Analysis

  • max time kernel
    152s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2022 12:56

General

  • Target

    d5685b7576875be2c14879906191e0817ff0fab11b0075d89a92445ad93c1191.exe

  • Size

    203KB

  • MD5

    0874d77f9d19a2668da6e8a4ea44e5b2

  • SHA1

    422955180edf85c8f28ae06fc84a7498613594d0

  • SHA256

    d5685b7576875be2c14879906191e0817ff0fab11b0075d89a92445ad93c1191

  • SHA512

    590566d9466a4580595030a7bb2a16d28a962ed5b6c0ed7082f9308d27efae6fb41697281518b44efd83ab47be7da278f8c7eb3ba037092764730700e12bc5cd

  • SSDEEP

    3072:aVG6UVYxmJhU40XGRkTjuIWnGPDXHV0wcFS+p3z67C3gA2QQCTK8bOfbvp7EH/E7:yh17XtTKGPD10fFx3WbA23CNbOThIcWe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5685b7576875be2c14879906191e0817ff0fab11b0075d89a92445ad93c1191.exe
    "C:\Users\Admin\AppData\Local\Temp\d5685b7576875be2c14879906191e0817ff0fab11b0075d89a92445ad93c1191.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:868
    • C:\Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp
      "C:\Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp" "C:\Users\Admin\AppData\Local\Temp\check.exe" e -o+ -pdwPud7lfqhm5VGMCkBWYKE5j8mex4 package.tmp
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1900
      • C:\Users\Admin\AppData\Local\Temp\check.exe
        "C:\Users\Admin\AppData\Local\Temp\check.exe" e -o+ -pdwPud7lfqhm5VGMCkBWYKE5j8mex4 package.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1500
    • C:\Users\Admin\AppData\Local\Temp\tmp1.exe
      tmp1.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 256
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1880
    • C:\Users\Admin\AppData\Local\Temp\tmp2.exe
      tmp2.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 256
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • C:\Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • C:\Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp

    Filesize

    6KB

    MD5

    412ccf8db992b93ecb598da8c07367be

    SHA1

    dceb6e337931ed0c4de084d0a52d719a61cd2c73

    SHA256

    e6c4f87160b647c8a8ddd5d494342692091cec409e664253b95b35c6abe7c5d1

    SHA512

    3dfb51523c075ac41778d76fd2a8f3a5384923d253fdebebe56a5c018fb23d9eb4057ea1a207731afb38c4803e304655c6b8b37e169957727043d7eb76daa55a

  • C:\Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp

    Filesize

    6KB

    MD5

    412ccf8db992b93ecb598da8c07367be

    SHA1

    dceb6e337931ed0c4de084d0a52d719a61cd2c73

    SHA256

    e6c4f87160b647c8a8ddd5d494342692091cec409e664253b95b35c6abe7c5d1

    SHA512

    3dfb51523c075ac41778d76fd2a8f3a5384923d253fdebebe56a5c018fb23d9eb4057ea1a207731afb38c4803e304655c6b8b37e169957727043d7eb76daa55a

  • C:\Users\Admin\AppData\Local\Temp\package.tmp

    Filesize

    46KB

    MD5

    f0b93dfd8895f0361f6143cd4a260f65

    SHA1

    fab7932ffd4a612067c80c17f211a24cbb00d3fc

    SHA256

    be1a156c4d15bced00b6191d3ab945bd9ec16ac16d74e3796dd2179f2b9db48c

    SHA512

    ed97e7c0e9311c9811efdc8677b7fc505dc662ea2da10deb05bcf61dd08b37b9a39e9403d4bc5b7e659fff324dd6c448149396c041f140c548ef6b398f0fdb1d

  • C:\Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • C:\Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • C:\Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • C:\Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • \Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • \Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • \Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • \Users\Admin\AppData\Local\Temp\check.exe

    Filesize

    192KB

    MD5

    6b40a8f9e606ecd4290e57524e927b10

    SHA1

    4ffcc32264a5e539d942331e9894f93fabc46594

    SHA256

    a99391530b751671edf70c64681e921340d7ef37f5dca72eb76d438f3c6af98b

    SHA512

    bb23f5f22e493d91fa7d064cc6007f3536886ccd81e7b368dd769efea5ab17223d3013d5c66ea4527574dd3ef4b165f91b0db385d9c1478424e3c962e4bc8ae0

