Analysis

  • max time kernel
    192s
  • max time network
    196s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 08:22

General

  • Target

    98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe

  • Size

    1.3MB

  • MD5

    e582f585925a0c0ece797528d8b33563

  • SHA1

    38d311dfe68ca22d313813068dbc6575b7acc37d

  • SHA256

    98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

  • SHA512

    d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

  • SSDEEP

    6144:JhPpcFVVvD+5FzFcxvqwXoW2z9hreaqFoS:TOCwXoWGjeJFoS

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 6 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe
    "C:\Users\Admin\AppData\Local\Temp\98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\FrFrB.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:680
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Google Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe" /f
        3⤵
        • Adds Run key to start application
        PID:1296
    • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
      "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
        "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\IuIuE.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java Jre" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /f
            5⤵
            • Adds Run key to start application
            PID:1056
        • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
          "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1928
          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
            C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:604
            • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
              C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1940
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                7⤵
                  PID:1860
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                    8⤵
                    • Modifies firewall policy service
                    • Modifies registry key
                    PID:520
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe:*:Enabled:Windows Messanger" /f
                  7⤵
                    PID:2040
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe:*:Enabled:Windows Messanger" /f
                      8⤵
                      • Modifies firewall policy service
                      • Modifies registry key
                      PID:1376
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                    7⤵
                      PID:1608
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                        8⤵
                        • Modifies firewall policy service
                        • Modifies registry key
                        PID:2016
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\BSSS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\BSSS.exe:*:Enabled:Windows Messanger" /f
                      7⤵
                        PID:1176
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\BSSS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\BSSS.exe:*:Enabled:Windows Messanger" /f
                          8⤵
                          • Modifies firewall policy service
                          • Modifies registry key
                          PID:1400
              • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe
                "C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:564

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\FrFrB.bat

            Filesize

            150B

            MD5

            915ab87507342e253384bb621a094633

            SHA1

            6f01afa24f7e97d6b342a6b58e19a8cc789c36d4

            SHA256

            75883add5d1a7227a0a81b9c8c9ead49058cf4d5552fded282676f60380fb879

            SHA512

            99563d862f86a7657b63cae6318f0e3fc341361a117afe789e8f4b9fb1381ca32a4434f015143dbd4d7255682478d49d2d5fbcb84532849f8129d0adeec1cb4c

          • C:\Users\Admin\AppData\Local\Temp\IuIuE.bat

            Filesize

            143B

            MD5

            5da4061354327275e21c2779391cc464

            SHA1

            3d66a2c5a7804d0455366841aa94aeed1dfdb74c

            SHA256

            c2246607ef5f757ac113e4fbdeb18dd16f1618874f7a99f2ed34088462e340c8

            SHA512

            766e57f0dbba4716763286bd9301851cffc76764d9722540762e63ebd5ad1a8a55168d43980f72bcba56b4eee0c5845ed3a931b8ed63dc829946a50204688102

          • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • C:\Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\Google Update\Sun.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • \Users\Admin\AppData\Roaming\JavaUpdate\Java.exe

            Filesize

            1.3MB

            MD5

            e582f585925a0c0ece797528d8b33563

            SHA1

            38d311dfe68ca22d313813068dbc6575b7acc37d

            SHA256

            98f21b558a9e4dbda5a479a28259e8842e9bce2e806e68736d2f47114721e92e

            SHA512

            d0242811d112886b9d3f4e4cdee6064b4e583d48b82e4e16b870629f739ebbe2cf8a720241e62c7407309897ef79f7f3f9cf3add95bdf536ef24ca0fb4dc8e1a

          • memory/544-72-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/544-93-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/564-81-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-83-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-92-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-131-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-86-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-85-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/564-97-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/604-132-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/604-143-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1380-71-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/1380-67-0x0000000003690000-0x00000000037E3000-memory.dmp

            Filesize

            1.3MB

          • memory/1380-57-0x0000000076041000-0x0000000076043000-memory.dmp

            Filesize

            8KB

          • memory/1380-56-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/1812-77-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-88-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-74-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-112-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-75-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-78-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-91-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1812-96-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB

          • memory/1928-115-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/1928-126-0x0000000000400000-0x0000000000553000-memory.dmp

            Filesize

            1.3MB

          • memory/1940-134-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-144-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-142-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-135-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-137-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-138-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-157-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB

          • memory/1940-158-0x0000000000400000-0x0000000000475000-memory.dmp

            Filesize

            468KB