Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 09:46

General

  • Target

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe

  • Size

    32KB

  • MD5

    ebd4ff5dd3b586aa279899a33dbc093b

  • SHA1

    f861dc94a155c8a3d7952c79eca146ef61123c39

  • SHA256

    688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e

  • SHA512

    973561d45cc8e4b31a91f0daf4504f555b34c352fd0d26750b4e3693ee38161881908598e909beaf2c2616b394f2a9dbdf5091158ae7594c09448329ad96dcf6

  • SSDEEP

    192:/Tmxc4FkYQPY7bKTpBVhUkEV/r0rwxk1VY+gkGG2KM/qqleJnJtM3gxU4kzk/xA0:/TAnuAApBVhUfo16oCGvjc8WlD94o6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\688015ef6e32189888233cf986e72d26be26ec234836d839f0ed854387c50a5e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /f /im dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im dl.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c explorer C:\users\public\windows\dl.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Windows\SysWOW64\explorer.exe
        explorer C:\users\public\windows\dl.exe
        3⤵
          PID:832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1824
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1708
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1320
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
          3⤵
          • Adds Run key to start application
          PID:1764
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
        2⤵
          PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c attrib +h +r +s c:\Users\public\windows
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h +r +s c:\Users\public\windows
            3⤵
            • Views/modifies file attributes
            PID:2032
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /f /im file.sys
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im file.sys
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:808
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
          2⤵
            PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
            2⤵
              PID:1536
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
              2⤵
                PID:1332
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                2⤵
                  PID:968
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                  2⤵
                    PID:1268
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                    2⤵
                      PID:1360
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                      2⤵
                        PID:1956
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                        2⤵
                          PID:1280
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                          2⤵
                            PID:1712
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                            2⤵
                              PID:1504
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                              2⤵
                                PID:620
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                2⤵
                                  PID:488
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                  2⤵
                                    PID:1056
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                    2⤵
                                      PID:1492
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                      2⤵
                                        PID:744
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                        2⤵
                                          PID:1944
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                          2⤵
                                            PID:2032
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                            2⤵
                                              PID:1664
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                              2⤵
                                                PID:1560
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                2⤵
                                                  PID:772
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                  2⤵
                                                    PID:1684
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                    2⤵
                                                      PID:1576
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                      2⤵
                                                        PID:552
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                        2⤵
                                                          PID:1612
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                          2⤵
                                                            PID:1180
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                            2⤵
                                                              PID:1648
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                              2⤵
                                                                PID:1420
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                2⤵
                                                                  PID:1184
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                  2⤵
                                                                    PID:808
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                    2⤵
                                                                      PID:1332
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                      2⤵
                                                                        PID:936
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                        2⤵
                                                                          PID:1408
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                          2⤵
                                                                            PID:1700
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time" /t REG_SZ /d "c:\users\public\windows\m.e.exe" /f
                                                                              3⤵
                                                                              • Adds Run key to start application
                                                                              PID:988
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd /c REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                            2⤵
                                                                              PID:944
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run Time2" /t REG_SZ /d "c:\users\public\windows\dl.exe" /f
                                                                                3⤵
                                                                                • Adds Run key to start application
                                                                                PID:856
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              cmd /c C:\users\public\windows\file.sys /stext C:\users\public\windows\Att\log.txt
                                                                              2⤵
                                                                                PID:1616
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c attrib +h +r +s c:\Users\public\windows
                                                                                2⤵
                                                                                  PID:1340
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib +h +r +s c:\Users\public\windows
                                                                                    3⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:1648
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c taskkill /f /im file.sys
                                                                                  2⤵
                                                                                    PID:1180
                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                      taskkill /f /im file.sys
                                                                                      3⤵
                                                                                      • Kills process with taskkill
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:460
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c if exist C:\users\public\windows\windows.exe explorer C:\users\public\windows\windows.exe
                                                                                    2⤵
                                                                                      PID:1800
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c dir C:\ > C:\users\public\windows\Att\abban.txt
                                                                                      2⤵
                                                                                        PID:1964
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c dir B:\ >> C:\users\public\windows\Att\abban.txt
                                                                                        2⤵
                                                                                          PID:1592
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c dir A:\ >> C:\users\public\windows\Att\abban.txt
                                                                                          2⤵
                                                                                            PID:268
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd /c dir D:\ >> C:\users\public\windows\Att\abban.txt
                                                                                            2⤵
                                                                                              PID:608
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c dir R:\ >> C:\users\public\windows\Att\abban.txt
                                                                                              2⤵
                                                                                                PID:1980
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c dir Q:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                2⤵
                                                                                                  PID:1660
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /c dir G:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                  2⤵
                                                                                                    PID:1944
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /c dir H:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                    2⤵
                                                                                                      PID:1408
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c dir I:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                      2⤵
                                                                                                        PID:1580
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c dir J:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                        2⤵
                                                                                                          PID:1444
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c dir K:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                          2⤵
                                                                                                            PID:552
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /c dir L:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                            2⤵
                                                                                                              PID:988
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /c dir N:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                              2⤵
                                                                                                                PID:820
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c dir M:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                2⤵
                                                                                                                  PID:1664
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /c dir O:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                  2⤵
                                                                                                                    PID:1784
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c dir P:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                    2⤵
                                                                                                                      PID:1612
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd /c dir F:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                      2⤵
                                                                                                                        PID:328
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c dir S:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                        2⤵
                                                                                                                          PID:268
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c dir E:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                          2⤵
                                                                                                                            PID:880
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            cmd /c dir T:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                            2⤵
                                                                                                                              PID:1764
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /c dir U:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                              2⤵
                                                                                                                                PID:1064
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c dir V:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                2⤵
                                                                                                                                  PID:1632
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd /c dir W:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                  2⤵
                                                                                                                                    PID:1424
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    cmd /c dir X:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                    2⤵
                                                                                                                                      PID:1948
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      cmd /c dir z:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                      2⤵
                                                                                                                                        PID:1980
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c copy /y C:\users\public\windows\key.sys C:\users\public\windows\Att\key.txt
                                                                                                                                        2⤵
                                                                                                                                          PID:436
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /c dir Y:\ >> C:\users\public\windows\Att\abban.txt
                                                                                                                                          2⤵
                                                                                                                                            PID:1660
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c del /f /q C:\users\public\windows\Att\pic.jpg
                                                                                                                                            2⤵
                                                                                                                                              PID:1516
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c del /f /q C:\users\public\windows\Att\log.txt
                                                                                                                                              2⤵
                                                                                                                                                PID:1664
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                cmd /c del /f /q C:\users\public\windows\Att\key.txt
                                                                                                                                                2⤵
                                                                                                                                                  PID:1932
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  cmd /c del /f /q C:\users\public\windows\Att\abban.txt
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1532
                                                                                                                                                • C:\Windows\explorer.exe
                                                                                                                                                  C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                  • Modifies Internet Explorer settings
                                                                                                                                                  • Modifies registry class
                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                  PID:1804

                                                                                                                                                Network

                                                                                                                                                MITRE ATT&CK Enterprise v6

                                                                                                                                                Replay Monitor

                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                Downloads

                                                                                                                                                • memory/268-58-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/268-118-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/460-114-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/488-82-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/552-93-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/608-119-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/620-81-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/744-84-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/772-90-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/808-64-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/808-102-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/832-65-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/832-69-0x00000000757B1000-0x00000000757B3000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/832-70-0x00000000744B1000-0x00000000744B3000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/856-112-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/936-104-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/944-107-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/968-74-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/988-111-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1056-83-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1180-110-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1180-95-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1184-98-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1268-75-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1280-78-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1320-59-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1332-73-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1332-103-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1340-108-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1340-71-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1360-76-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1408-123-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1408-105-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1420-97-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1492-85-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1504-80-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1532-57-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1536-72-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1560-63-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1560-89-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1576-92-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1580-124-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1592-117-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1612-94-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1616-109-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1648-113-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1648-96-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1660-121-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1664-88-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1680-62-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1684-91-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1700-106-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1708-68-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1712-79-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1736-56-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1764-67-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1800-115-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1804-99-0x000007FEFB851000-0x000007FEFB853000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  8KB

                                                                                                                                                • memory/1804-61-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1804-100-0x00000000039C0000-0x00000000039D0000-memory.dmp

                                                                                                                                                  Filesize

                                                                                                                                                  64KB

                                                                                                                                                • memory/1824-60-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1944-122-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1944-86-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1956-77-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1964-116-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/1980-120-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/2032-66-0x0000000000000000-mapping.dmp

                                                                                                                                                • memory/2032-87-0x0000000000000000-mapping.dmp