Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 01:38

General

  • Target

    05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe

  • Size

    536KB

  • MD5

    4ab05f44a4ee4aeef3fffd08cf3897d0

  • SHA1

    51b28c7b2f16458ef3a86e50014902c02a9e5001

  • SHA256

    05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0

  • SHA512

    fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0

  • SSDEEP

    12288:YqXg1EBXgR86OJqW3o8p8BS0TPt9yJLFk6A/sJJeio:YqFBwODYW3Vp8MA0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 64 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 14 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe
    "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe
      "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Looks for VirtualBox Guest Additions in registry
      • Adds policy Run key to start application
      • Looks for VMWare Tools registry key
      • Checks BIOS information in registry
      • Drops startup file
      • Adds Run key to start application
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • Modifies Control Panel
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-update_flash"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetWindowsHookEx
          PID:712
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session oCHi5REMERgesJsRZKBNsaNf9Rk3c"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1068
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session vRvDJi5XQrvWJC7mn7o0yQNWQl5Fr"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2416
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session zPhxTabLyHmEghDdnbeezHrDtd0UK"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4240
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session L6rQuma9VwjgE5HmXye1dX5draZFd"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2708
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session GZ9rnt4bR2Xuz0BPoTMIrzy7gvZkb"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:724
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe" -standalone 131074 "-new_session xljmp7JNoBadcswvWxJzxSk3nNMXr"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Modifies Internet Explorer Protected Mode
          • Modifies Internet Explorer Protected Mode Banner
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:5012
      • C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe" "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe
          "C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe" "C:\Users\Admin\AppData\Local\Temp\05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0.exe"
          4⤵
          • Executes dropped EXE
          PID:3984
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ping 127.0.0.1 >> nul
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          PID:2704
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\VRjtUqVreS-cuxsFcGaxRX.dat

    Filesize

    418B

    MD5

    d9530ba83b86167130cb24ca6feac323

    SHA1

    964e3c5391d77b494ea0808c6829406410142e21

    SHA256

    af936cc3f1984c4d6ef2ce69d9173b83ba43620018f27efbaadfbc15d6248909

    SHA512

    becd847b79d3a34acc993baa1cd501f3c5a5e885bb145781fbe1ff0c6599d1304d23ce9308eaa3770ed089464d24923a4f41837e735bbb2ddd30e24af461a13e

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\VpbTA236JZZ2nvhifFEnIqZByu.dat

    Filesize

    6KB

    MD5

    a4052bdcf80bee0f23722e80e6c8d1e9

    SHA1

    c75d4c259a3e812880e88e9b5cefba08aff00108

    SHA256

    3998abd9420d2471469d5a90467b80d9997a5a4c258dbcb803b77c54db815605

    SHA512

    c41a492f34b694fe5770e6cd1b0eed1bf5c3310aa3cb28e6eebd46d6a7768dc59a2bf61afeaf878c9bc250b3a2f3ee65157acb048f25c2fc55bd82cce5ff1e38

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\X-Jc7X5QmTq9NE.dat

    Filesize

    130KB

    MD5

    c50ebde27a37043adfc02088d0e1df0c

    SHA1

    a91412fc3b8da190220ce391ac31b101a3e9e2b7

    SHA256

    43da1b1079db22dd00fa51436e564756efddcdd700d478cbf7bf11558135bb29

    SHA512

    e8d72da6c4ab7d3c8858dd31849ccb56cde470822656928b4a9b002afc1c20bf4a9781e589a8bc1acfebed9a4de9eaa2c8bcc1f3707c2bb08d4bf4c6513e732f

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\prPr05wBhQtWzGzEF.dat

    Filesize

    21KB

    MD5

    5cac788b63d3b05256d740ae100f7b0a

    SHA1

    0d208e75b0c5f2bb754c88bd1d9e921b2a0d49c8

    SHA256

    9677ed3bca1487fef56589350d0552ccf8b19fab1e9a1ef6a54b5b11ce9e9435

    SHA512

    52b126ad8538d6e08bc7fd5cf956b49e4364116419f454880cb7bc45d15a3ae1f1693a51b91e35d223685915b45e70e5669735e13d4fd3d793614a16ec3885d4

