Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 02:30

General

  • Target

    ad6ce312720ef53b946129b5f53195a2a09463997c9d14cdf5a923a1dba58c8e.exe

  • Size

    503KB

  • MD5

    c950b07b8f11084122784bf3f3131b22

  • SHA1

    9f5ca581b07aa06754b71e57d774d5926ca9da6a

  • SHA256

    ad6ce312720ef53b946129b5f53195a2a09463997c9d14cdf5a923a1dba58c8e

  • SHA512

    90fc52a55735bbed05af946fb1e3b939ca8f973b40995c0e906a3223dc8f0568f482495e1c4f48902ad79393cb4b975c8686f0055aff1dc5cdd8923669af93a2

  • SSDEEP

    12288:XQE3iNLHPvJkYAh8vJhQrrwtyR5n8jPkgVyDxWT8EeAFo9K6x4OW13A:XV3eLXRAhu8UUR8jXeAFoMO4P1A

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 23 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad6ce312720ef53b946129b5f53195a2a09463997c9d14cdf5a923a1dba58c8e.exe
    "C:\Users\Admin\AppData\Local\Temp\ad6ce312720ef53b946129b5f53195a2a09463997c9d14cdf5a923a1dba58c8e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\COwoUAUw\OmMsMsgc.exe
      "C:\Users\Admin\COwoUAUw\OmMsMsgc.exe"
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Checks computer location settings
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      PID:1080
    • C:\ProgramData\dowYEAAk\vAUwYwcU.exe
      "C:\ProgramData\dowYEAAk\vAUwYwcU.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2028
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\Bginfo.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Users\Admin\AppData\Local\Temp\Bginfo.exe
        C:\Users\Admin\AppData\Local\Temp\Bginfo.exe
        3⤵
        • Executes dropped EXE
        PID:1664
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies registry key
      PID:360
    • C:\Windows\SysWOW64\reg.exe
      reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
      2⤵
      • Modifies registry key
      PID:1916
    • C:\Windows\SysWOW64\reg.exe
      reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
      2⤵
      • UAC bypass
      • Modifies registry key
      PID:1048
  • C:\ProgramData\RYkUEggU\tKQEMEEY.exe
    C:\ProgramData\RYkUEggU\tKQEMEEY.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:1300

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

5
T1112

Hidden Files and Directories

1
T1158

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\RYkUEggU\tKQEMEEY.exe
    Filesize

    481KB

    MD5

    44bbdfc0d5c9f84d550b531d03960908

    SHA1

    c34b2540464769b47c20eefc0ff08dbc80e6ecf0

    SHA256

    5df0380234985d446931254fabb94a9b9735db56654b2def31ad08b8d57b1275

    SHA512

    9dc0798a26641a36abfd40b2be71cb7110897544823215d4822c43bf721c2be99f59e7b20b1ba51f4ec85582c7495546b7b5b8959e1721a71ba89620aae5d493

  • C:\ProgramData\dowYEAAk\vAUwYwcU.exe
    Filesize

    479KB

    MD5

    7d846b1f389d02629d5c0d9d3f7855d4

    SHA1

    cd79bae3f348c32a5f0aad806390c753a2aa21de

    SHA256

    6d3df3d7a6a850dae9676e25a5f22eceded7466c2f8e20e887dee49549899441

    SHA512

    05102e29eda7274bef3924cb2a4b8570f01a6c44e0e3c7d38ac03598a36711a8d5935e587394a1bbbe1aee11c3d4fc691121ee7ab7ba9e1449ac1ce2c1d367f2

  • C:\Users\Admin\AppData\Local\Temp\Bginfo.exe
    Filesize

    24KB

    MD5

    3a27fd258bb0e1818d7e3fce30e44e3e

    SHA1

    e95ea3176bbae09447a2ecc153b1b0bb0fd45a29

    SHA256

    7aa24d2941eccdc947aad16abf37a70178be453e059799347dae9366cbddda83

    SHA512

    4ade674030d0dad9d8b3effc73b168322733a159e3e559790b1ab80a8afcd146d94cb298c7aaa67b2bdfa92a1bad4ae46d9da178ab93fc0af94102e1265b5463

