Analysis
-
max time kernel
189s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 18:20
Static task
static1
Behavioral task
behavioral1
Sample
8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe
Resource
win7-20220812-en
General
-
Target
8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe
-
Size
47KB
-
MD5
47745465eab87d74b14632b53cf79e70
-
SHA1
3aed1513325c9cc0462b3cdc0d38b03098d7a793
-
SHA256
8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5
-
SHA512
01230016af0e1214813e17f6c7f6794f8196e8bc479c5a8c2d993c4a091d44968fd48b9b9b4a2b120f3f0297640342d37258d05b8b329b4574b0b5b3fbbe55b8
-
SSDEEP
768:LrZ1wQ/gm2sWUCSSDaXdF+lF7P7J5reaCn+9JO2shY8PLUpb6VPvYqBN6cNFfAXr:Z1w+nWpSY+A37feaCMJDmYsLIb4PvYqy
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2364 msedge.exe 2364 msedge.exe 1744 msedge.exe 1744 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exemsedge.exemsedge.exedescription pid process target process PID 4416 wrote to memory of 3920 4416 8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe msedge.exe PID 4416 wrote to memory of 3920 4416 8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe msedge.exe PID 3920 wrote to memory of 4724 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 4724 3920 msedge.exe msedge.exe PID 4416 wrote to memory of 1416 4416 8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe msedge.exe PID 4416 wrote to memory of 1416 4416 8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe msedge.exe PID 1416 wrote to memory of 3004 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3004 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 1416 wrote to memory of 3336 1416 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe PID 3920 wrote to memory of 2280 3920 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe"C:\Users\Admin\AppData\Local\Temp\8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd85c446f8,0x7ffd85c44708,0x7ffd85c447183⤵PID:4724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17195924856581376492,14801854219308165195,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:23⤵PID:2280
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17195924856581376492,14801854219308165195,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=8f52fb745d5d98ec80d8159f343886e356bd478ad7bf2addcd55cde1faebece5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd85c446f8,0x7ffd85c44708,0x7ffd85c447183⤵PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:23⤵PID:3336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:83⤵PID:2800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:13⤵PID:1168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:13⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4420 /prefetch:13⤵PID:3612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4752 /prefetch:83⤵PID:3636
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:13⤵PID:3356
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,732313941997524118,8332942538723121668,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:13⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECEFilesize
471B
MD53440eb375c0ced7c152c865a20565dcf
SHA153e768bed9b7a9a29663806364fa406af1df70bb
SHA2561d7c8375529c9850492903c29de8e85ffda34250f032882ef3beaf147eb8c343
SHA5123a268be9068f887bafec850ad43b3b10556443ce4b23907c9ee2fc08403aa49df1480897b18b84e514aa0f62b8b796de2d0f2f4fa1006ea6b3be8de70b96c97b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_E503B048B745DFA14B81FCFC68D6DECEFilesize
446B
MD509fbe1643982b77cec2a5f2877423e14
SHA17dd6b18e022ce69b6bec1337ef481746448d5991
SHA256ad194d17b0f44a6c5a4a46a5ad5d5607a78051580c1d0314e90837b8790f387d
SHA5124e7c7ccc2e5e2d3267dfdc236ced1ca4cd53f64a7e2cdf5048527e7210078171711920e572ed25eb8858e0ca9c446e936c5c1b21bcb9c99e4306ba5de4d56dc2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d492567d4611438b2f936ddcaa9544ef
SHA1ae88af380bbeb5e05a0446163a5434d70710f853
SHA2560cba2ccfcfff09f076de767bf8df52485a8ac4b29cd3d14d53b23fdad2da3645
SHA512150794b8598594ac00f827996e62d84b9331f1e35386e908485181204e823e8e5802fa543b53aca4d3046d176eaf4ee1dcb4df211589ea2fedac46170f162f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d492567d4611438b2f936ddcaa9544ef
SHA1ae88af380bbeb5e05a0446163a5434d70710f853
SHA2560cba2ccfcfff09f076de767bf8df52485a8ac4b29cd3d14d53b23fdad2da3645
SHA512150794b8598594ac00f827996e62d84b9331f1e35386e908485181204e823e8e5802fa543b53aca4d3046d176eaf4ee1dcb4df211589ea2fedac46170f162f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d492567d4611438b2f936ddcaa9544ef
SHA1ae88af380bbeb5e05a0446163a5434d70710f853
SHA2560cba2ccfcfff09f076de767bf8df52485a8ac4b29cd3d14d53b23fdad2da3645
SHA512150794b8598594ac00f827996e62d84b9331f1e35386e908485181204e823e8e5802fa543b53aca4d3046d176eaf4ee1dcb4df211589ea2fedac46170f162f48
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD518ad3a99cbd5ddc6b806e98374137f92
SHA103b6e4402a81fc0585430539a6d4a208b6ca9020
SHA256b4f8afdb8ec7975ab4f4bff3a5c1fcab389dee2b9eb38b9603099d500457145f
SHA512faabf3e957ee6516f8e66a1decfb2279e3923f63d0bc3f4f6aa5082b84feba57e48d0c631800b962567313b26d6cb92192a29eef6faf7b0be01894233b4929b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD518ad3a99cbd5ddc6b806e98374137f92
SHA103b6e4402a81fc0585430539a6d4a208b6ca9020
SHA256b4f8afdb8ec7975ab4f4bff3a5c1fcab389dee2b9eb38b9603099d500457145f
SHA512faabf3e957ee6516f8e66a1decfb2279e3923f63d0bc3f4f6aa5082b84feba57e48d0c631800b962567313b26d6cb92192a29eef6faf7b0be01894233b4929b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD56342feed7bf82de1753327912f433369
SHA1f44f7efa6e27b822f94114e4ff4596f401702ab0
SHA25615011648056a446c48a1b397f50ef119dfbe2bcfde5763b0b236cd71b2975155
SHA5123a0b9b5588bf9e1b69a1bcec8d40152b25c028e6a7eba61d70f5c899001ece065c45d239db2bed26300df680aae5e51a27717d16af8bc42e786593bede9d3986
-
\??\pipe\LOCAL\crashpad_1416_BUSRDBHJCCSTSZXBMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3920_FLOOFMYGSVNXJGABMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/516-167-0x0000000000000000-mapping.dmp
-
memory/1168-156-0x0000000000000000-mapping.dmp
-
memory/1416-135-0x0000000000000000-mapping.dmp
-
memory/1732-158-0x0000000000000000-mapping.dmp
-
memory/1744-147-0x0000000000000000-mapping.dmp
-
memory/2280-145-0x0000000000000000-mapping.dmp
-
memory/2364-146-0x0000000000000000-mapping.dmp
-
memory/2800-151-0x0000000000000000-mapping.dmp
-
memory/3004-136-0x0000000000000000-mapping.dmp
-
memory/3336-143-0x0000000000000000-mapping.dmp
-
memory/3356-165-0x0000000000000000-mapping.dmp
-
memory/3612-160-0x0000000000000000-mapping.dmp
-
memory/3636-163-0x0000000000000000-mapping.dmp
-
memory/3920-133-0x0000000000000000-mapping.dmp
-
memory/4416-132-0x0000000000520000-0x0000000000530000-memory.dmpFilesize
64KB
-
memory/4416-138-0x0000000000520000-0x0000000000530000-memory.dmpFilesize
64KB
-
memory/4724-134-0x0000000000000000-mapping.dmp