Analysis

  • max time kernel
    280s
  • max time network
    283s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-09-2022 10:21

General

  • Target

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe

  • Size

    171KB

  • MD5

    2dce3da05acacdf790a0e200206fc921

  • SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

  • SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

  • SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • SSDEEP

    1536:GVS32qHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHU//rT//j:LVMMMZMMMMMMMMMMMMz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Obfuscated with Agile.Net obfuscator 11 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
    "C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
    • C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      C:\Users\Admin\AppData\Local\Temp\be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2536
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:444
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"
        3⤵
        • Creates scheduled task(s)
        PID:5068
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4244
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:3308
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4144
  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4936
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4804
    • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
      2⤵
      • Executes dropped EXE
      PID:4872

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\oobeldr.exe.log
    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    66382a4ca6c4dcf75ce41417d44be93e

    SHA1

    8132cbef1c12f8a89a68a6153ade4286bf130812

    SHA256

    a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

    SHA512

    2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    9d4a2aae53e7c176a9e53d325c2cf008

    SHA1

    7e2db0031f25366b56254f7bb7981cd072547cde

    SHA256

    22f40c6be054e9db4548c1867e4cc1dc862ac76d06e73ecf84523167ff0222b0

    SHA512

    0d0016548ab2c8bcc46af92b0c0e44f6f616278000292a4a99eb4c74c79be77dbe43da7d5efd99a0035c08325bb489a84024d9cebe38c59d23901b11fcca40ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    761d9faaac822dd23b47b77b83490817

    SHA1

    08de8cb0c11153b2240bf03f6dfa90659d98c257

    SHA256

    7154346e2eb4e999c90aa694d6c73629b1ca76ecf37360d60e40b801b6f1ee59

    SHA512

    0267d6b5ab31ed7b98018092ff9622293cc3d51c44c7dabd20671398fbfb7b1279d0ca7eedf1b0e0bd634f868a58126404fc21984cee6edd07954a2beb069359

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    fc58d7bace7bd3de515ae580aae1ea34

    SHA1

    4e7980a764cad74a662da9e3eb8f1e39c82f898c

    SHA256

    19861213b6da323b7e38e3de1829f4d22ce6bbc9d97ded669ddb661531ce6d7f

    SHA512

    dbfced88a8cf80370e7526722c0954e9a514a031fbc75e44eff7b1ed5bb64ee41175af7b5e2b4087830e97afdb0e35e8eee8055e6fd2bfcb53d09d3c84a9e6b8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    e8a7e11d2f922eeaada0a66156e4f1ab

    SHA1

    8de933c9314d0609055d72c0f657982d2132cfc3

    SHA256

    cb24935b7163405608da54511b947072d6dafcd1fdbabec37ea566eebfdafaf3

    SHA512

    073b620a5da50ac64ef54a4b69d0de0e714bd8d1c63fbfa8c97e1ad0fdd4963c17fe281976c47b1819fa751dfbcfc449dff6c518034bf8fcdee83b4b1795f882

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe
    Filesize

    171KB

    MD5

    2dce3da05acacdf790a0e200206fc921

    SHA1

    8adc6bc3612ce098a230681655cc4a8eaa0338d4

    SHA256

    be39930e3c2ce1f2feb23d382557b3d69d92630909ca0b54cab6b48247521f7d

    SHA512

    762bf52c8ba86d7e4d6ca5aafaa94fefbe4ed23eb07e01e30620c52e00cc9a7d94b36042b4098ddd0c2bb01b84553d2a0d365e2db1fab6a0d1ad7344d38d9c7a

  • memory/444-427-0x0000000000000000-mapping.dmp
  • memory/2028-283-0x00000000098C0000-0x00000000098DA000-memory.dmp
    Filesize

    104KB

  • memory/2028-282-0x000000000A310000-0x000000000A988000-memory.dmp
    Filesize

    6.5MB

  • memory/2028-202-0x0000000000000000-mapping.dmp
  • memory/2028-271-0x0000000008B00000-0x0000000008B76000-memory.dmp
    Filesize

    472KB

  • memory/2028-267-0x0000000008AB0000-0x0000000008AFB000-memory.dmp
    Filesize

    300KB

  • memory/2028-266-0x0000000008220000-0x000000000823C000-memory.dmp
    Filesize

    112KB

  • memory/2028-263-0x0000000008130000-0x0000000008196000-memory.dmp
    Filesize

    408KB

  • memory/2028-262-0x00000000080C0000-0x0000000008126000-memory.dmp
    Filesize

    408KB

  • memory/2028-243-0x00000000079A0000-0x0000000007FC8000-memory.dmp
    Filesize

    6.2MB

  • memory/2028-238-0x00000000052C0000-0x00000000052F6000-memory.dmp
    Filesize

    216KB

  • memory/2248-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-190-0x0000000008790000-0x0000000008AE0000-memory.dmp
    Filesize

    3.3MB

  • memory/2248-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-151-0x0000000000270000-0x00000000002A0000-memory.dmp
    Filesize

    192KB

  • memory/2248-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-157-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-118-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-175-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-181-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-186-0x0000000008530000-0x00000000085DA000-memory.dmp
    Filesize

    680KB

  • memory/2248-187-0x0000000008680000-0x0000000008712000-memory.dmp
    Filesize

    584KB

  • memory/2248-188-0x0000000008760000-0x0000000008782000-memory.dmp
    Filesize

    136KB

  • memory/2248-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-119-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2248-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp
    Filesize

    1.6MB

  • memory/2532-843-0x0000000000000000-mapping.dmp
  • memory/2536-324-0x0000000000000000-mapping.dmp
  • memory/3308-729-0x0000000000402354-mapping.dmp
  • memory/3860-510-0x0000000000402354-mapping.dmp
  • memory/4144-926-0x0000000000402354-mapping.dmp
  • memory/4208-338-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/4208-290-0x0000000000402354-mapping.dmp
  • memory/4244-645-0x0000000000000000-mapping.dmp
  • memory/4244-708-0x00000000086F0000-0x000000000873B000-memory.dmp
    Filesize

    300KB

  • memory/4552-633-0x0000000008700000-0x0000000008A50000-memory.dmp
    Filesize

    3.3MB

  • memory/4872-1124-0x0000000000402354-mapping.dmp
  • memory/4872-1158-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/4936-1040-0x0000000000000000-mapping.dmp
  • memory/5068-544-0x0000000000000000-mapping.dmp