Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    09-08-2022 21:14

General

  • Target

    04214b7cb6d6f1852d2b758e7dc41f79.exe

  • Size

    22KB

  • MD5

    04214b7cb6d6f1852d2b758e7dc41f79

  • SHA1

    09caf41f3ed70db23b39351fdd1dc657bcdc42fd

  • SHA256

    9ad8f4fc26ee9bb73266916caed4bf50100f308cb3cad13b62b3a5fe5c93c749

  • SHA512

    42ee1b27ecb6511fa96d8450a5511b46f738e45efe40623b8be1c857d0f00a72b3e25c3054d0174b15bee624b123b860ae68890e7f0e12ea49916f11edf81362

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 3 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04214b7cb6d6f1852d2b758e7dc41f79.exe
    "C:\Users\Admin\AppData\Local\Temp\04214b7cb6d6f1852d2b758e7dc41f79.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\04214b7cb6d6f1852d2b758e7dc41f79.exe
      C:\Users\Admin\AppData\Local\Temp\04214b7cb6d6f1852d2b758e7dc41f79.exe
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
        "C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
          C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
          4⤵
          • Executes dropped EXE
          PID:1664
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:764
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:704
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:704 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1756
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1612
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:584
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1716
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:280
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1596 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1216
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:792 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1904
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1112 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1560
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:868 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1600
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1032 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1632
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1720
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:272
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:272 CREDAT:275457 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    Filesize

    717B

    MD5

    ec8ff3b1ded0246437b1472c69dd1811

    SHA1

    d813e874c2524e3a7da6c466c67854ad16800326

    SHA256

    e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab

    SHA512

    e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\11F116679BA92DFC5123F33E11880057
    Filesize

    503B

    MD5

    a36ef19dca766f6eb73e74b31d773955

    SHA1

    9e0349f07e2426a1df465cb7690a474df5576a86

    SHA256

    559391b7d720dcfa5545f2b34025d46bafd4d8d6887a325432ced4e94aa1cf9c

    SHA512

    8118c60a4e89545b5dbb5daed00ddc68806a784c12d81bd853b8e8269a7a2c74c008a4c25da33260a1b8713e6e606fd5331ba3c0d6ff752098a1d3c065966955

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    Filesize

    192B

    MD5

    3c7e49ac9607c6aa689f755e93622270

    SHA1

    8817d6fb873467a9e71c617d86abaf7c0d44dea2

    SHA256

    feeb54e21cfe28f6ef95fde8dc25bf6f51082c0ffec6257488f01af8384c064e

    SHA512

    8a09952e71e43e30ca5da6520222ef1414db12ac29f4cb42e2ae8480a61f3211727e133584e9cd4ab67d8c3b194ef0ed3f7645a100acda752ea1377d0b9c945b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\11F116679BA92DFC5123F33E11880057
    Filesize

    548B

    MD5

    e9c48d643d627bc65dbd31c91f30c54b

    SHA1

    c643a7c19a404c7f3346316c9a974c00a56b47a6

    SHA256

    60bb356cb21aa84399db4f768103825d321b70e67e4a1b890f474d29ca644a29

    SHA512

    7c1cd9a085008871300cf4e334dc394acbef6efc90e7058f2415e02051bba69c02c7f88288c14bb94e05cc0a484ba1ee64f7ef972f213046b1e1baffffb295fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    da05f59adb156623245bf61078a2b23a

    SHA1

    f63bb061a51153f8638947df308402d91dd000b5

    SHA256

    18ea08aa3c15f1dae60aaa5c0f0e9842186d55967b3de03366d3b04e62462c1e

    SHA512

    706d84a33122a825547ae9758b125160fa21d60ae69fd8d3152784b80e67410d60b9db51ec77b5e8c5157e8707217827a22115c3afaf63f0c2afeedebb53ba2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    0034b47d9f3fe3c3ce2ab309715c0365

    SHA1

    a022be3321ca61e00cb16c9c823c358be65f4d52

    SHA256

    2565bb697c5941f0c28cf9852adeadb65aba413723444df42f51fa2e7c05a178

    SHA512

    313d4403efa2ec43543961054db05c0e942014ebbe53b1b2af5d5ae1ef3112d60eb53039c281db06f3a45a101fa6c67bfd76750b8e4056023f7e000bfc00e4f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    9050d60c3a5e8908111260bc17194e81

    SHA1

    91f08eed771e790032acf7cce41b6bbf9cb092af

    SHA256

    edd50cf13abccb7c91b52fd6e8ea82504fd4cb50cdd6e93f085939783bf6338b

    SHA512

    501d61c4f3ee1624c7044fe9a4f547a8d1dee6862a94f23862637e3a15e1e79302e656728637ac6846f583890f52065ddc0451f59dc165e6c3de6dddf30d01cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    636fe768fb5a3a27a8efd527cad4e99f

    SHA1

    22a9d1b80465226132e9bad6340be71cec80581d

    SHA256

    86ce138fe87c5cf04b628938efd39d6a69e5ab06d48900785a3f93934a6b2793

    SHA512

    c5aece36ef0904933de9f84b91d897688692318d476c77d673618575906c073984d3ea1fb8c05a86b59a0193afbafc9ccab0677625535dc16f37f05d5829323e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    bddc3efc4e6c61260f84f3dfc45e512a

    SHA1

    36c3c168163c733e91d9da7600f0495a4363fa2e

    SHA256

    8997b7d37656ac2e9c742997015749b1773ce5c313a12d1e3615eaecc9105efe

    SHA512

    5b81ed28c539b4dcc8e2a9b6a60513db43f7a0abbb5aa399fbceaacb3234213c0d217897b01206fb48a32bad5e83e7a8eb5ffea22806f3cab4e0986f118f7d1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    c7e451e1e80a94df293e1c21e76ec4df

    SHA1

    4306ff103b9871ac9cd1e0e3227476e79a956d21

    SHA256

    193ce9aecddadebbb1376f34204c23117a3eb44aed147f393b4d2b7265437e69

    SHA512

    d3be3b4388414baabd2c5e9a810b5000e25b799cea9933724caa615c7792d7e52c043b4efcb3bb795dda7ba05c91c877d50ec119e5823697960bdfa9bbdabc0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    13a79994aa67f0fa0b6ddfc7b779ed68

    SHA1

    73351c425f3f354f5c7ef7d187d8cad4d1fcd081

    SHA256

    16a45262be2683fbbad78bd07a1ecb01767830dbe423dda1bc2d440e56aa0f75

    SHA512

    5491381c1aab03471bf37f50276cfb55eb21ce8af39ac47ecdf562dda903bdd822e0a9d643b9015c81d5105cb99240ba346ce8e1ed3c6154228fd99f67172ecf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    aa944fe8251086b71e096fdacccb0e6e

    SHA1

    ed3f1d6466dd9317c26fd67c50f55b0d2fe2ddbc

    SHA256

    04fc9beddc717ed8a52695c5640eb2c80d3955b302590fb14254bae36b544b1b

    SHA512

    052b77f5889f6d2b894d9971248806209a218dafd86616a1285f52de2a1a8d899a31f3c4312f7e951e0537f28bcd5f0afeaee9c5d9cbdb337d5676b06a4f7ffb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    526551ad1bd8e9015706a1daa974810e

    SHA1

    b11783ad6c589045ce026898f623a0eeb6c3a55f

    SHA256

    1e5cb28461b9eb9cf2c95e7dd0560c9c008ea58eb5fa15865cc12e7ff674aecc

    SHA512

    f6f420c3c844fcc4c7dca4c6e354528b98f685773469cb9c1affc074f5b6a5fd64b8b7d80b5da1d5ebbdbb95ab065c42441fcac8ab8f84c3ee60c667cea198f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    473ae7bfce33c426f28b192e3fdbad98

