36735dfb68e54b1dda80b39a0b4b9f8717e93a4c735b5fbcf3196580f7830e535ca0cffa9df588ca6da2025a54da06fa8caa01a987e60c16c23c9c5f3b7

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\2F1A6504-0641-44CF-8BB5-3612D865F2E5.vsch
              Filesize

              110B

              MD5

              37a1115747e63e1c0ead2c66301f22d3

              SHA1

              44339aa5b475ecc2669a69fa1850ffcbf6fc666e

              SHA256

              9496889b2cbda0bcb85b8ef91dc323107702c214ee37a7c1057b8fc9c8874589

              SHA512

              6ecc4b9f1d08bccc3f1ae111391e83b8a1ae3788f532ae3afac5ed91823891aaf6a56385e3856910730d312d5374c779bdab7760d82a685ee99c077a3180357d

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\C2RManifest.dcfmui.msi.16.en-us.xml
              Filesize

              9KB

              MD5

              2693cb4d0d47298d60c5b4210d567e56

              SHA1

              20b67bce8310a93c5756d83d13febdcaff5f3b39

              SHA256

              d98dec16b13c3e4a23823be0bcd45f685c6dc690ae28954c0c18075e77898f20

              SHA512

              034cb9620ea7f9aa793ad8e0c8e30b11244e7952d871d1f8cbb1ff6daa765fd9afc2a54f221f0a323511f4aa7b985ff61c2f0b983668c7e390f3f99699dc89c9

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.BioEnrollment_10.0.19041.1023_neutral__cw5n1h2txyewy.xml
              Filesize

              3KB

              MD5

              3e0786e68ac00141fd51790c561c60ef

              SHA1

              96f2bdc8310d74e466bd8ef0931baaa2f276de03

              SHA256

              1545f3cf4b4c17d52c387e560dcb777e1748757c1dbb18788080d9dac64a82a6

              SHA512

              cdcecba2775b627e9e6fce205166e2f0f9af9550ed838689c586c707c29d6d7e7a5daa03814b0c95f5da3b8b2d2366b77e5011a8cad8fac448feaa96679353f2

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe.xml
              Filesize

              843B

              MD5

              8a33c96712ba9c043f7a07d4c437a3fd

              SHA1

              dbd78a66c461017ee26a751925f9cecdea2590da

              SHA256

              eb8b0de59dd2efc380f7081af8975f37a83ee72c9c06ef25873f63d224adea1e

              SHA512

              7b9a15d219e4a5cd9146f8e7ae1d7c3b6f843ed060edf52e4928e349edd821a2d527f8f8402f774559f6cf282c83b751f02d2feaf9e040771c07bc4038a59e5a

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe.xml
              Filesize

              5KB

              MD5

              1944801cae061223e36fcce6aed6bfba

              SHA1

              b465c53f3e6ae74fac368f36cbfc5842ce085e14

              SHA256

              b903a7f4408a27d0b7a7c6316d04952508d67058216dffeca4293c9352727959

              SHA512

              82b0e3b1105a5d802839c3ea78b4e2dd800b819ee678d016b2f47203ceb27a638d195909ec1d0efbf46edbf910409d7ab4a05146fc902ef335b36bf14339498f

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe.xml
              Filesize

              15KB

              MD5

              2f71d0396b93381c1fd86bf822612868

              SHA1

              d0801700dd00a51276f32c6ed19f5b713b5db825

              SHA256

              0543ea8c8efce3d69431f57affc2cfa44df1b9244a25ed080e4b2014d0419026

              SHA512

              67022ce5c41641799abff9e68cb3f049c5d932aea5c6fd8748469e2e7f51f987f1bdfc7d831a8d11a69d99a77cc363c51db8be6ad50e4014eb63a15c1f25a722

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftInternetExplorer2013Backup.xml
              Filesize

              2KB

              MD5

              16fa6bd16573d544916a2cb3335a1f13

              SHA1

              479c5b9375b5b351d7dc217deb159fe92da03f75

              SHA256

              37e639679abd36b5b59324eea7aa1d602ff9c287e5c07dfd335ee1a85b68fc50

              SHA512

              9a871284356b2217fc8dbd568c6731def7781cac4550e77824f5c683b29313cd46e444760413ec730e8f70669ff08b62ab9b73c8099115a71eb84d7d728e2873

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftLync2013Win32.xml
              Filesize

              2KB

              MD5

              fa5b7d129ddfd18b73d3a4a0b0fb4c87

              SHA1

              b5e32bd5772cfb50174451d4818670d32088ff85

              SHA256

              4452719f5b16e474e6ae407fb56f7e68f0308920938d749a4d46cded948c116d

              SHA512

              99fd882c7f9a333143367e09590b9c71c9aa3957205a2dd26097ae88a54265d7272968ec99c755ef6d7741ff8e690b53492321b42129c990c870beb6322eb034

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftOffice2010Win32.xml
              Filesize

              71KB

              MD5

              b08a8c2f6941a1a12aa05180aec1dbb9

              SHA1

              c09f9207502aca3866b182d79221addcca76f4d1

              SHA256

              843f89d7b8b11907ee5dea2e0108dbb10ce3883d3b7505c55f4e1082db879d3f

              SHA512

              8de3748bd731835154f3d371ca0174c2b17da64fd39d479b132947304e6ff1d7f95e344aad64b6b9aa831ae37b3ed00d3a05efaf6aed67619e9d69a1e9b89bf7

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftOffice2013Win32.xml
              Filesize

              66KB

              MD5

              d6269a771887562b5461c9a99bcfeacd

              SHA1

              d4f5647c655af50453e2097eb3e8552318f139a1

              SHA256

              58e3a955ba9293be903e880620c559bcd4f5b8069c3c23a3f06a9c549ed621d1

              SHA512

              18b23fea2436cd1c6ac8dd159660f386694abe0d6c2e5bca15e11bbf9da06a620bc4c759af1b5646bed8086576369b051bec0f41837127738bebce9f13b9dc30

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftOffice2016BackupWin32.xml
              Filesize

              12KB

              MD5

              ffbc41d3c63bccdca27c2c88ab0e85c4

              SHA1

              f3923962734058dc0b91515b2981d1eb33f8a8dd

              SHA256

              caf2eef3b42d36b4d6d4a24597557a7feada559e99abedb56287248286531dea

              SHA512

              9da5dd978c9faa7de1552117207fb694e97f895b054a457ffe0b9444251e7203774b142ee558317136dd8f240c12f7309b137eb930417c181c404f8318a3f8fa

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\MicrosoftOffice2016Win32.xml
              Filesize

              64KB

              MD5

              fb54ecf5bbc8554d4218fce2b5863f04

              SHA1

              5a43e92271d69b66f97c12d977c10bc78991f76f

              SHA256

              bc964a0306fbeca377d20bafd127425c0700ee293a2c5caf9b28285f1b1d75e5

              SHA512

              c13e3d7c8801b9a865952708af0fe4272e2034be0ebc40e94f4bdccd13b3075ef8d2b5ec8af68d51fe11d87ce84183275d031390aa00e6cefd02407a03436a40

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\OfficeIntegrator.ps1
              Filesize

              4KB

              MD5

              552d7c9707f6dedc9b275df20cfda14f

              SHA1

              6dfa65a6e2ab94e19deb7cac003674cc2bb4bcd7

              SHA256

              6e28d25e4b520aab2f2fd0983f62bae3cd8730cc07e003c1efd5cf635df474b2

              SHA512

              2fe977ef79afb53afd1ea5ba06453706c27c61f31125f9f5089eedad7211195bfcd3ea5c97e4a2a25bd82fa512cb16265e4e7c04fa54a06e3af6380e2a68d91c

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\StorageHealthModel.dat
              Filesize

              542KB

              MD5

              1ffbb6bf6ac240feb3fada4eedbe5310

              SHA1

              3f8ef6d47bda2b464024e8d09577591fab2685d7

              SHA256

              c09e4425d87b888993f114755887611f68d351961e429628b952b9b62b49ef5a

              SHA512

              18c37c2c207664a231144dced3f8a4b97c3787da1174c08f357d9d6e80ae5cd68bcaf2c89062371b40ac9d235a882053bb80d46c28ff7f4e85c2ab25dc5a7081

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\ThemeSettings2013.xml
              Filesize

              2KB

              MD5

              986d31966b8370330842dc0cd8eac1f1

              SHA1

              3e96a8f449cc3930a0cec85f2e24190452b058eb

              SHA256

              56e478dcefd0863a8af9edb7d4f8bc746d077e5f5df637bad19e66cbbbe20cb0

              SHA512

              7ed19b3eeeb35882795a3d4a20193b9a60e905ea855704afdc5ea7e3b27c3d954061ba04eff5ed9f7cf44aff7c9b4f443c74cfd6088027fb830ad49c59eceefd

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\Uqioyhuair.tmp
              Filesize

              3.5MB

              MD5

              72370243e39cc1be332ebfd108b1f199

              SHA1

              10afa0031571ab2f726f86e597f7035af111d2e8

              SHA256

              cdce368cd9218b110754c03025034977f36bf0ca89fedd782774fe45ba666e08

              SHA512

              274cc1618d1519d2240a37addf64eb4acbd7b50f88c44f249781740235f21d2659bfb357d6a3b4ec721e572abf4f8755d5dd3b3a60953460f7029e3e809b9267

            • C:\ProgramData\{AD22A7C3-A288-2107-49C0-5B9511BAC117}\qmgr.db
              Filesize

              768KB

              MD5

              4971c0d85e76b1cc9df46690610be7d6

              SHA1

              47278a5111bf5a2306e2b245fbc9549f64a02daf

              SHA256

              27e40df62eaea83a016be240c6e3bba8434dc9a030e4931b5c1ff49655e2c579

              SHA512

              24ea2831819e4ea0a64d33dc9e9d1222d1a77a2194a18b6ff811a79025a0996ece46775f3d252e1e83d2bfda199d4b8a97a1efe1f136a05162160c60996714a3

            • C:\Users\Admin\AppData\Local\Temp\50EA.exe
              Filesize

              1.1MB

              MD5

              dcbea7655543025cd758fdefafd76cde

              SHA1

              b4075079fc7b3db2373b2d8d0ee07415a146132e

              SHA256

              e1e3a78fe3a7f1551fd630cf185d4a4403c09f3a460ac05882ce725b74d34aa5

              SHA512

              908d63121ec4720d51a3499fe1e54b69180f7496547dffa011063e3e7ae2e57aa6c103a5277d0ffcda8d46b7b82fa2e77a09295c5c7509a81dd09021e47443b6

            • C:\Users\Admin\AppData\Local\Temp\50EA.exe
              Filesize

              1.1MB

              MD5

              dcbea7655543025cd758fdefafd76cde

              SHA1

              b4075079fc7b3db2373b2d8d0ee07415a146132e

              SHA256

              e1e3a78fe3a7f1551fd630cf185d4a4403c09f3a460ac05882ce725b74d34aa5

              SHA512

              908d63121ec4720d51a3499fe1e54b69180f7496547dffa011063e3e7ae2e57aa6c103a5277d0ffcda8d46b7b82fa2e77a09295c5c7509a81dd09021e47443b6

            • C:\Users\Admin\AppData\Local\Temp\851A.exe
              Filesize

              276KB

              MD5

              c16ba0f2004c45a448d524867b6dfac5

              SHA1

              4511810aaa7ce1542ee94adf00e4f510025a189d

              SHA256

              6b8838ea9bff0a51596fe3c2b77b3b0a5402c23cc87692d3648d8f4a28ce705d

              SHA512

              460237872e9bcf0e70f3d719b7321171f6969bbb3dac1d1d744b8be590a59f9fcba3cb1331e7c19448f4c4f45a340dd704209154e87f20fcdc80d0b8489a50cc

            • C:\Users\Admin\AppData\Local\Temp\851A.exe
              Filesize

              276KB

              MD5

              c16ba0f2004c45a448d524867b6dfac5

              SHA1

              4511810aaa7ce1542ee94adf00e4f510025a189d

              SHA256

              6b8838ea9bff0a51596fe3c2b77b3b0a5402c23cc87692d3648d8f4a28ce705d

              SHA512

              460237872e9bcf0e70f3d719b7321171f6969bbb3dac1d1d744b8be590a59f9fcba3cb1331e7c19448f4c4f45a340dd704209154e87f20fcdc80d0b8489a50cc

            • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp
              Filesize

              774KB

              MD5

              e06fb66bfbe1444cc091f0297b8d32db

              SHA1

              c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

              SHA256

              b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

              SHA512

              c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

            • C:\Users\Admin\AppData\Local\Temp\Sdaaysrpyefiy.tmp
              Filesize

              774KB

              MD5

              e06fb66bfbe1444cc091f0297b8d32db

              SHA1

              c3e13e3edcbbf30cdc51ce96cc7a802fc88e83af

              SHA256

              b282eb3f05d375d3487d20596d783fa52aa27013e8b2b407db32d9a3a751319d

              SHA512

              c639b62f417d46148c3a84ae5ff2cc7018c653424cc1d643a983c41d4a12f6015df0f4359c5e078c2c3e5b1d42de18acfb6aab432266a8c4e37aa5449e961d95