  • C:\Users\Admin\AppData\Local\Temp\Bginfo.exe
    Filesize

    24KB

    MD5

    3a27fd258bb0e1818d7e3fce30e44e3e

    SHA1

    e95ea3176bbae09447a2ecc153b1b0bb0fd45a29

    SHA256

    7aa24d2941eccdc947aad16abf37a70178be453e059799347dae9366cbddda83

    SHA512

    4ade674030d0dad9d8b3effc73b168322733a159e3e559790b1ab80a8afcd146d94cb298c7aaa67b2bdfa92a1bad4ae46d9da178ab93fc0af94102e1265b5463

  • C:\Users\Admin\COwoUAUw\OmMsMsgc.exe
    Filesize

    479KB

    MD5

    b45f6e615e91fc6223bc77d8f248e04a

    SHA1

    4a0e4954ca4ffa98722ca0165690162887a7d8ac

    SHA256

    abc9d8cf17200b163e0d650a1b581c564b02e2731f7a14a1d5e46fb690256631

    SHA512

    a1e9ede1c4ed0932cba0410cd2115f7b733ee52e16e318179687acde0c15bb4c6189e76e8154741c672c04c37f02f5c32513b240bde76cd6e5988cdf93493782

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
    Filesize

    145KB

    MD5

    9d10f99a6712e28f8acd5641e3a7ea6b

    SHA1

    835e982347db919a681ba12f3891f62152e50f0d

    SHA256

    70964a0ed9011ea94044e15fa77edd9cf535cc79ed8e03a3721ff007e69595cc

    SHA512

    2141ee5c07aa3e038360013e3f40969e248bed05022d161b992df61f21934c5574ed9d3094ffd5245f5afd84815b24f80bda30055cf4d374f9c6254e842f6bd5

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    Filesize

    1.0MB

    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
    Filesize

    1.0MB

    MD5

    4d92f518527353c0db88a70fddcfd390

    SHA1

    c4baffc19e7d1f0e0ebf73bab86a491c1d152f98

    SHA256

    97e6f3fc1a9163f10b6502509d55bf75ee893967fb35f318954797e8ab4d4d9c

    SHA512

    05a8136ccc45ef73cd5c70ee0ef204d9d2b48b950e938494b6d1a61dfba37527c9600382321d1c031dc74e4cf3e16f001ae0f8cd64d76d765f5509ce8dc76452

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    Filesize

    818KB

    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
    Filesize

    818KB

    MD5

    a41e524f8d45f0074fd07805ff0c9b12

    SHA1

    948deacf95a60c3fdf17e0e4db1931a6f3fc5d38

    SHA256

    082329648337e5ba7377fed9d8a178809f37eecb8d795b93cca4ec07d8640ff7

    SHA512

    91bf4be7e82536a85a840dbc9f3ce7b7927d1cedf6391aac93989abae210620433e685b86a12d133a72369a4f8a665c46ac7fc9e8a806e2872d8b1514cbb305f

  • \MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
    Filesize

    507KB

    MD5

    c87e561258f2f8650cef999bf643a731

    SHA1

    2c64b901284908e8ed59cf9c912f17d45b05e0af

    SHA256

    a1dfa6639bef3cb4e41175c43730d46a51393942ead826337ca9541ac210c67b

    SHA512

    dea4833aa712c5823f800f5f5a2adcf241c1b2b6747872f540f5ff9da6795c4ddb73db0912593337083c7c67b91e9eaf1b3d39a34b99980fd5904ba3d7d62f6c

  • \ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
    Filesize

    445KB

    MD5

    1191ba2a9908ee79c0220221233e850a

    SHA1

    f2acd26b864b38821ba3637f8f701b8ba19c434f

    SHA256

    4670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d

    SHA512

    da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50

  • \ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exe
    Filesize

    445KB

    MD5

    1191ba2a9908ee79c0220221233e850a

    SHA1

    f2acd26b864b38821ba3637f8f701b8ba19c434f

    SHA256

    4670e1ecb4b136d81148401cd71737ccf1376c772fa513a3e176b8ce8b8f982d

    SHA512

    da61b9baa2f2aedc5ecb1d664368afffe080f76e5d167494cea9f8e72a03a8c2484c24a36d4042a6fd8602ab1adc946546a83fc6a4968dfaa8955e3e3a4c2e50