    SHA1

    5aa8e3075cc8ebcaf76b8d93b11068a4fa2ce996

    SHA256

    f29a904f0c432bd8c31de1980540c239f21e634e07542d70b2c6b5fcbfcb5cb5

    SHA512

    aedf1941bc8177034b524664a2690f2b4b204087c6d3ca63a109599bf4c85e7e5665ec096a0e1f6984f4d7c072baced239c20c38525062ffc1395370ddec65e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    3c6b22a60d03c1db508fe95e92ab0460

    SHA1

    d53dd80724ff2397c0a872c99b630222e7421314

    SHA256

    2e73b7f6df54b945d61bbb7e9b5f2e12fb264554d8f9541f8127f84250779a85

    SHA512

    3a58b250549faf7edc8367d3d57863623137f85b1ef1fc63309e687c458467c0e3e2572a55b9415d8317a5a58fc2fa8f5be0dcbcc360264f9e57fcda1cadcf2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    340B

    MD5

    b9e308c1b80196b744ae476aa6919c63

    SHA1

    063f5eafb4c1f02b8041705fa57fb9017cda4815

    SHA256

    417a6cbba7914320057a57b5a54ad90fffab683c3d065cc7f3bd464e1918a1e3

    SHA512

    95c6859df60fa183e92d9d7b559822b6362e23366f38b9f2e2e743688fa655b1a91486fb96e7691edb89be85c1276342c9af6375ada53909e2b78c4d0f71c1a4

  • C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
    Filesize

    22KB

    MD5

    04214b7cb6d6f1852d2b758e7dc41f79

    SHA1

    09caf41f3ed70db23b39351fdd1dc657bcdc42fd

    SHA256

    9ad8f4fc26ee9bb73266916caed4bf50100f308cb3cad13b62b3a5fe5c93c749

    SHA512

    42ee1b27ecb6511fa96d8450a5511b46f738e45efe40623b8be1c857d0f00a72b3e25c3054d0174b15bee624b123b860ae68890e7f0e12ea49916f11edf81362

  • C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
    Filesize

    22KB

    MD5

    04214b7cb6d6f1852d2b758e7dc41f79

    SHA1

    09caf41f3ed70db23b39351fdd1dc657bcdc42fd

    SHA256

    9ad8f4fc26ee9bb73266916caed4bf50100f308cb3cad13b62b3a5fe5c93c749

    SHA512

    42ee1b27ecb6511fa96d8450a5511b46f738e45efe40623b8be1c857d0f00a72b3e25c3054d0174b15bee624b123b860ae68890e7f0e12ea49916f11edf81362

  • C:\Windows\04214b7cb6d6f1852d2b758e7dc41f79.exe
    Filesize

    22KB

    MD5

    04214b7cb6d6f1852d2b758e7dc41f79

    SHA1

    09caf41f3ed70db23b39351fdd1dc657bcdc42fd

    SHA256

    9ad8f4fc26ee9bb73266916caed4bf50100f308cb3cad13b62b3a5fe5c93c749

    SHA512

    42ee1b27ecb6511fa96d8450a5511b46f738e45efe40623b8be1c857d0f00a72b3e25c3054d0174b15bee624b123b860ae68890e7f0e12ea49916f11edf81362

  • memory/1596-63-0x0000000000000000-mapping.dmp
  • memory/1660-54-0x0000000074F41000-0x0000000074F43000-memory.dmp
    Filesize

    8KB

  • memory/1664-71-0x0000000000429D30-mapping.dmp
  • memory/1664-75-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1664-70-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1664-78-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1664-76-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/1664-77-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2040-65-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2040-62-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2040-61-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2040-58-0x0000000000429D30-mapping.dmp
  • memory/2040-57-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/2040-55-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB