Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26/11/2023, 23:59

General

  • Target

    a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe

  • Size

    223KB

  • MD5

    8d3f2f53848fd102286d88695f8a223a

  • SHA1

    6c1990c0d2a15bdd6d259122f4341f5f9c23281b

  • SHA256

    a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f

  • SHA512

    f5ce8c099b0e50ed1cf217281ab7d0e3900415ad43fb4d9dac8a06aad9700585394f0d29d4c4c747e398f00d7de50e79b2730560bdd9015c792f7e3e6cefd80e

  • SSDEEP

    3072:QZ7wXfSRZ0ON/EwW66wN94xu4CkAZJM2k5D66L+NfGbVON2Nqi/6gS5UoWXHz72n:YwPSUONLNsuWA7koN+boRi9S6oiz72D

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops file in Drivers directory 9 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in System32 directory 23 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:424
      • C:\Windows\Help\dvdplay.exe
        "C:\Windows\Help\dvdplay.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies data under HKEY_USERS
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2736
        • C:\Windows\system32\perfmon.exe
          "C:\Windows\system32\perfmon.exe"
          3⤵
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          PID:1952
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1248
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe
        "C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:536
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\a58814b3eedd304e4dee9c2ce80dfd80895ba6711e1d0478dd276f4e62f77b6f.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:528
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:476

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Cab4EED.tmp

            Filesize

            61KB

            MD5

            f3441b8572aae8801c04f3060b550443

            SHA1

            4ef0a35436125d6821831ef36c28ffaf196cda15

            SHA256

            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

            SHA512

            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

          • C:\Users\Admin\AppData\Local\Temp\CabB35A.tmp

            Filesize

            29KB

            MD5

            d59a6b36c5a94916241a3ead50222b6f

            SHA1

            e274e9486d318c383bc4b9812844ba56f0cff3c6

            SHA256

            a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

            SHA512

            17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

          • C:\Users\Admin\AppData\Local\Temp\Tar7499.tmp

            Filesize

            163KB

            MD5

            9441737383d21192400eca82fda910ec

            SHA1

            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

            SHA256

            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

            SHA512

            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

          • C:\Users\Admin\AppData\Local\Temp\TarB36C.tmp

            Filesize

            81KB

            MD5

            b13f51572f55a2d31ed9f266d581e9ea

            SHA1

            7eef3111b878e159e520f34410ad87adecf0ca92

            SHA256

            725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

            SHA512

            f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

          • C:\Windows\1NUkHaI3appUSn.sys

            Filesize

            415KB

            MD5

            64bc1983743c584a9ad09dacf12792e5

            SHA1

            0f14098f523d21f11129c4df09451413ddff6d61

            SHA256

            057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5

            SHA512

            9ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c

          • C:\Windows\2OuDWbmricvxO5.sys

            Filesize

            447KB

            MD5

            d15f5f23df8036bd5089ce8d151b0e0d

            SHA1

            4066ff4d92ae189d92fcdfb8c11a82cc9db56bb2

            SHA256

            f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520

            SHA512

            feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9

          • C:\Windows\8Z81Pimrt6YWy.sys

            Filesize

            415KB

            MD5

            2ab2cc083d6c7a14d0c2e76e9a110342

            SHA1

            b113699238f7b8e46786a8e114168333fbb32b80

            SHA256

            fd859ffcf859a029b960768c2e7825b51782422dbf678dee9b887e2863d3abba

            SHA512

            2ab0bbcb840508561d503bece9176b845c78d285c11a41d91acb8517b3bab1803d41b483c094a3dafafb43a2674ff8344bb1b5799177e95cdf82c6a998836a28

          • C:\Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • C:\Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            7713cf4d6ee5a0b897467e27fc581def

            SHA1

            9869b3de46a23fa07244cf08cb55d5b0d9592a75

            SHA256

            1d76cff93e76286855cd637b649e2e9481917ffb6dc0a17a9894d6f25c03b746

            SHA512

            3273afab124448dd9d5478f74ed49b38fec5d8e24673973b703491d920c0e0ff8e84659d0ec279ac70ce0967269c0caebb69d3a0e275d80e952b2ae7ad9ae63e

          • C:\Windows\w5WnC3Z2tXUy.sys

            Filesize

            447KB

            MD5

            c3f402c80c48412f277bd5be3b299e53

            SHA1

            6fbc5af54bad77872a23fe361666192d2653266d

            SHA256

            8ee6322b41af0a9dfbe278fa65a963358ba6734ceb681dd3eafb9387e43bc540

            SHA512

            22d1314d66404f9a6beab0c3141878f77af5f29bf139665149ac1ea01ab8e6b35eb6f7717b70ddb4f78688d5af79c7d4d518c4fec7b9a9b84a2fba07cba3c4bc

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • \Windows\Help\dvdplay.exe

            Filesize

            11KB

            MD5

            2c97f495cac9ec9d86bfb2c8a264133a

            SHA1

            976daabd0a2bc133380035aa7676362e05034109

            SHA256

            96a1a602c89e877dcf18d54f4ce273d40e0f97144101b5201b0b094e277a16a2

            SHA512

            2d42e537b6957641d6390359011fbc9812f6d6a4e6904fca245f8deb526eea66aeb0fe46d33d6f2b2d7bb436d2b12ef7e2cb44f0aca245d17cc9ad326a467b76

          • memory/424-124-0x0000000000880000-0x00000000008A8000-memory.dmp

            Filesize

            160KB

          • memory/424-43-0x00000000007E0000-0x00000000007E3000-memory.dmp

            Filesize

            12KB

          • memory/424-45-0x0000000000880000-0x00000000008A8000-memory.dmp

            Filesize

            160KB

          • memory/536-46-0x00000000001B0000-0x000000000021E000-memory.dmp

            Filesize

            440KB

          • memory/536-79-0x00000000001B0000-0x000000000021E000-memory.dmp

            Filesize

            440KB

          • memory/536-0-0x00000000001B0000-0x000000000021E000-memory.dmp

            Filesize

            440KB

          • memory/1284-505-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-480-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-17-0x0000000002B00000-0x0000000002B03000-memory.dmp

            Filesize

            12KB

          • memory/1284-19-0x0000000002B00000-0x0000000002B03000-memory.dmp

            Filesize

            12KB

          • memory/1284-20-0x0000000007320000-0x0000000007417000-memory.dmp

            Filesize

            988KB

          • memory/1284-18-0x0000000002B00000-0x0000000002B03000-memory.dmp

            Filesize

            12KB

          • memory/1284-21-0x0000000007320000-0x0000000007417000-memory.dmp

            Filesize

            988KB

          • memory/1284-790-0x00000000089A0000-0x0000000008AC2000-memory.dmp

            Filesize

            1.1MB

          • memory/1284-789-0x0000000003A90000-0x0000000003A93000-memory.dmp

            Filesize

            12KB

          • memory/1284-565-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-381-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-564-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-556-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-539-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-522-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-99-0x0000000007320000-0x0000000007417000-memory.dmp

            Filesize

            988KB

          • memory/1284-489-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/1284-396-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-135-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-479-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-140-0x00000000006F0000-0x000000000071E000-memory.dmp

            Filesize

            184KB

          • memory/1284-155-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-470-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-427-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-412-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-186-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-194-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-202-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-252-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-404-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-320-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-329-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-337-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1284-352-0x0000000002B20000-0x0000000002B21000-memory.dmp

            Filesize

            4KB

          • memory/1952-129-0x0000000001E50000-0x0000000001FF6000-memory.dmp

            Filesize

            1.6MB

          • memory/1952-112-0x0000000000230000-0x00000000003CC000-memory.dmp

            Filesize

            1.6MB

          • memory/2736-136-0x0000000000880000-0x00000000008A8000-memory.dmp

            Filesize

            160KB

          • memory/2736-100-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-185-0x00000000058D0000-0x0000000005A9A000-memory.dmp

            Filesize

            1.8MB

          • memory/2736-176-0x0000000005700000-0x0000000005822000-memory.dmp

            Filesize

            1.1MB

          • memory/2736-101-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-98-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-134-0x00000000006F0000-0x000000000071E000-memory.dmp

            Filesize

            184KB

          • memory/2736-102-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-131-0x0000000001E50000-0x0000000001FF6000-memory.dmp

            Filesize

            1.6MB

          • memory/2736-97-0x0000000000880000-0x00000000008A8000-memory.dmp

            Filesize

            160KB

          • memory/2736-125-0x0000000005700000-0x0000000005822000-memory.dmp

            Filesize

            1.1MB

          • memory/2736-127-0x0000000000500000-0x0000000000501000-memory.dmp

            Filesize

            4KB

          • memory/2736-103-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-113-0x00000000058D0000-0x0000000005A9A000-memory.dmp

            Filesize

            1.8MB

          • memory/2736-111-0x00000000058D0000-0x0000000005A9A000-memory.dmp

            Filesize

            1.8MB

          • memory/2736-570-0x0000000002AC0000-0x0000000002ACD000-memory.dmp

            Filesize

            52KB

          • memory/2736-95-0x0000000037450000-0x0000000037460000-memory.dmp

            Filesize

            64KB

          • memory/2736-41-0x00000000000C0000-0x00000000000C1000-memory.dmp

            Filesize

            4KB

          • memory/2736-602-0x00000000004F0000-0x00000000004FA000-memory.dmp

            Filesize

            40KB

          • memory/2736-39-0x000007FEBF540000-0x000007FEBF550000-memory.dmp

            Filesize

            64KB

          • memory/2736-40-0x0000000000610000-0x00000000006DB000-memory.dmp

            Filesize

            812KB

          • memory/2736-677-0x00000000004F0000-0x00000000004FA000-memory.dmp

            Filesize

            40KB

          • memory/2736-110-0x0000000000610000-0x00000000006DB000-memory.dmp

            Filesize

            812KB

          • memory/2736-777-0x00000000004F0000-0x00000000004FA000-memory.dmp

            Filesize

            40KB

          • memory/2736-109-0x00000000006E0000-0x00000000006EF000-memory.dmp

            Filesize

            60KB

          • memory/2736-37-0x0000000000610000-0x00000000006DB000-memory.dmp

            Filesize

            812KB

          • memory/2736-33-0x0000000000090000-0x0000000000093000-memory.dmp

            Filesize

            12KB

          • memory/2736-27-0x0000000000060000-0x0000000000061000-memory.dmp

            Filesize

            4KB

          • memory/2736-25-0x0000000000180000-0x0000000000243000-memory.dmp

            Filesize

            780KB

          • memory/2736-108-0x0000000003BF0000-0x0000000003CA7000-memory.dmp

            Filesize

            732KB

          • memory/2736-107-0x0000000003BF0000-0x0000000003CA7000-memory.dmp

            Filesize

            732KB

          • memory/2736-106-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-105-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2736-104-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB