Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2023 14:06

General

  • Target

    tmp.exe

  • Size

    865KB

  • MD5

    bf2f107bd78e2a8888f9b72bb0f53e14

  • SHA1

    ac080f8c59943629e414a30455085ff283490b26

  • SHA256

    149da12f4493232f304823a53346c7d88d3a1e3d6229834ea2218f849d1d1949

  • SHA512

    007fc733a819a250f05b50717437e8fe74c6d759b330df1367938e946e8d6adb7c0aa8d2b0f15aa04deef4210a2afe0ce84137c18880bf3d95aa14739e8f17f9

  • SSDEEP

    24576:xCOI2pwMzk68ysHPot72W6u99z6Zlu/Kz0xaYVC3U6m+Y7w0XDwD6k0:UOzz6yugt6ZuTz6Zlf08P3U6mRM4DC6f

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 28 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c md C:\windowss64
      2⤵
        PID:1272
      • C:\windowss64\computer.exe
        "C:\windowss64\computer.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"
          3⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:1468
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:664
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            4⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1556
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      1⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:992
    • C:\Program Files (x86)\Imsossm.exe
      "C:\Program Files (x86)\Imsossm.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Program Files (x86)\Imsossm.exe
        "C:\Program Files (x86)\Imsossm.exe" Win7
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Program Files (x86)\Imsossm.exe
          "C:\Program Files (x86)\Imsossm.exe" Win7
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:768
    • C:\Program Files (x86)\Okoiuyq.exe
      "C:\Program Files (x86)\Okoiuyq.exe"
      1⤵
      • Executes dropped EXE
      PID:1612

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Imsossm.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Program Files (x86)\Imsossm.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Program Files (x86)\Imsossm.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Program Files (x86)\Imsossm.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Program Files (x86)\Okoiuyq.exe

      Filesize

      865KB

      MD5

      bf2f107bd78e2a8888f9b72bb0f53e14

      SHA1

      ac080f8c59943629e414a30455085ff283490b26

      SHA256

      149da12f4493232f304823a53346c7d88d3a1e3d6229834ea2218f849d1d1949

      SHA512

      007fc733a819a250f05b50717437e8fe74c6d759b330df1367938e946e8d6adb7c0aa8d2b0f15aa04deef4210a2afe0ce84137c18880bf3d95aa14739e8f17f9

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • C:\ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • C:\Users\Admin\AppData\Local\Temp\2UDlHe3B.xlsm

      Filesize

      17KB

      MD5

      e566fc53051035e1e6fd0ed1823de0f9

      SHA1

      00bc96c48b98676ecd67e81a6f1d7754e4156044

      SHA256

      8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

      SHA512

      a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

    • C:\windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • C:\windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • C:\windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \ProgramData\Synaptics\Synaptics.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • \Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • \Users\Admin\AppData\Local\Temp\._cache_computer.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • \Users\Admin\AppData\Local\Temp\._cache_computer.exe

      Filesize

      400KB

      MD5

      20beeb0a82adcce3a58372804acc46be

      SHA1

      c579d9017d2c8298fe075ff5c05963901330e72a

      SHA256

      d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

      SHA512

      7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

    • \windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • \windowss64\computer.exe

      Filesize

      1.1MB

      MD5

      be689578752179e22bf915dbcf4f7520

      SHA1

      e798e703bfb90707a2872b51da73f32af566aedb

      SHA256

      de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

      SHA512

      89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

    • memory/664-4870-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/664-4915-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/816-485-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-521-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-488-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-489-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-492-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-491-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-493-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-494-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-490-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-495-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-496-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-497-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-498-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-499-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-500-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-501-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-502-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-503-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-504-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-506-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-509-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-508-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-510-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-507-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-505-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-511-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-512-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-513-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-514-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-516-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-515-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-517-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-520-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-522-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-523-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-483-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-519-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-518-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-1497-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/816-1498-0x0000000001F10000-0x0000000002091000-memory.dmp

      Filesize

      1.5MB

    • memory/816-4810-0x0000000000530000-0x0000000000630000-memory.dmp

      Filesize

      1024KB

    • memory/816-4811-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-487-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-484-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-486-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-54-0x00000000771B0000-0x00000000771F7000-memory.dmp

      Filesize

      284KB

    • memory/816-355-0x0000000000400000-0x0000000000525000-memory.dmp

      Filesize

      1.1MB

    • memory/816-482-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-481-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-480-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-476-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-479-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-478-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-477-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-475-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-474-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-473-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-472-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-471-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-470-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-465-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-468-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-469-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-467-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-466-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-463-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-464-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-4921-0x0000000000400000-0x0000000000525000-memory.dmp

      Filesize

      1.1MB

    • memory/816-461-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/816-462-0x00000000021C0000-0x00000000022D1000-memory.dmp

      Filesize

      1.1MB

    • memory/1612-4922-0x0000000000400000-0x0000000000525000-memory.dmp

      Filesize

      1.1MB

    • memory/1688-4833-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB