Analysis

  • max time kernel
    279s
  • max time network
    285s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-09-2022 22:20

General

  • Target

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe

  • Size

    171KB

  • MD5

    2dce3da05acacdf790a0e200206fc921

  • SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

  • SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

  • SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • SSDEEP

    1536:GVS32qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHU//rT//j:LVMMMZMMMMMMMMMMMMz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Obfuscated with Agile.Net obfuscator 12 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1104
    • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3236
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4712
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:308
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:3764
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1916
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4724
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1032
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3944
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4496
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4452
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5052
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:428

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    b42b8394f52b01b93879625688c3d79d

    SHA1

    3ed5877ab13e7655482c19e8b7511f8b2bfcdbb3

    SHA256

    b7b0a0ab5e777b74a8d7ec285804091eb3a4c71fcc2c57cddfa8541d05409cdd

    SHA512

    86357e54c29ee9c107b5655d457121f35117565fae4fdd018e56079eb7ca012e4afe0a5d5562bc2996b932b02450ad0fbb7f27047315b524138a0fe08c4f79c2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    45KB

    MD5

    5f640bd48e2547b4c1a7421f080f815f

    SHA1

    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

    SHA256

    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

    SHA512

    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    15KB

    MD5

    0b1093bd107e8e398c9767e84cf04f81

    SHA1

    140f2d62885bfd34ae8cdfe1520887e24b5b6657

    SHA256

    a9946aad63619116a51e3c512c887280a2b26b82bd7c3864ea3b373f87267984

    SHA512

    cfc7a9102f3f9690cb6df07c1fb2983da8b04eb690ed99c58a90ed3d8667f966755ca2fdead9ccbed4173137f094e87a06a014d4b7a450bf6228990719c951ff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    d65179e5174ccbb6252c15e314e78b57

    SHA1

    4401d80d553757a285c4648ce8cb21d4a2ce882a

    SHA256

    cf196df0cbb5b5a989fa9a8f94e2061649a5f538479b9d8a29d2fc4ac9d14297

    SHA512

    43813143179424129b2b0620ba53df0215deec5167e0c0d98ac0fecec753c3eedd4d544a8861124d5fd9d2ecc8b8ef06d8414e2a94ffff600257337e546adea2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    15KB

    MD5

    15bf051c45a202343ba8a72ff2adb4e2

    SHA1

    f8f402876b5f4e0bbe48fbad0ad74ba1c8420179

    SHA256

    5fb8d3c8e3df8d2c276368e3cc3810c955e41813015a6356daf17bb9c8897273

    SHA512

    cfc7013b77190cf59ab26b86d098244fe18b2245156828d0f623e168e05167a309dbe419efeae89e61ece466c4516bf7f38f909c93c2f4c049bb06e50f0f7414

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    15KB

    MD5

    02a75a05fa463ab5256ad20da900feeb

    SHA1

    1e5a97adf22a2474f2ad0558555977e275726432

    SHA256

    25d9eeee6625c4c1f8bcbeccc2c2659c81162039e783cedd704b6d67bac9a010

    SHA512

    e8e081af417e90f94f65ee099b24f3bb7f555cdba717953509bb310fbef0bd3b2feabec747e7e1d5abf3c441ac2799db751c36305f05d1055f6b85ab99d32f7d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • memory/308-425-0x0000000000000000-mapping.dmp
  • memory/428-1124-0x0000000000402354-mapping.dmp
  • memory/1032-729-0x0000000000402354-mapping.dmp
  • memory/1104-265-0x00000000085C0000-0x000000000860B000-memory.dmp
    Filesize

    300KB

  • memory/1104-264-0x0000000007B00000-0x0000000007B1C000-memory.dmp
    Filesize

    112KB

  • memory/1104-200-0x0000000000000000-mapping.dmp
  • memory/1104-236-0x0000000004860000-0x0000000004896000-memory.dmp
    Filesize

    216KB

  • memory/1104-241-0x0000000007320000-0x0000000007948000-memory.dmp
    Filesize

    6.2MB

  • memory/1104-260-0x00000000079C0000-0x0000000007A26000-memory.dmp
    Filesize

    408KB

  • memory/1104-281-0x0000000009160000-0x000000000917A000-memory.dmp
    Filesize

    104KB

  • memory/1104-280-0x0000000009BD0000-0x000000000A248000-memory.dmp
    Filesize

    6.5MB

  • memory/1104-269-0x0000000008320000-0x0000000008396000-memory.dmp
    Filesize

    472KB

  • memory/1104-261-0x0000000007A30000-0x0000000007A96000-memory.dmp
    Filesize

    408KB

  • memory/1916-544-0x0000000000000000-mapping.dmp
  • memory/2348-510-0x0000000000402354-mapping.dmp
  • memory/3236-288-0x0000000000402354-mapping.dmp
  • memory/3236-341-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/3944-843-0x0000000000000000-mapping.dmp
  • memory/4124-143-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-148-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-153-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-155-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-156-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-157-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-158-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-159-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-160-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-161-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-162-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-163-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-164-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-165-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-166-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-168-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-169-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-167-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-170-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-171-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-172-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-175-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-178-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-179-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-177-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-176-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-174-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-173-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-180-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-184-0x00000000092F0000-0x000000000939A000-memory.dmp
    Filesize

    680KB

  • memory/4124-185-0x0000000009410000-0x00000000094A2000-memory.dmp
    Filesize

    584KB

  • memory/4124-186-0x00000000094D0000-0x00000000094F2000-memory.dmp
    Filesize

    136KB

  • memory/4124-188-0x0000000009500000-0x0000000009850000-memory.dmp
    Filesize

    3.3MB

  • memory/4124-152-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-151-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-150-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-149-0x0000000000FE0000-0x0000000001010000-memory.dmp
    Filesize

    192KB

  • memory/4124-154-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-147-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-146-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-145-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-144-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-116-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-142-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-117-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-141-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-140-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-139-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-138-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-137-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-133-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-134-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-136-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-135-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-132-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-131-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-130-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-129-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-118-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-119-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-128-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-120-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-125-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-126-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-127-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-124-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-123-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-122-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4124-121-0x0000000077480000-0x000000007760E000-memory.dmp
    Filesize

    1.6MB

  • memory/4496-927-0x0000000000402354-mapping.dmp
  • memory/4520-633-0x0000000008C40000-0x0000000008F90000-memory.dmp
    Filesize

    3.3MB

  • memory/4712-322-0x0000000000000000-mapping.dmp
  • memory/4724-708-0x0000000008110000-0x000000000815B000-memory.dmp
    Filesize

    300KB

  • memory/4724-645-0x0000000000000000-mapping.dmp
  • memory/5052-1041-0x0000000000000000-mapping.dmp