Analysis

  • max time kernel
    287s
  • max time network
    285s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-09-2022 22:26

General

  • Target

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe

  • Size

    171KB

  • MD5

    2dce3da05acacdf790a0e200206fc921

  • SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

  • SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

  • SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • SSDEEP

    1536:GVS32qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHU//rT//j:LVMMMZMMMMMMMMMMMMz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Obfuscated with Agile.Net obfuscator 11 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5104
    • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4332
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4012
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3704
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1568
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3396
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:3172
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3800
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:5112
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4372
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3836

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    66382a4ca6c4dcf75ce41417d44be93e

    SHA1

    8132cbef1c12f8a89a68a6153ade4286bf130812

    SHA256

    a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

    SHA512

    2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    27c84dd4c50b7d24678d6be32b999a94

    SHA1

    ce5c7982d3ebcc15390b6818849a1e7cb442acc3

    SHA256

    157897aba30489d8755ed20f6b6d3d4aaea596426d36844a7aac010548a37a69

    SHA512

    f689a25070d59c6bac1f8d5e7acace31f2c46eeb42dac89cfa6ce16559a2ebd88a9b5b48270d1ebe083b172bd2b561713dbacfc646795e1ad422bac362d66d68

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    cb8f832031d093e2996084ded805cdb0

    SHA1

    2722109b8d73e447192377d8455cbadea1f5eed0

    SHA256

    880b04c25fcbafb4037e130fece04ab0279808afa3e82444e736d4b92f194c15

    SHA512

    ad594c301536e231f66ca2c31ee5a85bd219fe0bf6974ab831adada79eda9d31b40c789be5bc0d48cad8d24217840d4e8bb4173463e3bd9455448a6c58a521ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    4859441cf7314510ef200accbef73a86

    SHA1

    9dfa91e28f86008214f6c4fa805835a27011c7d1

    SHA256

    a46cda668393b68b39147b9f3e5d75affad63fc7500283800467f6fdea2c7b81

    SHA512

    5656922725903cf6b1765c2360c9e7aa958a7b39bb1b35f2175ffee5886ff51f13be4ed1581ad298c62ee567c307d7ab793327d30242687a06b325a7a71cf6ac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    7c78a3d6185b5e36231d0d1b6965225f

    SHA1

    a6b17e5a7d42fd0b3112d79a391711bc06d105ab

    SHA256

    422f0d240a1ad56cbe89c86add7a59890ff8807ad64cdf87795a58e398d0c609

    SHA512

    c70acd4616674cfe56f9820e642be7bb92e7993c8638375ad7a806db60ddfda85de625265ffe31fce8b95d78f260ee28ad07e875d7bf1b43de3afda332341689

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    6d59817af07829f1a17e6a3ab91c2348

    SHA1

    446fbe0dbf4d85f3734058b86e0e1a6b34a8b9e7

    SHA256

    9950ade83564f0057e23576f9ae9d15c7fcd83ef94ecac7fea558b764cd11593

    SHA512

    ee66dc63d56be63e6737629e17ae76d06e74863f23f8fa5bf53306c12cd405779eedb5b1fa9acf3d64172c8f93663624f593b77e702695c1cab1b461e9fc790c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • memory/1568-542-0x0000000000000000-mapping.dmp
  • memory/2232-631-0x0000000008DD0000-0x0000000009120000-memory.dmp
    Filesize

    3.3MB

  • memory/2656-288-0x0000000000402354-mapping.dmp
  • memory/2656-339-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/2668-144-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-185-0x0000000008C00000-0x0000000008C92000-memory.dmp
    Filesize

    584KB

  • memory/2668-141-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-143-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-142-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-140-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-116-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-145-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-137-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-146-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-147-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-148-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-149-0x00000000007F0000-0x0000000000820000-memory.dmp
    Filesize

    192KB

  • memory/2668-150-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-151-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-152-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-153-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-154-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-155-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-156-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-157-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-161-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-160-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-163-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-162-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-164-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-165-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-166-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-167-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-169-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-170-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-168-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-171-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-159-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-172-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-158-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-174-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-178-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-179-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-177-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-176-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-175-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-173-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-180-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-184-0x0000000008AE0000-0x0000000008B8A000-memory.dmp
    Filesize

    680KB

  • memory/2668-139-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-186-0x0000000008CE0000-0x0000000008D02000-memory.dmp
    Filesize

    136KB

  • memory/2668-188-0x0000000008D10000-0x0000000009060000-memory.dmp
    Filesize

    3.3MB

  • memory/2668-117-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-119-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-120-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-118-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-121-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-122-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-123-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-124-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-125-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-126-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-138-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-127-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-135-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-136-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-134-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-128-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-133-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-132-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-131-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-129-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/2668-130-0x00000000779A0000-0x0000000077B2E000-memory.dmp
    Filesize

    1.6MB

  • memory/3172-727-0x0000000000402354-mapping.dmp
  • memory/3396-643-0x0000000000000000-mapping.dmp
  • memory/3396-706-0x0000000008760000-0x00000000087AB000-memory.dmp
    Filesize

    300KB

  • memory/3704-508-0x0000000000402354-mapping.dmp
  • memory/3800-841-0x0000000000000000-mapping.dmp
  • memory/3836-1235-0x0000000000000000-mapping.dmp
  • memory/4012-425-0x0000000000000000-mapping.dmp
  • memory/4332-322-0x0000000000000000-mapping.dmp
  • memory/4372-1121-0x0000000000402354-mapping.dmp
  • memory/4440-1038-0x0000000000000000-mapping.dmp
  • memory/5104-265-0x00000000087A0000-0x00000000087EB000-memory.dmp
    Filesize

    300KB

  • memory/5104-264-0x0000000008210000-0x000000000822C000-memory.dmp
    Filesize

    112KB

  • memory/5104-260-0x0000000008070000-0x00000000080D6000-memory.dmp
    Filesize

    408KB

  • memory/5104-269-0x0000000008A80000-0x0000000008AF6000-memory.dmp
    Filesize

    472KB

  • memory/5104-261-0x00000000080E0000-0x0000000008146000-memory.dmp
    Filesize

    408KB

  • memory/5104-281-0x0000000009830000-0x000000000984A000-memory.dmp
    Filesize

    104KB

  • memory/5104-241-0x00000000079D0000-0x0000000007FF8000-memory.dmp
    Filesize

    6.2MB

  • memory/5104-236-0x00000000072B0000-0x00000000072E6000-memory.dmp
    Filesize

    216KB

  • memory/5104-280-0x000000000A2D0000-0x000000000A948000-memory.dmp
    Filesize

    6.5MB

  • memory/5104-200-0x0000000000000000-mapping.dmp
  • memory/5112-924-0x0000000000402354-mapping.dmp