Analysis

  • max time kernel
    208s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2023 18:38

General

  • Target

    msys2-x86_64-20221028.exe

  • Size

    677.7MB

  • MD5

    29eca627d9b7570ec48495e4af0f9423

  • SHA1

    18c8d00ba107908f344a34b39169d09db04aea7a

  • SHA256

    38f419b6ea086c7b10616650ab4892512c54612ef76313fb3b4603b6b1c5413c

  • SHA512

    7a89e39ee2b391d80dd0a9892b54f7eaf1454818fc1813c71beae7e7d8736462ee98c84c03c2a669b1a3aa29c7600a581232e659412ebf63ba560b2d1a1b0845

  • SSDEEP

    3072:2ahKyd2n31f5pQMCLMe4c6l19ipQ9pCFVkAKnKV0lXxii:2ahO6Vd2Xiy9pOdOx

Malware Config

Extracted

Family

purecrypter

C2

https://centredesoinsanj.test-sites.fr/wp-admin/images/css/hills/bo/Zbstsgyoyuo.bmp

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\msys2-x86_64-20221028.exe
    "C:\Users\Admin\AppData\Local\Temp\msys2-x86_64-20221028.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3444
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA2AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4808
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3188
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4608
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\client32.exe
          "C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\client32.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:888
        • C:\Users\Admin\AppData\Local\Temp\r.exe
          "C:\Users\Admin\AppData\Local\Temp\r.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2824
          • C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Engine.exe
            C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Engine.exe /TH_ID=_2836 /OriginExe="C:\Users\Admin\AppData\Local\Temp\r.exe"
            5⤵
            • Executes dropped EXE
            PID:832

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    53KB

    MD5

    06ad34f9739c5159b4d92d702545bd49

    SHA1

    9152a0d4f153f3f40f7e606be75f81b582ee0c17

    SHA256

    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

    SHA512

    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    86ba01a9f7571d87b31adef898572c9f

    SHA1

    64352d62f3abfd19fcc6873f1a04cef12f188ff9

    SHA256

    8858b5171142fbcf6a13382f683c32433c786204577812365cc6ec0f43234b93

    SHA512

    d56ab58628e0125d75bb11e27fef74ffedb2f6a1eccecf827dfa64ec1050d5d767b8d11d54566423db4490a59ec6e94ce0a51a81a836acbc1f8f3431eccaf25e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
    Filesize

    362.6MB

    MD5

    f788a10783796411b236965a46b51928

    SHA1

    efdd0cb4fd047c884027b9002fd90fad66d0dbe4

    SHA256

    644f44fcb25c8762c197a57a2e63811f707ea176cdf0ca3ef3277e200c590ff5

    SHA512

    5ea69ee7aa1e7f0c9b7612367e100af6e60bd13e13054e43ecf6e72b3359447424a77a1bf0548bd1cf92f53400844ec143d85ae694953556b0396bb0c87cfb9c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
    Filesize

    362.6MB

    MD5

    f788a10783796411b236965a46b51928

    SHA1

    efdd0cb4fd047c884027b9002fd90fad66d0dbe4

    SHA256

    644f44fcb25c8762c197a57a2e63811f707ea176cdf0ca3ef3277e200c590ff5

    SHA512

    5ea69ee7aa1e7f0c9b7612367e100af6e60bd13e13054e43ecf6e72b3359447424a77a1bf0548bd1cf92f53400844ec143d85ae694953556b0396bb0c87cfb9c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup_ovl.exe
    Filesize

    362.6MB

    MD5

    f788a10783796411b236965a46b51928

    SHA1

    efdd0cb4fd047c884027b9002fd90fad66d0dbe4

    SHA256

    644f44fcb25c8762c197a57a2e63811f707ea176cdf0ca3ef3277e200c590ff5

    SHA512

    5ea69ee7aa1e7f0c9b7612367e100af6e60bd13e13054e43ecf6e72b3359447424a77a1bf0548bd1cf92f53400844ec143d85ae694953556b0396bb0c87cfb9c

  • C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Engine.exe
    Filesize

    392KB

    MD5

    50e4b374719400049ef36d2f02dce6a2

    SHA1

    ed7e29079e42963d7f3418b7c50ae4a747d47064

    SHA256

    49d492ba33edc5e4da6c24159d44d8c164f5db9504f10efdfeb5e1dc5c660010

    SHA512

    545b38d0cac594d74ad390dee632ec603a0c78a1887933e59fab469a1e77e83643b6bbc932decc41d439aa82ec761d3f5160b3cde0c974567a492e3ee127c503

  • C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Engine.exe
    Filesize

    392KB

    MD5

    50e4b374719400049ef36d2f02dce6a2

    SHA1

    ed7e29079e42963d7f3418b7c50ae4a747d47064

    SHA256

    49d492ba33edc5e4da6c24159d44d8c164f5db9504f10efdfeb5e1dc5c660010

    SHA512

    545b38d0cac594d74ad390dee632ec603a0c78a1887933e59fab469a1e77e83643b6bbc932decc41d439aa82ec761d3f5160b3cde0c974567a492e3ee127c503

  • C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Modern_Icon.bmp
    Filesize

    7KB

    MD5

    1dd88f67f029710d5c5858a6293a93f1

    SHA1

    3e5ef66613415fe9467b2a24ccc27d8f997e7df6

    SHA256

    b5dad33ceb6eb1ac2a05fbda76e29a73038403939218a88367925c3a20c05532

    SHA512

    7071fd64038e0058c8c586c63c62677c0ca403768100f90323cf9c0bc7b7fcb538391e6f3606bd7970b8769445606ada47adcdcfc1e991e25caf272a13e10c94

  • C:\Users\Admin\AppData\Local\Temp\SETUP_36953\Setup.txt
    Filesize

    2KB

    MD5

    adebd1344bfe2a7c7ad77a5442e06448

    SHA1

    9651dfd8178c4ab2dd41ca61b75fdcbde0b25cbe

    SHA256

    0e8b7bb6535bac5601bcc79edb89be9a6cd24e492182174ee6279c85e9c56efc

    SHA512

    c95364ef11e6fdf37114715370ed116522649da07d99ff86e3aac5d66d173e1c916f4ee46df0f6b49b31f92062bbbdd94d7e4ca7a271b4f10627a6f030c99472

  • C:\Users\Admin\AppData\Local\Temp\r.exe
    Filesize

    487.2MB

    MD5

    c117d596348238dd92d1601072d35d93

    SHA1

    df92b2ba627eddd659c5e34165cd698d4b79aec6

    SHA256

    9cf05b9f94033f74f2f27482b7b081c3bc49088cd7e66fec8b8203ef3872cc2c

    SHA512

    3eed54ba0cc8dd10f2681c040bc0c6e44a615eafe853e0517786a062a0c7cc93c9ef22b54df68f6728e415dea91eba3fed108926c7c92fa98ef89313ca74fb82

  • C:\Users\Admin\AppData\Local\Temp\r.exe
    Filesize

    485.0MB

    MD5

    aa6ef1ae85d33a9a5ca912b75744a8e6

    SHA1

    6a7b27765d4975381019090e131246b4e599c751

    SHA256

    11f25f477170c156381334d64638cbc3db3f879cbb91e5f6aba2988c63e0f81f

    SHA512

    2bcd97a8fe30bad70955fe859ee535c0e98eebb43fdf4bbe2a1c675c9afe9917fd9d1d5a00664ee53de98422014e878da9a7e6d6f05d0214f310ff67dbcf1d97

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\HTCTL32.DLL
    Filesize

    320KB

    MD5

    c94005d2dcd2a54e40510344e0bb9435

    SHA1

    55b4a1620c5d0113811242c20bd9870a1e31d542

    SHA256

    3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899

    SHA512

    2e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\HTCTL32.DLL
    Filesize

    320KB

    MD5

    c94005d2dcd2a54e40510344e0bb9435

    SHA1

    55b4a1620c5d0113811242c20bd9870a1e31d542

    SHA256

    3c072532bf7674d0c5154d4d22a9d9c0173530c0d00f69911cdbc2552175d899

    SHA512

    2e6f673864a54b1dcad9532ef9b18a9c45c0844f1f53e699fade2f41e43fa5cbc9b8e45e6f37b95f84cf6935a96fba2950ee3e0e9542809fd288fefba34ddd6a

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\MSVCR100.dll
    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\NSM.LIC
    Filesize

    258B

    MD5

    1b41e64c60ca9dfadeb063cd822ab089

    SHA1

    abfcd51bb120a7eae5bbd9a99624e4abe0c9139d

    SHA256

    f4e2f28169e0c88b2551b6f1d63f8ba513feb15beacc43a82f626b93d673f56d

    SHA512

    c97e0eabea62302a4cfef974ac309f3498505dd055ba74133ee2462e215b3ebc5c647e11bcbac1246b9f750b5d09240ca08a6b617a7007f2fa955f6b6dd7fee4

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\PCICHEK.DLL
    Filesize

    18KB

    MD5

    104b30fef04433a2d2fd1d5f99f179fe

    SHA1

    ecb08e224a2f2772d1e53675bedc4b2c50485a41

    SHA256

    956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd

    SHA512

    5efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\PCICL32.DLL
    Filesize

    3.6MB

    MD5

    d3d39180e85700f72aaae25e40c125ff

    SHA1

    f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15

    SHA256

    38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5

    SHA512

    471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\PCICL32.dll
    Filesize

    3.6MB

    MD5

    d3d39180e85700f72aaae25e40c125ff

    SHA1

    f3404ef6322f5c6e7862b507d05b8f4b7f1c7d15

    SHA256

    38684adb2183bf320eb308a96cdbde8d1d56740166c3e2596161f42a40fa32d5

    SHA512

    471ac150e93a182d135e5483d6b1492f08a49f5ccab420732b87210f2188be1577ceaaee4ce162a7acceff5c17cdd08dc51b1904228275f6bbde18022ec79d2f

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\client32.exe
    Filesize

    103KB

    MD5

    c60ac6a6e6e582ab0ecb1fdbd607705b

    SHA1

    ba9de479beb82fd97bbdfbc04ef22e08224724ba

    SHA256

    4d24b359176389301c14a92607b5c26b8490c41e7e3a2abbc87510d1376f4a87

    SHA512

    f91b964f8b9a0e7445fc260b8c75c831e7ce462701a64a39989304468c9c5ab5d1e8bfe376940484f824b399aef903bf51c679fcf45208426fff7e4e518482ca

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\client32.exe
    Filesize

    103KB

    MD5

    c60ac6a6e6e582ab0ecb1fdbd607705b

    SHA1

    ba9de479beb82fd97bbdfbc04ef22e08224724ba

    SHA256

    4d24b359176389301c14a92607b5c26b8490c41e7e3a2abbc87510d1376f4a87

    SHA512

    f91b964f8b9a0e7445fc260b8c75c831e7ce462701a64a39989304468c9c5ab5d1e8bfe376940484f824b399aef903bf51c679fcf45208426fff7e4e518482ca

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\client32.ini
    Filesize

    914B

    MD5

    fd8286ae0a78720863b527ef40afa2d2

    SHA1

    cde55878b3f1f296548d2548a2f3cc0170afa67e

    SHA256

    b3c4963e4a5dbe7af6ad552526f58eff57c3f3868fde42416501643c95e938c0

    SHA512

    a75c53132a825635491fa9f5e5bbdc1201f505d4caf78ab56eedacb1cd9d2358af27c0f48ae548fe261dc26f4b68960abf8d950d26c747290c6cbd44297670c6

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\msvcr100.dll
    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\msvcr100.dll
    Filesize

