Analysis

  • max time kernel
    152s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 14:45

General

  • Target

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e.exe

  • Size

    168KB

  • MD5

    46b4919ba0db7f014c50736a3c17f160

  • SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

  • SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

  • SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • SSDEEP

    384:AmpUto8E6qhIA8ZfiSM+3/marB4djzuf4uFfTlCTZ94GgR01eEe/tfF1XfvgmraJ:ppUt1E/8mS+amkLFRccny45nHguUL

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 8 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Sets file execution options in registry 2 TTPs 16 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 16 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 9 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e.exe
    "C:\Users\Admin\AppData\Local\Temp\461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\service.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\service.exe"
      2⤵
      • Executes dropped EXE
      • Drops startup file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:4936
    • C:\Windows\M68162\smss.exe
      "C:\Windows\M68162\smss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Drops startup file
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1564
    • C:\Windows\M68162\EmangEloh.exe
      "C:\Windows\M68162\EmangEloh.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Drops startup file
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2920
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\winlogon.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Drops startup file
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\TuxO86060Z.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\TuxO86060Z.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\TuxO86060Z.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\TuxO86060Z.exe

    Filesize

    168KB

    MD5

    72389e9e2971cd7227dd5aa2543d6c73

    SHA1

    ff0de078f2ba2b1392b6f9a01200bf1c5b1e4b3c

    SHA256

    2cbbeef1249170a43854962fa5b19fba628470c70beb9ce23e15a0f05cb891f2

    SHA512

    baea387f255adc194320677b8d2fda5109d12a34003f01ad96ce97c8bb61fd00dfd086944a3af4e5bea708fc063c4afde1204abfd9dd7a09c23b52b72364bee5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\service.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\service.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\winlogon.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O86060Z\winlogon.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\M68162\EmangEloh.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\M68162\EmangEloh.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\M68162\Ja280153bLay.com

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\M68162\smss.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\M68162\smss.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\SysWOW64\440610877205l.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\SysWOW64\X83567go\Z440610cie.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\SysWOW64\X83567go\Z440610cie.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\SysWOW64\X83567go\Z440610cie.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\SysWOW64\X83567go\Z440610cie.cmd

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\Ti877205ta.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\[TheMoonlight].txt

    Filesize

    109B

    MD5

    68c7836c8ff19e87ca33a7959a2bdff5

    SHA1

    cc5d0205bb71c10bbed22fe47e59b1f6817daab7

    SHA256

    883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec

    SHA512

    3656005148788ed7ac8f5b5f8f6f4736c2dc4a94771291170e61666beb81e63be2a1a0f2913233b0e3f12ddfa7f1e89da9cd8323306413395ee78b2ece7fbfe8

  • C:\Windows\[TheMoonlight].txt

    Filesize

    109B

    MD5

    68c7836c8ff19e87ca33a7959a2bdff5

    SHA1

    cc5d0205bb71c10bbed22fe47e59b1f6817daab7

    SHA256

    883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec

    SHA512

    3656005148788ed7ac8f5b5f8f6f4736c2dc4a94771291170e61666beb81e63be2a1a0f2913233b0e3f12ddfa7f1e89da9cd8323306413395ee78b2ece7fbfe8

  • C:\Windows\sa-187511.exe

    Filesize

    168KB

    MD5

    46b4919ba0db7f014c50736a3c17f160

    SHA1

    c1c1221fb7fbaf383cb5cdfa6cf70d90a1e4b8c1

    SHA256

    461cded4fcea13e8003fc1ce5dd4121b10acdfdad5e4317eaf9c0c38b9f62e7e

    SHA512

    4a70803a19f2b4d783da5ded06828aad8d7bbfb5b133f6f5e2935b45a1b2ba8ee6fa8e9744e46342b8e47d37863fd8b19d06ab095c1205ccf886e76cdc03e36a

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\system\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • memory/1564-156-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1564-140-0x0000000000000000-mapping.dmp

  • memory/1564-183-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1840-185-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/1840-170-0x0000000000000000-mapping.dmp

  • memory/1840-175-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2120-181-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2120-132-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2920-174-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/2920-161-0x0000000000000000-mapping.dmp

  • memory/2920-184-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4936-135-0x0000000000000000-mapping.dmp

  • memory/4936-182-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB

  • memory/4936-154-0x0000000000400000-0x0000000000445000-memory.dmp

    Filesize

    276KB