Analysis

  • max time kernel
    132s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2023 13:58

General

  • Target

    12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31_JC.exe

  • Size

    731KB

  • MD5

    3024f8b8500d2629b5d934d0ef334efb

  • SHA1

    d2013e0488e50fe9039986129e46725c2353e0a7

  • SHA256

    12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31

  • SHA512

    b8ca6e76ebfd879d3f5643caa614d57fb7d57e5a95d79aecea2bdbd71bbed366b72a59a12b96b6f84e988c45e15e1c3369fd01418972e0aed7dba65ee2a4a998

  • SSDEEP

    12288:JqH3dU+ta6byR6WYlvZja6+hpKo8sRexHyoRwMt7zANdi:etU+YxYtARN6wUK0

Malware Config

Extracted

Family

snakekeylogger

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gkas.com.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Gkasteknik@2022

Signatures

  • Snake Keylogger

    Keylogger and Infostealer first seen in November 2020.

  • Snake Keylogger payload 3 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31_JC.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD115.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:2648
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • UAC bypass
        • Windows security bypass
        • Looks for VirtualBox Guest Additions in registry
        • Looks for VMWare Tools registry key
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Windows security modification
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2536
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2640
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=ngen.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.0
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2520
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5c747c374fb8163c768e2d1e9f8d0bb5

    SHA1

    5b7dcf4f002ce0cafc0f1c8d819447a973231d5b

    SHA256

    4998566f9222f389addee90929c9711241447f4cb600e3bdbb979fbbf6d1e280

    SHA512

    eda242939cda58be07e457668325a6823c5312d88e677aa570793c5f78084f1f26d2611af4961771f06a677041a03320d2a6ce6e575d52a2faac55721f476423

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dea857cd35ed7911faf2eb1f3a435bca

    SHA1

    6654d89663c05056bf31442343083421c7a6ad21

    SHA256

    42b3eef6605dd496bc0c3a554988bd66a17a9b89365a69e54090a168f26d14a8

    SHA512

    01fa36ef9258cd7bedefa9dc5125811056a658e132c80ea1ed0ff7f45e28d8ff68f19fe642286d5ec3ba9fcc205a1536c8c2320af3f804b53c5b98ba02d8b473

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7849a09418f04432c15bfd27c01ebe7

    SHA1

    b5dc444daac2e5e682e67474680296ca114b3c69

    SHA256

    3e3204ff0b228cb5e70c1db14b7c06b1e4cad1a8e4ed2dfe271bdaf35bafc0c2

    SHA512

    5af31fff82956ad4e189af64ae8aa331ec8b8acad310d4780f4a79a1182c1038800176492eea11d255f5f3339eb8fda08d1387805590e103a910991402947cfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0d2cd691b66e3e197c2fd8f29952b76

    SHA1

    848625ae94f6d99c4f366682832f3b0038ec0824

    SHA256

    7f89528199fe2db735392c8470a5f9da6693c5be4151c386f13ac2b9063de30c

    SHA512

    8b64b921ed9f84d657998df037dc5b112dcd3f19f756210bb0ff8968365e1987c3e338e103639893dd1b852baae3b4e0bb0098e06b8f867fc0ab1153c1c4c43c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dd90c099961d20ebbc5a2f566564571b

    SHA1

    6f793c4854816aa32c185b186ee57e6ae5c9eb88

    SHA256

    b4c166c53e695b788bcd7183dc7222a0de685c586956d7a1d209559d63dc0b68

    SHA512

    d8747961c5d96690ab7c9afb9ab432f80262544e142a39dbc5f73c9faff93cf7e39fa1ec049ea9b6f6c0c061ffdfb6edab4f9e121feb14d6b62efa7ca0d6a2ac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4859abd36dab096c32ab4f52c363744a

    SHA1

    f7829292a3040d354dc73e0119cd0882f5835490

    SHA256

    de30a2ec9816de301b8f020fbfd8f208322df94d903a3195051c8df7afdd2c6f

    SHA512

    8017dcb2f8187a6efaaf27630082fa6528eea3a57f2805d2cfeafc710c916064dfb1e3c22e72b25e3f7be5b79cc502c54a6aa0e27474381a9eab7b462851f510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1af783e54a8e5c3311928ba4845b675

    SHA1

    b35d22059f31ce60aba07f89fa265a6f4ce7948a

    SHA256

    d632d38e73696aed302884fbcb411507e3e715303e70e3522fc4788dd2aa61be

    SHA512

    9625aa81015150f93295f7d7c81acf750e9ba61b8dfdb85957579ea3be7af2a268c7532d10a18221507161afbe5414914450f73fc4c5b9cc794a79df29e8d438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d416805791ee5cf6fcf5314ceb4757a5