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\wk4mJZgF0PAQBkF7Ov.dat

    Filesize

    48KB

    MD5

    0795a4f9c08083a96043ed4d35170e62

    SHA1

    b72d342a98550125067f5e3a6d54ef8acf8038e9

    SHA256

    a265443dcded8bcf82a0297739cbb92fa2942dcb0718dcd3ed8dc79a6336cdb7

    SHA512

    e10f71133e6cba31c61e5e8ede44485762b3771f6eafe07d43594ef2653f5eab4b9545095a6595ee4ccb9cb8847c4cc95aba520212cf477ab938325a6852a86f

  • C:\$Recycle.bin\S-1-5-21-929662420-1054238289-2961194603-1000\$ast-S-1-5-21-929662420-1054238289-2961194603-1000\ybNshNp3RqZxUn-r07Cw0BIiqGq.dat

    Filesize

    423B

    MD5

    25a981d9f0b12c3ba6060d2d3bdd3d9a

    SHA1

    374f07dd3dfae18d4eb7513b134bddf77b531662

    SHA256

    d13ef927e28df4bfa0030c381a8a51681d58cfd602d1d9a49a5484bb30aa8ae3

    SHA512

    483ee193dceb400f9f8efc5a1582d4a4a14ebdcee4d179f0d270b0377bb07bff558d4b4110c979699f799374826e70b15880c8c13a89002366574593b026474e

  • C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe

    Filesize

    536KB

    MD5

    4ab05f44a4ee4aeef3fffd08cf3897d0

    SHA1

    51b28c7b2f16458ef3a86e50014902c02a9e5001

    SHA256

    05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0

    SHA512

    fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0

  • C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe

    Filesize

    536KB

    MD5

    4ab05f44a4ee4aeef3fffd08cf3897d0

    SHA1

    51b28c7b2f16458ef3a86e50014902c02a9e5001

    SHA256

    05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0

    SHA512

    fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0

  • C:\Users\Admin\AppData\Local\Temp\tmpD1AC.exe

    Filesize

    536KB

    MD5

    4ab05f44a4ee4aeef3fffd08cf3897d0

    SHA1

    51b28c7b2f16458ef3a86e50014902c02a9e5001

    SHA256

    05c3352049b6200b125229a07e514b859c6898f71f91f4dc8489c8641616ffd0

    SHA512

    fb5a8399c8275a1ab1c355e6daf1a3ae5c565bcf44d52a02ea1f4e2cf66db59249942acc49a2a84368fee685e793a334c00b7fe63cdc974d23f36cab9c8641c0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\IEUpdate\chkdsk.exe

    Filesize

    131KB

    MD5

    565610e8824c6d659cf326d10c43a57e

    SHA1

    99f064329cc6a775b6e79053cfeade56ca732c91

    SHA256

    16974851edd8c910e399da07159335c405a40e996fdfee2e2320687451cbc2ee

    SHA512

    4d9419b15fb69778bf06a37b5ac82371a4acceeb3413b3aa129613fa15563241112e3ab3876ca321c61ba784919dfbb200fe34dae99b347a07436a74f70fac48

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\chkdsk.lnk

    Filesize

    1KB

    MD5

    f65c54aaee86c19a7259eef0d49f9a85

    SHA1

    a31f68c2801230595654128654ed93f03f31bfe8

    SHA256

    eb49ebd4a4ed258a4b0fd1940f214580c3eb924a7c714f89bd016f46fe1338eb

    SHA512

    9a45c6405da905ee6c31c78946e7257c166bf53a3791d74e39683fd93cbab89e558fa94a0efffa8b4629085c80d56f7882d9ac6e5f71d4d4d00c859b2a990b36

