Analysis

  • max time kernel
    122s
  • max time network
    119s
  • resource
    win10v191014

General

  • Target

    d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc

  • Sample

    191025-blt53ekjex

  • SHA256

    d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc

Score
N/A

Malware Config

Signatures

  • Drops file in system dir 5 IoCs
  • Program crash 32 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Modifies system certificate store 2 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Modifies service 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc.exe
    "C:\Users\Admin\AppData\Local\Temp\d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Modifies system certificate store
    • Adds Run entry to start application
    PID:5000
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k WerSvcGroup
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    PID:1920
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:292
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 864
    1⤵
    • Program crash
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Checks system information in the registry (likely anti-VM)
    PID:324
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:1688
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
      1⤵
        PID:2072
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
        1⤵
          PID:3088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 884
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4628
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 888
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 940
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1108
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:3792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1148
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1468
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1704
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1692
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:4616
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1720
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:3016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1424
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1420
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:828
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1744
          1⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Checks system information in the registry (likely anti-VM)
          PID:3768
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\65d93abd-5b44-4787-b20a-693057c33140" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          1⤵
            PID:4708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1828
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:3896
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1704
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:4668
          • C:\Users\Admin\AppData\Local\Temp\d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc.exe
            "C:\Users\Admin\AppData\Local\Temp\d95a38a7c3ba130e354926102de8f64986d8248ee095e5e410d6ee410d74e0bc.exe" --Admin IsNotAutoStart IsNotTask
            1⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4780
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 820
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:4256
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 868
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:4224
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 932
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:3844
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1048
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:2316
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1096
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:3328
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1064
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:3396
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1160
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:1504
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1252
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:1924
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1472
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:2492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1568
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:4568
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1520
            1⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks system information in the registry (likely anti-VM)
            PID:3812
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s BITS
            1⤵
            • Drops file in system dir
            • Modifies service
            PID:4400
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
            1⤵
              PID:4408
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
              1⤵
              • Checks system information in the registry (likely anti-VM)
              PID:4912
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
              1⤵
              • Windows security modification
              PID:5112
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k unistacksvcgroup
              1⤵
                PID:5096
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1516
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Checks system information in the registry (likely anti-VM)
                PID:4772
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1504
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Checks system information in the registry (likely anti-VM)
                PID:4676
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1392
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Checks system information in the registry (likely anti-VM)
                PID:1060
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1628
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Checks system information in the registry (likely anti-VM)
                PID:992
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1668
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Checks system information in the registry (likely anti-VM)
                PID:1584
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1552
                1⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4968

              Network

              MITRE ATT&CK Enterprise v15

              MITRE ATT&CK Additional techniques

              • T1130
              • T1060
              • T1031
              • T1089

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/324-8-0x0000000004A50000-0x0000000004A51000-memory.dmp

                Filesize

                4KB

              • memory/324-5-0x00000000048B0000-0x00000000048B1000-memory.dmp

                Filesize

                4KB

              • memory/324-3-0x00000000040F0000-0x00000000040F1000-memory.dmp

                Filesize

                4KB

              • memory/324-2-0x00000000040F0000-0x00000000040F1000-memory.dmp

                Filesize

                4KB

              • memory/756-163-0x00000000059D0000-0x00000000059D1000-memory.dmp

                Filesize

                4KB

              • memory/756-166-0x0000000005AC0000-0x0000000005AC1000-memory.dmp

                Filesize

                4KB

              • memory/756-160-0x00000000051A0000-0x00000000051A1000-memory.dmp

                Filesize

                4KB

              • memory/772-106-0x00000000048C0000-0x00000000048C1000-memory.dmp

                Filesize

                4KB

              • memory/772-113-0x0000000002E90000-0x0000000002E91000-memory.dmp

                Filesize

                4KB

              • memory/772-112-0x00000000052A0000-0x00000000052A1000-memory.dmp

                Filesize

                4KB

              • memory/772-109-0x00000000050F0000-0x00000000050F1000-memory.dmp

                Filesize

                4KB

              • memory/828-173-0x00000000051D0000-0x00000000051D1000-memory.dmp

                Filesize

                4KB

              • memory/828-176-0x00000000052C0000-0x00000000052C1000-memory.dmp

                Filesize

                4KB

              • memory/992-548-0x0000000005280000-0x0000000005281000-memory.dmp

                Filesize

                4KB

              • memory/992-551-0x0000000005370000-0x0000000005371000-memory.dmp

                Filesize

                4KB

              • memory/992-545-0x0000000004880000-0x0000000004881000-memory.dmp

                Filesize

                4KB

              • memory/1060-535-0x0000000004790000-0x0000000004791000-memory.dmp

                Filesize

                4KB

              • memory/1060-538-0x0000000005050000-0x0000000005051000-memory.dmp

                Filesize

                4KB

              • memory/1060-541-0x0000000005210000-0x0000000005211000-memory.dmp

                Filesize

                4KB

              • memory/1504-449-0x0000000004C20000-0x0000000004C21000-memory.dmp

                Filesize

                4KB

              • memory/1504-455-0x0000000005390000-0x0000000005391000-memory.dmp

                Filesize

                4KB

              • memory/1504-452-0x0000000005290000-0x0000000005291000-memory.dmp

                Filesize

                4KB

              • memory/1584-676-0x0000000004F20000-0x0000000004F21000-memory.dmp

                Filesize

                4KB

              • memory/1584-556-0x0000000004560000-0x0000000004561000-memory.dmp

                Filesize

                4KB

              • memory/1584-559-0x0000000004E30000-0x0000000004E31000-memory.dmp

                Filesize

                4KB

              • memory/1924-459-0x0000000004570000-0x0000000004571000-memory.dmp

                Filesize

                4KB

              • memory/1924-465-0x0000000004E90000-0x0000000004E91000-memory.dmp

                Filesize

                4KB

              • memory/1924-462-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

                Filesize

                4KB

              • memory/2316-339-0x00000000048F0000-0x00000000048F1000-memory.dmp

                Filesize

                4KB

              • memory/2316-336-0x00000000041E0000-0x00000000041E1000-memory.dmp

                Filesize

                4KB

              • memory/2316-342-0x0000000004A60000-0x0000000004A61000-memory.dmp

                Filesize

                4KB

              • memory/2492-474-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

                Filesize

                4KB

              • memory/2492-480-0x0000000005AC0000-0x0000000005AC1000-memory.dmp

                Filesize

                4KB

              • memory/2492-477-0x0000000005960000-0x0000000005961000-memory.dmp

                Filesize

                4KB

              • memory/3016-149-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-128-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-131-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-133-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-125-0x00000000045F0000-0x00000000045F1000-memory.dmp

                Filesize

                4KB

              • memory/3016-135-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-137-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-139-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-141-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-142-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-144-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-145-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-146-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-148-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-150-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-156-0x00000000050F0000-0x00000000050F1000-memory.dmp

                Filesize

                4KB

              • memory/3016-155-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-153-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3016-152-0x00000000050C0000-0x00000000050C1000-memory.dmp

                Filesize

                4KB

              • memory/3328-348-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                Filesize

                4KB

              • memory/3328-399-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

                Filesize

                4KB

              • memory/3328-345-0x00000000045B0000-0x00000000045B1000-memory.dmp

                Filesize

                4KB

              • memory/3396-444-0x0000000005120000-0x0000000005121000-memory.dmp

                Filesize

                4KB

              • memory/3396-407-0x0000000005020000-0x0000000005021000-memory.dmp

                Filesize

                4KB

              • memory/3396-404-0x0000000004770000-0x0000000004771000-memory.dmp

                Filesize

                4KB

              • memory/3768-180-0x0000000004890000-0x0000000004891000-memory.dmp

                Filesize

                4KB

              • memory/3768-268-0x0000000005320000-0x0000000005321000-memory.dmp

                Filesize

                4KB

              • memory/3768-183-0x0000000005230000-0x0000000005231000-memory.dmp

                Filesize

                4KB

              • memory/3792-42-0x0000000004C80000-0x0000000004C81000-memory.dmp

                Filesize

                4KB

              • memory/3792-45-0x00000000053B0000-0x00000000053B1000-memory.dmp

                Filesize

                4KB

              • memory/3792-48-0x00000000054B0000-0x00000000054B1000-memory.dmp

                Filesize

                4KB

              • memory/3812-500-0x0000000005860000-0x0000000005861000-memory.dmp

                Filesize

                4KB

              • memory/3812-497-0x0000000005760000-0x0000000005761000-memory.dmp

                Filesize

                4KB

              • memory/3812-494-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                Filesize

                4KB

              • memory/3844-331-0x00000000050D0000-0x00000000050D1000-memory.dmp

                Filesize

                4KB

              • memory/3844-325-0x0000000004720000-0x0000000004721000-memory.dmp

                Filesize

                4KB

              • memory/3844-328-0x0000000004FE0000-0x0000000004FE1000-memory.dmp

                Filesize

                4KB

              • memory/3896-276-0x0000000005580000-0x0000000005581000-memory.dmp

                Filesize

                4KB

              • memory/3896-273-0x0000000004D00000-0x0000000004D01000-memory.dmp

                Filesize

                4KB

              • memory/3896-287-0x0000000005720000-0x0000000005721000-memory.dmp

                Filesize

                4KB

              • memory/4124-63-0x00000000051B0000-0x00000000051B1000-memory.dmp

                Filesize

                4KB

              • memory/4124-101-0x0000000005330000-0x0000000005331000-memory.dmp

                Filesize

                4KB

              • memory/4124-60-0x0000000004780000-0x0000000004781000-memory.dmp

                Filesize

                4KB

              • memory/4224-314-0x0000000004960000-0x0000000004961000-memory.dmp

                Filesize

                4KB

              • memory/4224-320-0x0000000005240000-0x0000000005241000-memory.dmp

                Filesize

                4KB

              • memory/4224-317-0x0000000005150000-0x0000000005151000-memory.dmp

                Filesize

                4KB

              • memory/4256-306-0x0000000005170000-0x0000000005171000-memory.dmp

                Filesize

                4KB

              • memory/4256-309-0x0000000005260000-0x0000000005261000-memory.dmp

                Filesize

                4KB

              • memory/4256-303-0x00000000048E0000-0x00000000048E1000-memory.dmp

                Filesize

                4KB

              • memory/4380-57-0x0000000005260000-0x0000000005261000-memory.dmp

                Filesize

                4KB

              • memory/4380-54-0x0000000005170000-0x0000000005171000-memory.dmp

                Filesize

                4KB

              • memory/4380-51-0x0000000004A90000-0x0000000004A91000-memory.dmp

                Filesize

                4KB

              • memory/4568-484-0x0000000004210000-0x0000000004211000-memory.dmp

                Filesize

                4KB

              • memory/4568-490-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                Filesize

                4KB

              • memory/4568-487-0x0000000004D80000-0x0000000004D81000-memory.dmp

                Filesize

                4KB

              • memory/4616-119-0x0000000004C50000-0x0000000004C51000-memory.dmp

                Filesize

                4KB

              • memory/4616-122-0x0000000004D60000-0x0000000004D61000-memory.dmp

                Filesize

                4KB

              • memory/4616-116-0x00000000040D0000-0x00000000040D1000-memory.dmp

                Filesize

                4KB

              • memory/4628-12-0x0000000004800000-0x0000000004801000-memory.dmp

                Filesize

                4KB

              • memory/4628-15-0x0000000004FC0000-0x0000000004FC1000-memory.dmp

                Filesize

                4KB

              • memory/4628-18-0x00000000050B0000-0x00000000050B1000-memory.dmp

                Filesize

                4KB

              • memory/4656-22-0x0000000004910000-0x0000000004911000-memory.dmp

                Filesize

                4KB

              • memory/4656-25-0x0000000005040000-0x0000000005041000-memory.dmp

                Filesize

                4KB

              • memory/4656-28-0x00000000051A0000-0x00000000051A1000-memory.dmp

                Filesize

                4KB

              • memory/4668-298-0x0000000005800000-0x0000000005801000-memory.dmp

                Filesize

                4KB

              • memory/4668-295-0x00000000056F0000-0x00000000056F1000-memory.dmp

                Filesize

                4KB

              • memory/4668-292-0x0000000004C60000-0x0000000004C61000-memory.dmp

                Filesize

                4KB

              • memory/4676-528-0x00000000051E0000-0x00000000051E1000-memory.dmp

                Filesize

                4KB

              • memory/4676-531-0x00000000053B0000-0x00000000053B1000-memory.dmp

                Filesize

                4KB

              • memory/4676-525-0x0000000004820000-0x0000000004821000-memory.dmp

                Filesize

                4KB

              • memory/4752-37-0x00000000053C0000-0x00000000053C1000-memory.dmp

                Filesize

                4KB

              • memory/4752-31-0x0000000004B80000-0x0000000004B81000-memory.dmp

                Filesize

                4KB

              • memory/4752-34-0x00000000052D0000-0x00000000052D1000-memory.dmp

                Filesize

                4KB

              • memory/4772-503-0x0000000004E40000-0x0000000004E41000-memory.dmp

                Filesize

                4KB

              • memory/4772-521-0x0000000005890000-0x0000000005891000-memory.dmp

                Filesize

                4KB

              • memory/4780-302-0x00000000053A0000-0x00000000053A1000-memory.dmp

                Filesize

                4KB

              • memory/4968-681-0x0000000004D40000-0x0000000004D41000-memory.dmp

                Filesize

                4KB

              • memory/4968-684-0x0000000005710000-0x0000000005711000-memory.dmp

                Filesize

                4KB

              • memory/4968-701-0x0000000005800000-0x0000000005801000-memory.dmp

                Filesize

                4KB

              • memory/5000-1-0x00000000054F0000-0x00000000054F1000-memory.dmp

                Filesize

                4KB