    SHA1

    ea2bdf352b33fc4a7884f4db89e5e3e4ad1d7b7e

    SHA256

    48cc5c805f6cbcd830298fa45b9ec3b8cd60961ad6f9ac63f3866f518a24bedc

    SHA512

    d19a930cd93eadd655742efca1bfa841da426d3f39f975b4650eae8de2e9d55f6dfd57e55322787647e3a7afec56992923d98f2e62493171441bb5e13dd1e63c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc071a650121c94c14fa3ce8cbf15dde

    SHA1

    2319823c8a524d4bc55be752cb2e3c9177cdb152

    SHA256

    e367c153279b09cc8054b8899a86ccc91060374ab657f858e02ec221be1abecb

    SHA512

    e453fe3c03b0e5c7795ad79b99752e79f4d61addeac9c283f76c9c84d0d800d9ff173e62a514e9921a5702256a767647cd879043bc8486d7dbff9a9805a0c305

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d90ca5321433fda699f1ad436fc992b4

    SHA1

    7bd34d0e9d97df2d8f274f1a4a62f30bfb44bbc1

    SHA256

    e28b49e45422dd185d2476e64faed3c2cbdcb886a56b42c614e911dec3956983

    SHA512

    9602868bc76aa870724dbfa8418c43d0fbc220f80a5b6687e7ea27ac48a8f4557f7515bed1f6538c4996498ffa9e5672cca753ffa7dd14a7df6478b3760e5e9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a43b1e5d144459bb0ccad76b68f7f3ef

    SHA1

    740306bac8460b90c0756b7e37f0d7243b2189e0

    SHA256

    3b8b4138c5ff0c080b923ca9b8c7f23cd0b3415ec9167ddae3d19ea6d60922b0

    SHA512

    0f812cb81fe16862ed2724466aa0ca306865c82eeda2e0eb6f10e0ba05f32698e6767e34b222c36741644ed70f18730c7a0e68e3fe42e22c4fc3f2b2ecef4bf9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1943902473a3b882e48f29e6b1c30546

    SHA1

    f01f073d3c007c1f7dd7aaa912b8f07425becde5

    SHA256

    005ad0a3910a49ef610bfe1100e5f7f6b2e7b5a960c02a9c7ae5853536d9917b

    SHA512

    0c3bfa535be0bde67bad176e9be64735f725e93fedc4bb1c16aaaea52ee382e7f5e742c3eb9c9600602c64e9647af3768fac74ca1deb00c79bc1fe71e544db86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9de7ce2fc209e130a3f76004d5995318

    SHA1

    92b79846d697e43fe0059eeb8f4a4d5fe2a0a1d1

    SHA256

    5d45b07219048916ed116b4a24da756976bb15ea58ac6f21eb20d228cafd385d

    SHA512

    46cccb369ec3c17083f7cb509ac05208cfe44cc396e955a431b5481f2a58717260824dbbad774354a5dc3c32cd9e2b1c03acac4d8e65ce38ac9672fb6a0d171e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a9ebc730d6a66a8f3e615dd1cb2ce473

    SHA1

    8fdcfe503383f81c21f22793c42c13bb7d0b32bf

    SHA256

    1abf1297f3f0f3af1233e349534b57e915207af527854b77f6af8e3618bf784f

    SHA512

    e0c1ea720bb5e0a2e52bb727aa99075cbea01c7f2446ee47cbb896ca6a8a1c8bda89d2d18afb2d6de352262024ef8bc6562aee8cab53dec933f3a8a6092f23f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b9004441f2bb520c03bbcda4ffe958d5

    SHA1

    607db60d71518a3dda7b1c495ee04648013edd16

    SHA256

    761348c91c75e5babe96d26c9344fec06afbc2069e7457ea1f4cb6aca10d1c6a

    SHA512

    bc6b379d7e10071653315e81b80d3be6ceb7276e6548510e87ecf172ef3f60bd4b7992a2409e5dcdfa478a1ea8c0b522f1a5af08e2abf1697e94e2527ce14df9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    37c9b7a461879a23971d8368fc52831f

    SHA1

    cd3a197e062e8fdf1766ea6947b3ca518a16f5af

    SHA256

    6888f5df0d997c8b7bd7e380e67329635dcdfa84547ee5b0230176c38ac4223e

    SHA512

    3b45284c6a6561a701efebb70512962fdbd2d60c498faf213f379ba56c54397b086b7380b6da71fbc9c71c527db6c71a027cb5f2b66c837eaf59fcd348a18a54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    605a11a3c41c933509333e0df1e84082

    SHA1

    ecbff21f565cb8b1d59e671d7e9b6c2a06701429

    SHA256

    d9f93daa2d9b40d3642a1ccf083f5b2cc882444955d2629d9f0de41c2e6d5018

    SHA512

    cf49739c8c460c881fe938dc24ea3bd982598c20184b002e6659b25a5db762191624da6fda56ba29398559e38efae55419017a59d6bd000e99dae1a004762199

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bf7b06cbafd91d2ff5e9aff97b90dd0e