  • \ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
    Filesize

    633KB

    MD5

    a9993e4a107abf84e456b796c65a9899

    SHA1

    5852b1acacd33118bce4c46348ee6c5aa7ad12eb

    SHA256

    dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc

    SHA512

    d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9

  • \ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe
    Filesize

    633KB

    MD5

    a9993e4a107abf84e456b796c65a9899

    SHA1

    5852b1acacd33118bce4c46348ee6c5aa7ad12eb

    SHA256

    dfa88ba4491ac48f49c1b80011eddfd650cc14de43f5a4d3218fb79acb2f2dbc

    SHA512

    d75c44a1a1264c878a9db71993f5e923dc18935aa925b23b147d18807605e6fe8048af92b0efe43934252d688f8b0279363b1418293664a668a491d901aef1d9

  • \ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
    Filesize

    634KB

    MD5

    3cfb3ae4a227ece66ce051e42cc2df00

    SHA1

    0a2bb202c5ce2aa8f5cda30676aece9a489fd725

    SHA256

    54fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf

    SHA512

    60d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1

  • \ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe
    Filesize

    634KB

    MD5

    3cfb3ae4a227ece66ce051e42cc2df00

    SHA1

    0a2bb202c5ce2aa8f5cda30676aece9a489fd725

    SHA256

    54fbe7fdf0fd2e95c38822074e77907e6a3c8726e4ab38d2222deeffa6c0ccaf

    SHA512

    60d808d08afd4920583e540c3740d71e4f9dc5b16a0696537fea243cb8a79fb1df36004f560742a541761b0378bf0b5bc5be88569cd828a11afe9c3d61d9d4f1

  • \ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe
    Filesize

    455KB

    MD5

    6503c081f51457300e9bdef49253b867

    SHA1

    9313190893fdb4b732a5890845bd2337ea05366e

    SHA256

    5ebba234b1d2ff66d4797e2334f97e0ed38f066df15403db241ca9feb92730ea

    SHA512

    4477dbcee202971973786d62a8c22f889ea1f95b76a7279f0f11c315216d7e0f9e57018eabf2cf09fda0b58cae2178c14dcb70e2dee7efd3705c8b857f9d3901

  • \ProgramData\Package Cache\{61087a79-ac85-455c-934d-1fa22cc64f36}\vcredist_x86.exe
    Filesize

    455KB

    MD5

    6503c081f51457300e9bdef49253b867

    SHA1

    9313190893fdb4b732a5890845bd2337ea05366e

    SHA256

    5ebba234b1d2ff66d4797e2334f97e0ed38f066df15403db241ca9feb92730ea

    SHA512

    4477dbcee202971973786d62a8c22f889ea1f95b76a7279f0f11c315216d7e0f9e57018eabf2cf09fda0b58cae2178c14dcb70e2dee7efd3705c8b857f9d3901

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    Filesize

    444KB

    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exe
    Filesize

    444KB

    MD5

    2b48f69517044d82e1ee675b1690c08b

    SHA1

    83ca22c8a8e9355d2b184c516e58b5400d8343e0

    SHA256

    507bdc3ab5a6d9ddba2df68aff6f59572180134252f5eb8cb46f9bb23006b496

    SHA512

    97d9b130a483263ddf59c35baceba999d7c8db4effc97bcb935cb57acc7c8d46d3681c95e24975a099e701997330c6c6175e834ddb16abc48d5e9827c74a325b

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    Filesize

    455KB

    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\vcredist_x64.exe
    Filesize

    455KB

    MD5

    e9e67cfb6c0c74912d3743176879fc44

    SHA1

    c6b6791a900020abf046e0950b12939d5854c988

    SHA256

    bacba0359c51bf0c74388273a35b95365a00f88b235143ab096dcca93ad4790c

    SHA512

    9bba881d9046ce31794a488b73b87b3e9c3ff09d641d21f4003b525d9078ae5cd91d2b002278e69699117e3c85bfa44a2cc7a184a42f38ca087616b699091aec

