Analysis

  • max time kernel
    298s
  • max time network
    298s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22-09-2022 22:23

General

  • Target

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe

  • Size

    171KB

  • MD5

    2dce3da05acacdf790a0e200206fc921

  • SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

  • SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

  • SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • SSDEEP

    1536:GVS32qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHU//rT//j:LVMMMZMMMMMMMMMMMMz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Obfuscated with Agile.Net obfuscator 13 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1372
    • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3640
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4656
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3324
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4756
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:3792
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3636
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5004
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4456
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4720
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:1324
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5044
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:424
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:660
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
        PID:4440

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
      Filesize

      1KB

      MD5

      94783fcf58c98f5ea0b416f441ad15eb

      SHA1

      979a7c39c6a5dbed314bc41a22c4ccdca6db206b

      SHA256

      117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

      SHA512

      9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      Filesize

      1KB

      MD5

      66382a4ca6c4dcf75ce41417d44be93e

      SHA1

      8132cbef1c12f8a89a68a6153ade4286bf130812

      SHA256

      a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

      SHA512

      2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
      Filesize

      45KB

      MD5

      5f640bd48e2547b4c1a7421f080f815f

      SHA1

      a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

      SHA256

      916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

      SHA512

      a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      15KB

      MD5

      1e3dce2df3005fe002bae46624cb6a08

      SHA1

      fc87866777d45cdcc09d82af2cbc312fb8761c0b

      SHA256

      f8f1389fb2894c9b9bfc6e22ac4ac059b4f84df9b7aa98478e3d0244e9ca9b46

      SHA512

      e307a08e21a45f201f0b5508aa403085dfbf7d5adc9e36497ebaa5c96fee5c802856f0461f25d81ed3e93792db16e9983e6c3b9ffad0a5080c145e3245b553f5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      15KB

      MD5

      8959e5999fe0608f87286151ff483d1c

      SHA1

      48017cbc5e439e1fff7c4de0251058cd4f3f9523

      SHA256

      f1e73e0f3bfceb13f58b3d0b6cf13e11b2e837cb200a3847c4119da80da51303

      SHA512

      1449ef2fe1dfe2f8287588cae16738ea53481e38491caf0d8953c5342fd24d4ed4d1deb42d771626dfe90fe6c97111d140d542e47cdcce56870f8ab528067a96

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      16KB

      MD5

      3fa4c02901d5e6698000df619c953739

      SHA1

      47e0780026c6a650837cfd9b77689393d504c329

      SHA256

      f90dfe54c9f6719ca88e7c3af6099d3c933657c433d8b2599613de0033f7c620

      SHA512

      0b70f68253d3a1a4a7f276f7f7600d1b232611a3b8899e7c2368d5c16e895460a09c0a953f7b1bf098abe668b791234436a219fa7a0dc010b0ce12639c8454d2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      15KB

      MD5

      1bfa568e302f3b09dc7be10f4bdfcdba

      SHA1

      99966c7a87ac0884ec93ac20a67dbac4def7ac4e

      SHA256

      3cc4c9dcca63cd4aa5c5a6045aab070636db86ebb82b21a2f8c7f72c7fa4e4d3

      SHA512

      564e976915b88b5d4e15d6c645cc6e698fb105e974441acd7f45c07304c26077273b0f3129254987ddd72136eafd99d9603c79b449850f5a05c32bffa087862b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      15KB

      MD5

      b4acfe83c521faa844f118073b0936e4

      SHA1

      d3542db6bb1df6c7b840dcc07a032fc632f5fd58

      SHA256

      4122d1e7028e9e122401bdb9bd881f3d9e8a3af5322348d1cb394f433d851711

      SHA512

      9aa45bacf5b4066932da026b46c0dae2081b6d23696a5ebae553fe5bbf1a71d8d097e10f394f1b0e86de6f50ef73792ccf1fca295f945d4f229d00bd125ea6fc

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      Filesize

      171KB

      MD5

      2dce3da05acacdf790a0e200206fc921

      SHA1

      8adc6bc3612ce098a230681655cc4a8eaa0338d4

      SHA256

      be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

      SHA512

      762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

    • memory/424-1125-0x0000000000402354-mapping.dmp
    • memory/1324-928-0x0000000000402354-mapping.dmp
    • memory/1372-269-0x0000000007E50000-0x0000000007EC6000-memory.dmp
      Filesize

      472KB

    • memory/1372-280-0x00000000096F0000-0x0000000009D68000-memory.dmp
      Filesize

      6.5MB

    • memory/1372-281-0x0000000008C50000-0x0000000008C6A000-memory.dmp
      Filesize

      104KB

    • memory/1372-200-0x0000000000000000-mapping.dmp
    • memory/1372-265-0x0000000007BE0000-0x0000000007C2B000-memory.dmp
      Filesize

      300KB

    • memory/1372-264-0x0000000007610000-0x000000000762C000-memory.dmp
      Filesize

      112KB

    • memory/1372-261-0x0000000006ED0000-0x0000000006F36000-memory.dmp
      Filesize

      408KB

    • memory/1372-260-0x0000000006E60000-0x0000000006EC6000-memory.dmp
      Filesize

      408KB

    • memory/1372-241-0x0000000006F80000-0x00000000075A8000-memory.dmp
      Filesize

      6.2MB

    • memory/1372-236-0x0000000000F10000-0x0000000000F46000-memory.dmp
      Filesize

      216KB

    • memory/2772-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-117-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-157-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-184-0x00000000086C0000-0x000000000876A000-memory.dmp
      Filesize

      680KB

    • memory/2772-185-0x00000000087E0000-0x0000000008872000-memory.dmp
      Filesize

      584KB

    • memory/2772-186-0x00000000088C0000-0x00000000088E2000-memory.dmp
      Filesize

      136KB

    • memory/2772-188-0x00000000088F0000-0x0000000008C40000-memory.dmp
      Filesize

      3.3MB

    • memory/2772-149-0x00000000003D0000-0x0000000000400000-memory.dmp
      Filesize

      192KB

    • memory/2772-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-116-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-118-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-119-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/2772-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp
      Filesize

      1.6MB

    • memory/3324-545-0x0000000000000000-mapping.dmp
    • memory/3636-634-0x0000000009300000-0x0000000009650000-memory.dmp
      Filesize

      3.3MB

    • memory/3640-323-0x0000000000000000-mapping.dmp
    • memory/4440-1239-0x0000000000000000-mapping.dmp
    • memory/4456-764-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/4456-730-0x0000000000402354-mapping.dmp
    • memory/4464-511-0x0000000000402354-mapping.dmp
    • memory/4580-288-0x0000000000402354-mapping.dmp
    • memory/4580-321-0x0000000000400000-0x0000000000406000-memory.dmp
      Filesize

      24KB

    • memory/4656-425-0x0000000000000000-mapping.dmp
    • memory/4720-845-0x0000000000000000-mapping.dmp
    • memory/5004-646-0x0000000000000000-mapping.dmp
    • memory/5004-709-0x00000000082D0000-0x000000000831B000-memory.dmp
      Filesize

      300KB

    • memory/5044-1042-0x0000000000000000-mapping.dmp