    SHA1

    3412d7ca293917f3860f1a7e65520b66489a0fd1

    SHA256

    86e1787a74664e4fa9a67e7f5e6b83e290b006193b0892f5ae7c74fb92ea874e

    SHA512

    fc7891f90dc41d1eef48e81a10c2d848d8dd57e7e0833b5d1749277d5ae77a82892a94f6fc9d50dc34ab61f5917c0d22055890693877d2088b8809046ca75d89

  • C:\Users\Admin\AppData\Local\Temp\CabBF1C.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\TarBF9D.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\tmpD115.tmp.bat

    Filesize

    151B

    MD5

    06958f9a52f43dab2037d787f901e5f1

    SHA1

    543de07beecdce3b6bc4ab8b9a3a7c9c37a30c99

    SHA256

    3d825857ca2448975484bcc6e3497b38c32251b06160fb10f9ad010ecc543aee

    SHA512

    50021a6d0c8772fc8ed89aab18d00613eef835373bfe668d4d50a04a05e1eae1812ceb8d557a21b55854b32822af6e7d037410723d2bb3a5481d8e1bad054e85

  • C:\Users\Admin\AppData\Local\Temp\tmpD115.tmp.bat

    Filesize

    151B

    MD5

    06958f9a52f43dab2037d787f901e5f1

    SHA1

    543de07beecdce3b6bc4ab8b9a3a7c9c37a30c99

    SHA256

    3d825857ca2448975484bcc6e3497b38c32251b06160fb10f9ad010ecc543aee

    SHA512

    50021a6d0c8772fc8ed89aab18d00613eef835373bfe668d4d50a04a05e1eae1812ceb8d557a21b55854b32822af6e7d037410723d2bb3a5481d8e1bad054e85

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    731KB

    MD5

    3024f8b8500d2629b5d934d0ef334efb

    SHA1

    d2013e0488e50fe9039986129e46725c2353e0a7

    SHA256

    12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31

    SHA512

    b8ca6e76ebfd879d3f5643caa614d57fb7d57e5a95d79aecea2bdbd71bbed366b72a59a12b96b6f84e988c45e15e1c3369fd01418972e0aed7dba65ee2a4a998

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    731KB

    MD5

    3024f8b8500d2629b5d934d0ef334efb

    SHA1

    d2013e0488e50fe9039986129e46725c2353e0a7

    SHA256

    12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31

    SHA512

    b8ca6e76ebfd879d3f5643caa614d57fb7d57e5a95d79aecea2bdbd71bbed366b72a59a12b96b6f84e988c45e15e1c3369fd01418972e0aed7dba65ee2a4a998

  • \Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    731KB

    MD5

    3024f8b8500d2629b5d934d0ef334efb

    SHA1

    d2013e0488e50fe9039986129e46725c2353e0a7

    SHA256

    12a63c9b7bd7c707d4a0e440182abf8c5afc62c171a06f188e32c18048c7ea31

    SHA512

    b8ca6e76ebfd879d3f5643caa614d57fb7d57e5a95d79aecea2bdbd71bbed366b72a59a12b96b6f84e988c45e15e1c3369fd01418972e0aed7dba65ee2a4a998

  • memory/1408-0-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/1408-14-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/1408-4-0x00000000003C0000-0x00000000003DA000-memory.dmp

    Filesize

    104KB

  • memory/1408-3-0x00000000042C0000-0x0000000004312000-memory.dmp

    Filesize

    328KB

  • memory/1408-2-0x0000000000790000-0x00000000007D0000-memory.dmp

    Filesize

    256KB

  • memory/1408-1-0x0000000000090000-0x000000000014C000-memory.dmp

    Filesize

    752KB

  • memory/2156-30-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2156-28-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2156-25-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2536-18-0x0000000000F40000-0x0000000000FFC000-memory.dmp

    Filesize

    752KB

  • memory/2536-27-0x0000000074050000-0x000000007473E000-memory.dmp

    Filesize

    6.9MB

  • memory/2536-22-0x00000000003C0000-0x00000000003DA000-memory.dmp

    Filesize

    104KB

  • memory/2536-21-0x00000000005F0000-0x0000000000642000-memory.dmp

    Filesize

    328KB

  • memory/2536-20-0x0000000000C40000-0x0000000000C80000-memory.dmp

    Filesize

    256KB

  • memory/2536-19-0x0000000074050000-0x000000007473E000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-35-0x000000006F3B0000-0x000000006F95B000-memory.dmp

    Filesize

    5.7MB

  • memory/2640-34-0x0000000000430000-0x0000000000470000-memory.dmp

    Filesize

    256KB

  • memory/2640-33-0x0000000000430000-0x0000000000470000-memory.dmp

    Filesize

    256KB

  • memory/2640-32-0x000000006F3B0000-0x000000006F95B000-memory.dmp

    Filesize

    5.7MB

  • memory/2640-31-0x000000006F3B0000-0x000000006F95B000-memory.dmp

    Filesize

    5.7MB