  • \ProgramData\dowYEAAk\vAUwYwcU.exe
    Filesize

    479KB

    MD5

    7d846b1f389d02629d5c0d9d3f7855d4

    SHA1

    cd79bae3f348c32a5f0aad806390c753a2aa21de

    SHA256

    6d3df3d7a6a850dae9676e25a5f22eceded7466c2f8e20e887dee49549899441

    SHA512

    05102e29eda7274bef3924cb2a4b8570f01a6c44e0e3c7d38ac03598a36711a8d5935e587394a1bbbe1aee11c3d4fc691121ee7ab7ba9e1449ac1ce2c1d367f2

  • \ProgramData\dowYEAAk\vAUwYwcU.exe
    Filesize

    479KB

    MD5

    7d846b1f389d02629d5c0d9d3f7855d4

    SHA1

    cd79bae3f348c32a5f0aad806390c753a2aa21de

    SHA256

    6d3df3d7a6a850dae9676e25a5f22eceded7466c2f8e20e887dee49549899441

    SHA512

    05102e29eda7274bef3924cb2a4b8570f01a6c44e0e3c7d38ac03598a36711a8d5935e587394a1bbbe1aee11c3d4fc691121ee7ab7ba9e1449ac1ce2c1d367f2

  • \Users\Admin\AppData\Local\Temp\Bginfo.exe
    Filesize

    24KB

    MD5

    3a27fd258bb0e1818d7e3fce30e44e3e

    SHA1

    e95ea3176bbae09447a2ecc153b1b0bb0fd45a29

    SHA256

    7aa24d2941eccdc947aad16abf37a70178be453e059799347dae9366cbddda83

    SHA512

    4ade674030d0dad9d8b3effc73b168322733a159e3e559790b1ab80a8afcd146d94cb298c7aaa67b2bdfa92a1bad4ae46d9da178ab93fc0af94102e1265b5463

  • \Users\Admin\COwoUAUw\OmMsMsgc.exe
    Filesize

    479KB

    MD5

    b45f6e615e91fc6223bc77d8f248e04a

    SHA1

    4a0e4954ca4ffa98722ca0165690162887a7d8ac

    SHA256

    abc9d8cf17200b163e0d650a1b581c564b02e2731f7a14a1d5e46fb690256631

    SHA512

    a1e9ede1c4ed0932cba0410cd2115f7b733ee52e16e318179687acde0c15bb4c6189e76e8154741c672c04c37f02f5c32513b240bde76cd6e5988cdf93493782

  • \Users\Admin\COwoUAUw\OmMsMsgc.exe
    Filesize

    479KB

    MD5

    b45f6e615e91fc6223bc77d8f248e04a

    SHA1

    4a0e4954ca4ffa98722ca0165690162887a7d8ac

    SHA256

    abc9d8cf17200b163e0d650a1b581c564b02e2731f7a14a1d5e46fb690256631

    SHA512

    a1e9ede1c4ed0932cba0410cd2115f7b733ee52e16e318179687acde0c15bb4c6189e76e8154741c672c04c37f02f5c32513b240bde76cd6e5988cdf93493782

  • memory/360-77-0x0000000000000000-mapping.dmp
  • memory/1048-79-0x0000000000000000-mapping.dmp
  • memory/1080-58-0x0000000000000000-mapping.dmp
  • memory/1080-99-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/1080-68-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/1292-54-0x00000000762E1000-0x00000000762E3000-memory.dmp
    Filesize

    8KB

  • memory/1292-85-0x0000000000400000-0x0000000000482000-memory.dmp
    Filesize

    520KB

  • memory/1292-55-0x0000000000400000-0x0000000000482000-memory.dmp
    Filesize

    520KB

  • memory/1300-101-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/1300-70-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/1564-71-0x0000000000000000-mapping.dmp
  • memory/1664-76-0x0000000000800000-0x000000000080C000-memory.dmp
    Filesize

    48KB

  • memory/1664-73-0x0000000000000000-mapping.dmp
  • memory/1916-78-0x0000000000000000-mapping.dmp
  • memory/2028-63-0x0000000000000000-mapping.dmp
  • memory/2028-69-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB

  • memory/2028-100-0x0000000000400000-0x000000000047B000-memory.dmp
    Filesize

    492KB