            • \??\c:\program files (x86)\windowspowershell\modules\license.dll
              Filesize

              774KB

              MD5

              c4b95584ce0b377d3aa262994ead216b

              SHA1

              6111672be66a672e84fa2c10210892abe7f27f8a

              SHA256

              bd432803fb128896ab244ddb4427b57be5db13e9a075976e0d57963f9ed1b26a

              SHA512

              0ccbf36735dfb68e54b1dda80b39a0b4b9f8717e93a4c735b5fbcf3196580f7830e535ca0cffa9df588ca6da2025a54da06fa8caa01a987e60c16c23c9c5f3b7

            • memory/2060-154-0x00000000007FD000-0x0000000000817000-memory.dmp
              Filesize

              104KB

            • memory/2060-155-0x0000000000400000-0x000000000044B000-memory.dmp
              Filesize

              300KB

            • memory/2060-156-0x0000000000400000-0x000000000044B000-memory.dmp
              Filesize

              300KB

            • memory/2060-151-0x0000000000400000-0x000000000044B000-memory.dmp
              Filesize

              300KB

            • memory/2060-150-0x00000000007B0000-0x00000000007DA000-memory.dmp
              Filesize

              168KB

            • memory/2060-149-0x00000000007FD000-0x0000000000817000-memory.dmp
              Filesize

              104KB

            • memory/2060-144-0x0000000000000000-mapping.dmp
            • memory/2368-148-0x0000000000400000-0x0000000000530000-memory.dmp
              Filesize

              1.2MB

            • memory/2368-157-0x0000000000400000-0x0000000000530000-memory.dmp
              Filesize

              1.2MB

            • memory/2368-138-0x0000000000000000-mapping.dmp
            • memory/2368-141-0x0000000002099000-0x0000000002182000-memory.dmp
              Filesize

              932KB

            • memory/2368-142-0x0000000002430000-0x000000000255E000-memory.dmp
              Filesize

              1.2MB

            • memory/2368-143-0x0000000000400000-0x0000000000530000-memory.dmp
              Filesize

              1.2MB

            • memory/2372-167-0x00007FF71EA46890-mapping.dmp
            • memory/2372-168-0x0000025688140000-0x0000025688280000-memory.dmp
              Filesize

              1.2MB

            • memory/2372-169-0x0000025688140000-0x0000025688280000-memory.dmp
              Filesize

              1.2MB

            • memory/2372-170-0x0000000000310000-0x00000000005B4000-memory.dmp
              Filesize

              2.6MB

            • memory/2372-171-0x00000256866E0000-0x0000025686995000-memory.dmp
              Filesize

              2.7MB

            • memory/2604-164-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/2604-163-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/2604-160-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/2604-159-0x0000000005AF0000-0x0000000006645000-memory.dmp
              Filesize

              11.3MB

            • memory/2604-158-0x0000000005AF0000-0x0000000006645000-memory.dmp
              Filesize

              11.3MB

            • memory/2604-162-0x0000000005AF0000-0x0000000006645000-memory.dmp
              Filesize

              11.3MB

            • memory/2604-165-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/2604-147-0x0000000000000000-mapping.dmp
            • memory/2604-166-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/2604-161-0x0000000005170000-0x00000000052B0000-memory.dmp
              Filesize

              1.2MB

            • memory/4336-192-0x0000000000000000-mapping.dmp
            • memory/4884-132-0x000000000068E000-0x00000000006A4000-memory.dmp
              Filesize

              88KB

            • memory/4884-137-0x0000000000400000-0x0000000000446000-memory.dmp
              Filesize

              280KB

            • memory/4884-136-0x00000000005E0000-0x00000000005E9000-memory.dmp
              Filesize

              36KB

            • memory/4884-135-0x000000000068E000-0x00000000006A4000-memory.dmp
              Filesize

              88KB

            • memory/4884-134-0x0000000000400000-0x0000000000446000-memory.dmp
              Filesize

              280KB

            • memory/4884-133-0x00000000005E0000-0x00000000005E9000-memory.dmp
              Filesize

              36KB

            • memory/4916-175-0x00000000044D0000-0x0000000005025000-memory.dmp
              Filesize

              11.3MB

            • memory/4916-194-0x00000000044D0000-0x0000000005025000-memory.dmp
              Filesize

              11.3MB