Analysis

  • max time kernel
    247s
  • max time network
    336s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 15:34

General

  • Target

    19edce478b816ebfcb1bb24e17caa7038441a54ce5ffc69252906434be7804f7.exe

  • Size

    804KB

  • MD5

    215a73694f6bf62eeb0914c9c7a9e14a

  • SHA1

    6b10634feb8c3ecf7ea30e082611afc0d5f02507

  • SHA256

    19edce478b816ebfcb1bb24e17caa7038441a54ce5ffc69252906434be7804f7

  • SHA512

    7db0879b93987fbb94cc432900a30e42ed304cd172f96e78b629184c3378db17058f8adca5d3cb9b57c5273e59875753711326184c95c36b75c09e01a8fcc052

  • SSDEEP

    24576:omOMSPEGXtj8ykbNp9njOjAjaeYfso5zOz8:GPvt29nbuegaz8

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 13 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19edce478b816ebfcb1bb24e17caa7038441a54ce5ffc69252906434be7804f7.exe
    "C:\Users\Admin\AppData\Local\Temp\19edce478b816ebfcb1bb24e17caa7038441a54ce5ffc69252906434be7804f7.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:520
    • C:\WINDOWS\svchos.exe
      "C:\WINDOWS\svchos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\WINDOWS\svchos.EXE
        "C:\WINDOWS\svchos.EXE"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1196
        • C:\WINDOWS\svchos.eXe
          "C:\WINDOWS\svchos.eXe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:560
          • C:\Windows\SysWOW64\dphdbb.exe
            C:\Windows\system32\dphdbb.exe 492 "C:\WINDOWS\svchos.eXe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2032
            • C:\Windows\SysWOW64\dphdbb.EXE
              "C:\Windows\SysWOW64\dphdbb.EXE"
              6⤵
              • Executes dropped EXE
              • Enumerates connected drives
              • Drops file in System32 directory
              • Suspicious use of SetThreadContext
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1264
              • C:\Windows\SysWOW64\dphdbb.eXe
                "C:\Windows\SysWOW64\dphdbb.eXe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:1656
                • C:\Windows\SysWOW64\riocqx.exe
                  C:\Windows\system32\riocqx.exe 528 "C:\Windows\SysWOW64\dphdbb.eXe"
                  8⤵
                  • Executes dropped EXE
                  PID:552
                  • C:\Windows\SysWOW64\riocqx.EXE
                    "C:\Windows\SysWOW64\riocqx.EXE"
                    9⤵
                    • Executes dropped EXE
                    • Enumerates connected drives
                    • Drops file in System32 directory
                    • Suspicious use of SetThreadContext
                    • Suspicious use of SetWindowsHookEx
                    PID:2024
                    • C:\Windows\SysWOW64\riocqx.eXe
                      "C:\Windows\SysWOW64\riocqx.eXe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      PID:1168
                      • C:\Windows\SysWOW64\cxzqii.exe
                        C:\Windows\system32\cxzqii.exe 536 "C:\Windows\SysWOW64\riocqx.eXe"
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Suspicious use of SetWindowsHookEx
                        PID:1828
                        • C:\Windows\SysWOW64\cxzqii.EXE
                          "C:\Windows\SysWOW64\cxzqii.EXE"
                          12⤵
                          • Executes dropped EXE
                          • Enumerates connected drives
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Suspicious use of SetWindowsHookEx
                          PID:1424
                          • C:\Windows\SysWOW64\cxzqii.eXe
                            "C:\Windows\SysWOW64\cxzqii.eXe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            PID:1980
                            • C:\Windows\SysWOW64\bvtkfe.exe
                              C:\Windows\system32\bvtkfe.exe 528 "C:\Windows\SysWOW64\cxzqii.eXe"
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1992
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\WINDOWS\bat.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v iciciar /t REG_SZ /d "C:\WINDOWS\svchos.exe"
        3⤵
        • Adds Run key to start application
        PID:544

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\bat.bat
    Filesize

    119B

    MD5

    bdcbf0f31339bcccd2efb2b0a7fd8d8b

    SHA1

    d398cfa675f8ccc5eac9080a9b116345b065c83e

    SHA256

    b8021f4bd6092e780e5677b1e269ffce9cf0b5926b86c3b5711601dc125c5e8b

    SHA512

    f3ec0b35a6399394b780809ade68515a1cee946e0bb4bc612be3122f3ffe1d409cf68cb56bf441aa299fb6dbdd1c85b5ea1e6b1449c20ac8039f81dd29bea385

  • C:\WINDOWS\svchos.EXE
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\bvtkfe.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\cxzqii.EXE
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\cxzqii.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\cxzqii.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\cxzqii.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\dphdbb.EXE
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\dphdbb.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\dphdbb.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\dphdbb.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\riocqx.eXe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\riocqx.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\riocqx.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\SysWOW64\riocqx.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\svchos.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\svchos.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • C:\Windows\svchos.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\bvtkfe.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\bvtkfe.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\cxzqii.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\cxzqii.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\dphdbb.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\dphdbb.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\riocqx.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • \Windows\SysWOW64\riocqx.exe
    Filesize

    1.2MB

    MD5

    945ec24fdec768c77fbb26388c1985fb

    SHA1

    22849e8a0eb8866834df811631a298b3bbda88e7

    SHA256

    debe51920fbd7fd212472bb14ccafdd214aae95f49275f2b1e901d40421c453e

    SHA512

    245a9967ffbf1589181d6f5847d6744a6377e7f53ea5f0136ef2b28271b5b297215343a184f5214bb55c0da5c10fccb6029a7a491c491c0e87b54d0d5b1eefc1

  • memory/520-54-0x0000000075671000-0x0000000075673000-memory.dmp
    Filesize

    8KB

  • memory/544-62-0x0000000000000000-mapping.dmp
  • memory/552-133-0x0000000000000000-mapping.dmp
  • memory/560-83-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-100-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-86-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-76-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-81-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-87-0x0000000000423F80-mapping.dmp
  • memory/560-79-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-93-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-77-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-90-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/560-84-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1168-154-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1168-162-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1168-150-0x0000000000423F80-mapping.dmp
  • memory/1168-58-0x0000000000000000-mapping.dmp
  • memory/1196-66-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1196-68-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1196-69-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1196-65-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1196-92-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1196-70-0x00000000004010B0-mapping.dmp
  • memory/1196-75-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1264-107-0x00000000004010B0-mapping.dmp
  • memory/1264-128-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1264-130-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1424-190-0x0000000000400000-0x0000000000414000-memory.dmp
    Filesize

    80KB

  • memory/1424-169-0x00000000004010B0-mapping.dmp
  • memory/1524-55-0x0000000000000000-mapping.dmp
  • memory/1656-123-0x0000000000423F80-mapping.dmp
  • memory/1656-129-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1828-158-0x0000000000000000-mapping.dmp
  • memory/1980-191-0x0000000000400000-0x000000000047F000-memory.dmp
    Filesize

    508KB

  • memory/1980-185-0x0000000000423F80-mapping.dmp
  • memory/1992-194-0x0000000000000000-mapping.dmp
  • memory/2032-96-0x0000000000000000-mapping.dmp