Analysis

  • max time kernel
    138s
  • max time network
    161s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 10:50

General

  • Target

    f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe

  • Size

    1.5MB

  • MD5

    cb2e44fceaa9a4e6daa43c7f3a35b1af

  • SHA1

    b6b293334d0a40128c731fb9d8ec2137657ab6e5

  • SHA256

    f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd

  • SHA512

    4724029b8c6459f6495800dcbc9459410d3cae5f855ca7cab70acdb7b86462016c58e1420dd84f995e18f2882dfa9441db05c183462a68e0636bd59100d6dbdb

  • SSDEEP

    24576:caeMqk4eF59tKhCvF7dnjgjxpP19f83OXXWYnR8ivQltND2NkSkIkyjL:caAHesCvFWlc3OWYRElKNk5IkyjL

Score
8/10

Malware Config

Signatures

  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe
    "C:\Users\Admin\AppData\Local\Temp\f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\2071.exe
      "C:\Users\Admin\AppData\Local\Temp\2071.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://ad.tjchajian.com:82/ip.html?id=2071
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1344 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 1004
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:1148
    • C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe
      "C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 460
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:892

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • C:\Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9SVW0TZM.txt

    Filesize

    539B

    MD5

    451232b2e0808e04ed98be349943edc1

    SHA1

    5bcb47b8c98f85e92b4dba1c5d67b43b1305ab71

    SHA256

    f5a6c21c775f08cb4f812ff5ad73b7c540e034d74c60e15247767e31a8a96f44

    SHA512

    45e95dd2411e7b15f2998bda42f76b370525e1763ab56cbd8e89484adcf677b00cd3dcc21e949ec6479695237daad31986b61e17beb41a0bf6bb86568b46f769

  • \Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • \Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • \Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • \Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • \Users\Admin\AppData\Local\Temp\2071.exe

    Filesize

    114KB

    MD5

    6a3403a72b8efaecf87009a0cdf709c7

    SHA1

    4db26c3d0ef07c6107278b7583365fe47da6c03f

    SHA256

    3f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d

    SHA512

    4c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe

    Filesize

    1.7MB

    MD5

    08e308a1c4176d11a2d88f1bc94332a0

    SHA1

    7b7c6bd39ad1aae8deb4e322abc476a4715bd9f7

    SHA256

    931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e

    SHA512

    ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966

  • \Windows\SysWOW64\intel.dll

    Filesize

    142KB

    MD5

    5b6ae60afa76e99a591556ba5bdc0acb

    SHA1

    e3f12b7fe4337a55c9e859a5ceec95f749cf457b

    SHA256

    7a0cbe06ce186a11a3240015a9e7adc24db91a78f35170933efdc062aa1c4378

    SHA512

    4394f5f198eaf5315e4dba3a03204b9ef3fd4340ef7a98fa865c7dab15fe28d9586ac8cfe738ec60c9961437586d5deba25c6622e1f8af3c4e806022c236c98a

  • \Windows\SysWOW64\intel.dll

    Filesize

    142KB

    MD5

    5b6ae60afa76e99a591556ba5bdc0acb

    SHA1

    e3f12b7fe4337a55c9e859a5ceec95f749cf457b

    SHA256

    7a0cbe06ce186a11a3240015a9e7adc24db91a78f35170933efdc062aa1c4378

    SHA512

    4394f5f198eaf5315e4dba3a03204b9ef3fd4340ef7a98fa865c7dab15fe28d9586ac8cfe738ec60c9961437586d5deba25c6622e1f8af3c4e806022c236c98a

  • memory/752-505-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-495-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-486-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-533-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-532-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-531-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-530-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-529-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-528-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-527-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-526-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-525-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-524-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-523-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-522-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-521-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-520-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-519-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-518-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-517-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-516-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-515-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-514-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-513-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-512-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-511-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-510-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-509-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-508-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-507-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-506-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-481-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-504-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-503-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-502-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-501-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-500-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-499-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-498-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-497-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-496-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-480-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-494-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-493-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-492-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-491-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-490-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-489-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-488-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-487-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-485-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-484-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-483-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-1345-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-1346-0x0000000002210000-0x0000000002391000-memory.dmp

    Filesize

    1.5MB

  • memory/752-482-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-3400-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-3858-0x0000000002070000-0x0000000002170000-memory.dmp

    Filesize

    1024KB

  • memory/752-4355-0x00000000024CA000-0x00000000024CC000-memory.dmp

    Filesize

    8KB

  • memory/752-4357-0x00000000024CA000-0x00000000024CC000-memory.dmp

    Filesize

    8KB

  • memory/752-477-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-5098-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/752-5099-0x00000000025E0000-0x00000000026E1000-memory.dmp

    Filesize

    1.0MB

  • memory/752-5100-0x00000000026F0000-0x0000000002791000-memory.dmp

    Filesize

    644KB

  • memory/752-478-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-5102-0x0000000002070000-0x0000000002170000-memory.dmp

    Filesize

    1024KB

  • memory/752-5104-0x00000000024CA000-0x00000000024CC000-memory.dmp

    Filesize

    8KB

  • memory/752-5105-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/752-68-0x0000000000400000-0x000000000064B000-memory.dmp

    Filesize

    2.3MB

  • memory/752-479-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-476-0x00000000024C0000-0x00000000025D1000-memory.dmp

    Filesize

    1.1MB

  • memory/752-70-0x0000000076960000-0x00000000769A7000-memory.dmp

    Filesize

    284KB

  • memory/1704-67-0x0000000000E80000-0x0000000000EC6000-memory.dmp

    Filesize

    280KB

  • memory/1704-59-0x0000000000E80000-0x0000000000EC6000-memory.dmp

    Filesize

    280KB

  • memory/1704-60-0x0000000000E80000-0x0000000000EC6000-memory.dmp

    Filesize

    280KB

  • memory/1704-5103-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB

  • memory/1704-5119-0x0000000000E80000-0x0000000000EC6000-memory.dmp

    Filesize

    280KB

  • memory/2028-66-0x0000000000400000-0x00000000005810DE-memory.dmp

    Filesize

    1.5MB

  • memory/2028-54-0x00000000753F1000-0x00000000753F3000-memory.dmp

    Filesize

    8KB