  • \Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp

    Filesize

    6KB

    MD5

    412ccf8db992b93ecb598da8c07367be

    SHA1

    dceb6e337931ed0c4de084d0a52d719a61cd2c73

    SHA256

    e6c4f87160b647c8a8ddd5d494342692091cec409e664253b95b35c6abe7c5d1

    SHA512

    3dfb51523c075ac41778d76fd2a8f3a5384923d253fdebebe56a5c018fb23d9eb4057ea1a207731afb38c4803e304655c6b8b37e169957727043d7eb76daa55a

  • \Users\Admin\AppData\Local\Temp\nso20EC.tmp\ns210C.tmp

    Filesize

    6KB

    MD5

    412ccf8db992b93ecb598da8c07367be

    SHA1

    dceb6e337931ed0c4de084d0a52d719a61cd2c73

    SHA256

    e6c4f87160b647c8a8ddd5d494342692091cec409e664253b95b35c6abe7c5d1

    SHA512

    3dfb51523c075ac41778d76fd2a8f3a5384923d253fdebebe56a5c018fb23d9eb4057ea1a207731afb38c4803e304655c6b8b37e169957727043d7eb76daa55a

  • \Users\Admin\AppData\Local\Temp\nso20EC.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    165d8d1e0c21b60862079368b063b25b

    SHA1

    a553c91c70eed07cfc27ac0d333dc7ca1e32c2c4

    SHA256

    db80fa3f48a227e91d16fe81eeae96dc15e8fd29fc4c4f8feb21b00c5dc19534

    SHA512

    f590932c2e933e029435bb8346239fe01ae54b0a16c9c377f0c779fc5b6f8c64ed285c54be0372bb395fafcedbf40c79735263b5ca1310e7adbf7fbe628cb87b

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp1.exe

    Filesize

    69KB

    MD5

    d06bca209a515e90b5b1aa7777aeee8b

    SHA1

    bb0fe2743643f5f7b4fe01df1232461aca2a13fe

    SHA256

    19b9117d3c9642048d060228e13f3ac828991d91d94da962e5636d369e0862c2

    SHA512

    a44024db7b0e2a99937e2e3867cec75a2f1a6942e87b9b58061ed05bb72882cc911a614ca37edbe198fa35ee74e872879b89dfc247e5690e3fff0b1a5983e996

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • \Users\Admin\AppData\Local\Temp\tmp2.exe

    Filesize

    7KB

    MD5

    d3b973e304213e298ba7d26e6999c41b

    SHA1

    7372d3b2aa64fcbdbae28e35d69e89b55a28ab4e

    SHA256

    4e6d8a4c922e2104e818e4b75f2cf0418af42d332bcae8a7adceccd32cbb18cf

    SHA512

    405e615f66ff09bb3bfecd1f8aad4247bf23a3fcecb45196b3c5b2e295022b88bbb29dcdfe01b5afa2356a1db8d1ad4a71d84372f68c20363e300d6f28319128

  • memory/580-98-0x0000000000000000-mapping.dmp

  • memory/868-94-0x00000000002F0000-0x00000000002F3000-memory.dmp

    Filesize

    12KB

  • memory/868-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB

  • memory/868-95-0x00000000002F0000-0x00000000002F3000-memory.dmp

    Filesize

    12KB

  • memory/868-81-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/868-82-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/868-107-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/868-106-0x0000000000580000-0x0000000000593000-memory.dmp

    Filesize

    76KB

  • memory/1500-65-0x0000000000000000-mapping.dmp

  • memory/1664-96-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1664-97-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/1664-88-0x0000000000000000-mapping.dmp

  • memory/1880-99-0x0000000000000000-mapping.dmp

  • memory/1900-58-0x0000000000000000-mapping.dmp

  • memory/1988-75-0x0000000000000000-mapping.dmp

  • memory/1988-84-0x0000000000020000-0x0000000000033000-memory.dmp

    Filesize

    76KB

  • memory/1988-83-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1988-108-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB