Analysis

  • max time kernel
    152s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 02:56

General

  • Target

    a60b5bd7a8ba8c27cb40fd25829a897fba3c037f654845e71714a365303eb94d.exe

  • Size

    520KB

  • MD5

    6a9da124816ebec2f749a3adb530aac0

  • SHA1

    9ff77e9c38b539543656277fff5bcc9145eebb24

  • SHA256

    a60b5bd7a8ba8c27cb40fd25829a897fba3c037f654845e71714a365303eb94d

  • SHA512

    be24d501cc3c2bafbcbdd19e0190c2b51eee6bf3fb69d971f1aced3b8d07fe21c94598619b73a0f18ec069950037fff45ac7fa30db2aba1f63c2f70eac7abe59

  • SSDEEP

    12288:jw5GA6wigctwxaJOri8KuMhEAF/Lc0CTbkwnj3Zz:s5KwTIzJSPK/hHjXoBj3Zz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 11 IoCs
  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 51 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Suspicious use of UnmapMainImage
    PID:336
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies WinLogon for persistence
    PID:1416
    • C:\Users\Admin\AppData\Local\Temp\a60b5bd7a8ba8c27cb40fd25829a897fba3c037f654845e71714a365303eb94d.exe
      "C:\Users\Admin\AppData\Local\Temp\a60b5bd7a8ba8c27cb40fd25829a897fba3c037f654845e71714a365303eb94d.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Users\Admin\jdFfFL.exe
        C:\Users\Admin\jdFfFL.exe
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Users\Admin\foewux.exe
          "C:\Users\Admin\foewux.exe"
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:112
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del jdFfFL.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2012
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            5⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:1968
      • C:\Users\Admin\2sag.exe
        C:\Users\Admin\2sag.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Users\Admin\2sag.exe
          "C:\Users\Admin\2sag.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1768
        • C:\Users\Admin\2sag.exe
          "C:\Users\Admin\2sag.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:1332
        • C:\Users\Admin\2sag.exe
          "C:\Users\Admin\2sag.exe"
          4⤵
          • Executes dropped EXE
          • Maps connected drives based on registry
          • Suspicious behavior: EnumeratesProcesses
          PID:1836
        • C:\Users\Admin\2sag.exe
          "C:\Users\Admin\2sag.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1676
        • C:\Users\Admin\2sag.exe
          "C:\Users\Admin\2sag.exe"
          4⤵
          • Executes dropped EXE
          PID:1684
      • C:\Users\Admin\3sag.exe
        C:\Users\Admin\3sag.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1596
        • C:\Users\Admin\AppData\Local\41c40e2a\X
          *0*bc*1ad866f3*31.193.3.240:53
          4⤵
          • Executes dropped EXE
          PID:1068
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
            PID:1800
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c tasklist&&del a60b5bd7a8ba8c27cb40fd25829a897fba3c037f654845e71714a365303eb94d.exe
          3⤵
          • Deletes itself
          PID:1896
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:1380

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • C:\Users\Admin\3sag.exe

            Filesize

            279KB

            MD5

            bc605c3a569330b1b08106d694366d7c

            SHA1

            71ee2d38c8da32dea44ad2c254a1499b98333a92

            SHA256

            84205e9b8a9ed3bc40be0cb2fb17d8ab16de65c01c282bdb664846940749661d

            SHA512

            b70fc535e7638d326e852ab79e5d328d4c5f111b8a8af4b58da01754ecb77465f5c62c3f68c72573a1e4b6345393862f5e6e3b269754fe1feaf5ba8b86c17d4c

          • C:\Users\Admin\3sag.exe

            Filesize

            279KB

            MD5

            bc605c3a569330b1b08106d694366d7c

            SHA1

            71ee2d38c8da32dea44ad2c254a1499b98333a92

            SHA256

            84205e9b8a9ed3bc40be0cb2fb17d8ab16de65c01c282bdb664846940749661d

            SHA512

            b70fc535e7638d326e852ab79e5d328d4c5f111b8a8af4b58da01754ecb77465f5c62c3f68c72573a1e4b6345393862f5e6e3b269754fe1feaf5ba8b86c17d4c