    755KB

    MD5

    0e37fbfa79d349d672456923ec5fbbe3

    SHA1

    4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

    SHA256

    8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

    SHA512

    2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\pcicapi.dll
    Filesize

    32KB

    MD5

    34dfb87e4200d852d1fb45dc48f93cfc

    SHA1

    35b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641

    SHA256

    2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703

    SHA512

    f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\pcicapi.dll
    Filesize

    32KB

    MD5

    34dfb87e4200d852d1fb45dc48f93cfc

    SHA1

    35b4e73fb7c8d4c3fefb90b7e7dc19f3e653c641

    SHA256

    2d6c6200508c0797e6542b195c999f3485c4ef76551aa3c65016587788ba1703

    SHA512

    f5bb4e700322cbaa5069244812a9b6ce6899ce15b4fd6384a3e8be421e409e4526b2f67fe210394cd47c4685861faf760eff9af77209100b82b2e0655581c9b2

  • C:\Users\Admin\AppData\Roaming\NetHelper_v_4.3.5.18\pcichek.dll
    Filesize

    18KB

    MD5

    104b30fef04433a2d2fd1d5f99f179fe

    SHA1

    ecb08e224a2f2772d1e53675bedc4b2c50485a41

    SHA256

    956b9fa960f913cce3137089c601f3c64cc24c54614b02bba62abb9610a985dd

    SHA512

    5efcaa8c58813c3a0a6026cd7f3b34ad4fb043fd2d458db2e914429be2b819f1ac74e2d35e4439601cf0cb50fcdcafdcf868da328eaaeec15b0a4a6b8b2c218f

  • memory/832-184-0x0000000000000000-mapping.dmp
  • memory/832-187-0x0000000000400000-0x0000000000558000-memory.dmp
    Filesize

    1.3MB

  • memory/832-189-0x0000000000400000-0x0000000000558000-memory.dmp
    Filesize

    1.3MB

  • memory/888-161-0x0000000000000000-mapping.dmp
  • memory/2184-154-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2184-152-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2184-149-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2184-151-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2184-147-0x0000000000000000-mapping.dmp
  • memory/2184-183-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/2824-180-0x0000000000000000-mapping.dmp
  • memory/3188-145-0x0000000000000000-mapping.dmp
  • memory/3444-136-0x00000000064A0000-0x00000000064C2000-memory.dmp
    Filesize

    136KB

  • memory/3444-132-0x0000000000000000-mapping.dmp
  • memory/3444-135-0x0000000000B70000-0x0000000000BA0000-memory.dmp
    Filesize

    192KB

  • memory/4608-159-0x0000000007230000-0x000000000723A000-memory.dmp
    Filesize

    40KB

  • memory/4608-158-0x0000000006DD0000-0x0000000006DEE000-memory.dmp
    Filesize

    120KB

  • memory/4608-157-0x0000000070CF0000-0x0000000070D3C000-memory.dmp
    Filesize

    304KB

  • memory/4608-156-0x0000000006E10000-0x0000000006E42000-memory.dmp
    Filesize

    200KB

  • memory/4608-146-0x0000000000000000-mapping.dmp
  • memory/4608-177-0x0000000005D00000-0x0000000005D0E000-memory.dmp
    Filesize

    56KB

  • memory/4608-178-0x00000000073D0000-0x00000000073EA000-memory.dmp
    Filesize

    104KB

  • memory/4608-179-0x00000000073B0000-0x00000000073B8000-memory.dmp
    Filesize

    32KB

  • memory/4608-160-0x0000000007470000-0x0000000007506000-memory.dmp
    Filesize

    600KB

  • memory/4808-144-0x0000000006360000-0x000000000637A000-memory.dmp
    Filesize

    104KB

  • memory/4808-141-0x0000000005A80000-0x0000000005AE6000-memory.dmp
    Filesize

    408KB

  • memory/4808-140-0x0000000005780000-0x00000000057E6000-memory.dmp
    Filesize

    408KB

  • memory/4808-139-0x0000000005080000-0x00000000056A8000-memory.dmp
    Filesize

    6.2MB

  • memory/4808-138-0x0000000004890000-0x00000000048C6000-memory.dmp
    Filesize

    216KB

  • memory/4808-137-0x0000000000000000-mapping.dmp
  • memory/4808-142-0x0000000005A10000-0x0000000005A2E000-memory.dmp
    Filesize

    120KB

  • memory/4808-143-0x00000000074F0000-0x0000000007B6A000-memory.dmp
    Filesize

    6.5MB