  • memory/712-172-0x0000000002E20000-0x0000000002E30000-memory.dmp

    Filesize

    64KB

  • memory/712-165-0x00000000031EC000-0x00000000031F0000-memory.dmp

    Filesize

    16KB

  • memory/724-205-0x00000000031DB000-0x00000000031DF000-memory.dmp

    Filesize

    16KB

  • memory/724-208-0x0000000000C80000-0x0000000000C90000-memory.dmp

    Filesize

    64KB

  • memory/724-204-0x00000000031DB000-0x00000000031DF000-memory.dmp

    Filesize

    16KB

  • memory/724-209-0x0000000000C80000-0x0000000000C90000-memory.dmp

    Filesize

    64KB

  • memory/1068-178-0x0000000000880000-0x0000000000890000-memory.dmp

    Filesize

    64KB

  • memory/1068-169-0x00000000008AE000-0x00000000008B1000-memory.dmp

    Filesize

    12KB

  • memory/1068-175-0x0000000000880000-0x0000000000890000-memory.dmp

    Filesize

    64KB

  • memory/1068-170-0x00000000008AE000-0x00000000008B1000-memory.dmp

    Filesize

    12KB

  • memory/2108-167-0x00000000036A0000-0x00000000036AB000-memory.dmp

    Filesize

    44KB

  • memory/2108-168-0x0000000003F40000-0x0000000003F50000-memory.dmp

    Filesize

    64KB

  • memory/2108-176-0x00000000036A0000-0x00000000036AB000-memory.dmp

    Filesize

    44KB

  • memory/2108-177-0x0000000003540000-0x0000000003640000-memory.dmp

    Filesize

    1024KB

  • memory/2108-171-0x0000000003540000-0x0000000003640000-memory.dmp

    Filesize

    1024KB

  • memory/2168-133-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2168-137-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2168-135-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2168-147-0x0000000000400000-0x0000000000446000-memory.dmp

    Filesize

    280KB

  • memory/2416-186-0x0000000000800000-0x0000000000810000-memory.dmp

    Filesize

    64KB

  • memory/2416-185-0x0000000000800000-0x0000000000810000-memory.dmp

    Filesize

    64KB

  • memory/2416-182-0x00000000012AB000-0x00000000012AF000-memory.dmp

    Filesize

    16KB

  • memory/2416-181-0x00000000012AB000-0x00000000012AF000-memory.dmp

    Filesize

    16KB

  • memory/2708-196-0x000000000314E000-0x0000000003151000-memory.dmp

    Filesize

    12KB

  • memory/2708-197-0x000000000314E000-0x0000000003151000-memory.dmp

    Filesize

    12KB

  • memory/2708-200-0x0000000000F70000-0x0000000000F80000-memory.dmp

    Filesize

    64KB

  • memory/2708-201-0x0000000000F70000-0x0000000000F80000-memory.dmp

    Filesize

    64KB

  • memory/3048-166-0x0000000002BB0000-0x0000000002BD5000-memory.dmp

    Filesize

    148KB

  • memory/4240-193-0x00000000016D0000-0x00000000016E0000-memory.dmp

    Filesize

    64KB

  • memory/4240-192-0x00000000016D0000-0x00000000016E0000-memory.dmp

    Filesize

    64KB

  • memory/4240-189-0x0000000003236000-0x000000000323E000-memory.dmp

    Filesize

    32KB

  • memory/4844-136-0x0000000002220000-0x000000000227A000-memory.dmp

    Filesize

    360KB

  • memory/5012-212-0x0000000002A8B000-0x0000000002A8F000-memory.dmp

    Filesize

    16KB

  • memory/5012-213-0x0000000002A8B000-0x0000000002A8F000-memory.dmp

    Filesize

    16KB

  • memory/5012-216-0x0000000000980000-0x0000000000990000-memory.dmp

    Filesize

    64KB