          • C:\Users\Admin\AppData\Local\41c40e2a\X

            Filesize

            38KB

            MD5

            72de2dadaf875e2fd7614e100419033c

            SHA1

            5f17c5330e91a42daa9ff24c4aa602bd1a72bf6e

            SHA256

            c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381

            SHA512

            e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3

          • C:\Users\Admin\foewux.exe

            Filesize

            216KB

            MD5

            fa5e58c32758236aa8cc01b3be13d1e1

            SHA1

            3c5dca49061a2e6181322fe128ae7e7ca7570b76

            SHA256

            067ee5242706ab6bddf74df1007bb23fd6abbd67af8b8eb0bf7df014928d66c0

            SHA512

            b9f112e81ce92595ba33cc7dc2b9319ab60106333bea4d71f24f626dbaefec339d14af9f4f08ad5f455596bc0e1da377fc4e44157ce2f80601aaedd32779bab0

          • C:\Users\Admin\foewux.exe

            Filesize

            216KB

            MD5

            fa5e58c32758236aa8cc01b3be13d1e1

            SHA1

            3c5dca49061a2e6181322fe128ae7e7ca7570b76

            SHA256

            067ee5242706ab6bddf74df1007bb23fd6abbd67af8b8eb0bf7df014928d66c0

            SHA512

            b9f112e81ce92595ba33cc7dc2b9319ab60106333bea4d71f24f626dbaefec339d14af9f4f08ad5f455596bc0e1da377fc4e44157ce2f80601aaedd32779bab0

          • C:\Users\Admin\jdFfFL.exe

            Filesize

            216KB

            MD5

            5a9281e62a888f4ea82402cec883292d

            SHA1

            b997d0f7f8aecd9730b03f5e5b6b63466890ae94

            SHA256

            cd3b178a6469ddb3bf95a7425a2dbf77a71cb83d813509dcbc2357263693cd23

            SHA512

            99f6248391a17417fe6ca166a72203e44e3ebd31d1fd25e5dc45513ebd7d974a73184854c79baaeba59becf702d3f248c33b69361d36f03647dce177c324678b

          • C:\Users\Admin\jdFfFL.exe

            Filesize

            216KB

            MD5

            5a9281e62a888f4ea82402cec883292d

            SHA1

            b997d0f7f8aecd9730b03f5e5b6b63466890ae94

            SHA256

            cd3b178a6469ddb3bf95a7425a2dbf77a71cb83d813509dcbc2357263693cd23

            SHA512

            99f6248391a17417fe6ca166a72203e44e3ebd31d1fd25e5dc45513ebd7d974a73184854c79baaeba59becf702d3f248c33b69361d36f03647dce177c324678b

          • C:\Windows\system32\consrv.dll

            Filesize

            29KB

            MD5

            1149c1bd71248a9d170e4568fb08df30

            SHA1

            6f77f183d65709901f476c5d6eebaed060a495f9

            SHA256

            c2dcf387cb4d218f50463338291e7db38afbdab9aab88fc54e7f9283df1792d1

            SHA512

            9e6eac8facb23b38552d37c9f3cb24098f871d2885ecb3630fcd0199c5600b12a42f095f9fbeb90e5632496491d46fd987660cdda695e92dc386bd482d3ff459

          • \Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • \Users\Admin\2sag.exe

            Filesize

            128KB

            MD5

            924fe045ea0c544f82d322b9e370da60

            SHA1

            68ef8b8426fc7f53318cfbf648803aec7429e352

            SHA256

            480074c9252e605d8d4f80f40cf9d5e50eec6ebe30f414694aaf6375f1884e6d

            SHA512

            0d29eb10e5a7ca297319943fc017790371f1ac6c419651a89822121c91dda7d137720a7d5d8ee67e0ec457e882b603dbfb9b4f8c755f43b58b1dce0c35490fa2

          • \Users\Admin\3sag.exe

            Filesize

            279KB

            MD5

            bc605c3a569330b1b08106d694366d7c

            SHA1

            71ee2d38c8da32dea44ad2c254a1499b98333a92

            SHA256

            84205e9b8a9ed3bc40be0cb2fb17d8ab16de65c01c282bdb664846940749661d

            SHA512

            b70fc535e7638d326e852ab79e5d328d4c5f111b8a8af4b58da01754ecb77465f5c62c3f68c72573a1e4b6345393862f5e6e3b269754fe1feaf5ba8b86c17d4c

          • \Users\Admin\3sag.exe

            Filesize

            279KB

            MD5

            bc605c3a569330b1b08106d694366d7c

            SHA1

            71ee2d38c8da32dea44ad2c254a1499b98333a92

            SHA256

            84205e9b8a9ed3bc40be0cb2fb17d8ab16de65c01c282bdb664846940749661d

            SHA512

            b70fc535e7638d326e852ab79e5d328d4c5f111b8a8af4b58da01754ecb77465f5c62c3f68c72573a1e4b6345393862f5e6e3b269754fe1feaf5ba8b86c17d4c

          • \Users\Admin\AppData\Local\41c40e2a\X

            Filesize

            38KB

            MD5

            72de2dadaf875e2fd7614e100419033c

            SHA1

            5f17c5330e91a42daa9ff24c4aa602bd1a72bf6e

            SHA256

            c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381

            SHA512

            e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3

          • \Users\Admin\AppData\Local\41c40e2a\X

            Filesize

            38KB

            MD5

            72de2dadaf875e2fd7614e100419033c

            SHA1

            5f17c5330e91a42daa9ff24c4aa602bd1a72bf6e

            SHA256

            c44993768a4dc5a58ddbfc9cb05ce2a7d3a0a56be45643d70a72bcf811b6c381

            SHA512

            e2520a53326a7d3b056e65d0cf60e9d823ffb34ca026cdddc7ea3a714f8396c53c37e13a887fc86a7dd7076c97fdfad53c3f5a68342ebc1bdec948c76bda8df3

          • \Users\Admin\foewux.exe

            Filesize

            216KB

            MD5

            fa5e58c32758236aa8cc01b3be13d1e1

            SHA1

            3c5dca49061a2e6181322fe128ae7e7ca7570b76

            SHA256

            067ee5242706ab6bddf74df1007bb23fd6abbd67af8b8eb0bf7df014928d66c0

            SHA512

            b9f112e81ce92595ba33cc7dc2b9319ab60106333bea4d71f24f626dbaefec339d14af9f4f08ad5f455596bc0e1da377fc4e44157ce2f80601aaedd32779bab0

          • \Users\Admin\foewux.exe

            Filesize

            216KB

            MD5

            fa5e58c32758236aa8cc01b3be13d1e1

            SHA1

            3c5dca49061a2e6181322fe128ae7e7ca7570b76

            SHA256

            067ee5242706ab6bddf74df1007bb23fd6abbd67af8b8eb0bf7df014928d66c0

            SHA512

            b9f112e81ce92595ba33cc7dc2b9319ab60106333bea4d71f24f626dbaefec339d14af9f4f08ad5f455596bc0e1da377fc4e44157ce2f80601aaedd32779bab0

          • \Users\Admin\jdFfFL.exe

            Filesize

            216KB

            MD5

            5a9281e62a888f4ea82402cec883292d

            SHA1

            b997d0f7f8aecd9730b03f5e5b6b63466890ae94

            SHA256

            cd3b178a6469ddb3bf95a7425a2dbf77a71cb83d813509dcbc2357263693cd23

            SHA512

            99f6248391a17417fe6ca166a72203e44e3ebd31d1fd25e5dc45513ebd7d974a73184854c79baaeba59becf702d3f248c33b69361d36f03647dce177c324678b

          • \Users\Admin\jdFfFL.exe

            Filesize

            216KB

            MD5

            5a9281e62a888f4ea82402cec883292d

            SHA1

            b997d0f7f8aecd9730b03f5e5b6b63466890ae94

            SHA256

            cd3b178a6469ddb3bf95a7425a2dbf77a71cb83d813509dcbc2357263693cd23

            SHA512

            99f6248391a17417fe6ca166a72203e44e3ebd31d1fd25e5dc45513ebd7d974a73184854c79baaeba59becf702d3f248c33b69361d36f03647dce177c324678b

          • \Windows\System32\consrv.dll

            Filesize

            29KB

            MD5

            1149c1bd71248a9d170e4568fb08df30

            SHA1

            6f77f183d65709901f476c5d6eebaed060a495f9

            SHA256

            c2dcf387cb4d218f50463338291e7db38afbdab9aab88fc54e7f9283df1792d1

            SHA512

            9e6eac8facb23b38552d37c9f3cb24098f871d2885ecb3630fcd0199c5600b12a42f095f9fbeb90e5632496491d46fd987660cdda695e92dc386bd482d3ff459

          • \systemroot\assembly\tmp\{1B372133-BFFA-4dba-9CCF-5474BED6A9F6}

            Filesize

            2KB

            MD5

            744bea559cde36e7dcfec62f1b4d1949

            SHA1

            ec14ff43bd1e63bb43e7df9ccaba3b76a0796c23

            SHA256

            719e5e253059c12a4784bdcbacceae6daf74a59d200e5679e9a92fe509d15a70

            SHA512

            f82d9cf9275139714db53c623a30695ad89aa19f479c4518e8a901d57aa91f421eda73389f7330dfeb99b2828d10c797b7d9b63db561254d2c46b42898ca0f04

          • memory/336-155-0x0000000000B40000-0x0000000000B4B000-memory.dmp

            Filesize

            44KB

          • memory/1332-93-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-95-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-100-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-101-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-90-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-89-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1332-123-0x0000000000400000-0x000000000040E000-memory.dmp

            Filesize

            56KB

          • memory/1416-146-0x0000000002220000-0x0000000002226000-memory.dmp

            Filesize

            24KB

          • memory/1416-174-0x0000000002630000-0x000000000263B000-memory.dmp

            Filesize

            44KB

          • memory/1416-150-0x0000000002220000-0x0000000002226000-memory.dmp

            Filesize

            24KB

          • memory/1416-142-0x0000000002220000-0x0000000002226000-memory.dmp

            Filesize

            24KB

          • memory/1416-164-0x0000000002620000-0x000000000262B000-memory.dmp

            Filesize

            44KB

          • memory/1416-160-0x0000000002620000-0x000000000262B000-memory.dmp

            Filesize

            44KB

          • memory/1416-168-0x0000000002620000-0x000000000262B000-memory.dmp

            Filesize

            44KB

          • memory/1416-173-0x0000000002220000-0x0000000002228000-memory.dmp

            Filesize

            32KB

          • memory/1416-177-0x0000000002220000-0x0000000002228000-memory.dmp

            Filesize

            32KB

          • memory/1596-171-0x0000000030670000-0x00000000306C2000-memory.dmp

            Filesize

            328KB

          • memory/1596-140-0x0000000030670000-0x00000000306C2000-memory.dmp

            Filesize

            328KB

          • memory/1596-152-0x00000000003BC000-0x00000000003F2000-memory.dmp

            Filesize

            216KB

          • memory/1596-151-0x0000000030670000-0x00000000306C2000-memory.dmp

            Filesize

            328KB

          • memory/1596-141-0x00000000003BC000-0x00000000003F2000-memory.dmp

            Filesize

            216KB

          • memory/1596-172-0x00000000003BC000-0x00000000003F2000-memory.dmp

            Filesize

            216KB

          • memory/1676-126-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1676-115-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1676-133-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1676-119-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1676-129-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1676-116-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-120-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-82-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-94-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-91-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-85-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-83-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-84-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1768-139-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/1788-56-0x0000000076201000-0x0000000076203000-memory.dmp

            Filesize

            8KB

          • memory/1836-106-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-105-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-108-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-118-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-117-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-125-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB

          • memory/1836-109-0x0000000000400000-0x0000000000427000-memory.dmp

            Filesize

            156KB