Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    09-01-2024 03:50

General

  • Target

    4d4321e055d988604577b2fa45e1034b.exe

  • Size

    912KB

  • MD5

    4d4321e055d988604577b2fa45e1034b

  • SHA1

    10518b085d3b8d8aaae5f7afd43b939d66c32774

  • SHA256

    ed044ef78b41b64571af0feadfffda2fe9a504328d6c9c26872ea7b369d43461

  • SHA512

    af4b54851cefea6ccb727f4a6a993b19f2ace002f617582313e1a8cba6014da5d4426a5dea04d26d85ab03e0de01b51e8d952c76f365098cce0a25a59bb07689

  • SSDEEP

    24576:CRc025R/3Tr5tNcq+Ada9TrhVBwrnHoSmZx5/:CXIRvTtIFA8pBanHoSSd

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 11 IoCs
  • Checks BIOS information in registry 2 TTPs 22 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in System32 directory 44 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d4321e055d988604577b2fa45e1034b.exe
    "C:\Users\Admin\AppData\Local\Temp\4d4321e055d988604577b2fa45e1034b.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\solhost.exe
      C:\Windows\system32\solhost.exe 780 "C:\Users\Admin\AppData\Local\Temp\4d4321e055d988604577b2fa45e1034b.exe"
      2⤵
      • Drops file in Drivers directory
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\solhost.exe
        C:\Windows\system32\solhost.exe 792 "C:\Windows\SysWOW64\solhost.exe"
        3⤵
        • Drops file in Drivers directory
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1840
        • C:\Windows\SysWOW64\solhost.exe
          C:\Windows\system32\solhost.exe 804 "C:\Windows\SysWOW64\solhost.exe"
          4⤵
          • Drops file in Drivers directory
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1216
          • C:\Windows\SysWOW64\solhost.exe
            C:\Windows\system32\solhost.exe 328 "C:\Windows\SysWOW64\solhost.exe"
            5⤵
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2244
            • C:\Windows\SysWOW64\solhost.exe
              C:\Windows\system32\solhost.exe 812 "C:\Windows\SysWOW64\solhost.exe"
              6⤵
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1632
              • C:\Windows\SysWOW64\solhost.exe
                C:\Windows\system32\solhost.exe 816 "C:\Windows\SysWOW64\solhost.exe"
                7⤵
                • Drops file in Drivers directory
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1628
                • C:\Windows\SysWOW64\solhost.exe
                  C:\Windows\system32\solhost.exe 820 "C:\Windows\SysWOW64\solhost.exe"
                  8⤵
                  • Drops file in Drivers directory
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • NTFS ADS
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1032
                  • C:\Windows\SysWOW64\solhost.exe
                    C:\Windows\system32\solhost.exe 824 "C:\Windows\SysWOW64\solhost.exe"
                    9⤵
                    • Drops file in Drivers directory
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • NTFS ADS
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:272
                    • C:\Windows\SysWOW64\solhost.exe
                      C:\Windows\system32\solhost.exe 828 "C:\Windows\SysWOW64\solhost.exe"
                      10⤵
                      • Drops file in Drivers directory
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • NTFS ADS
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1680
                      • C:\Windows\SysWOW64\solhost.exe
                        C:\Windows\system32\solhost.exe 808 "C:\Windows\SysWOW64\solhost.exe"
                        11⤵
                        • Drops file in Drivers directory
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • NTFS ADS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    e17ba1c637c76049d7c915752673c050

    SHA1

    d1fc6be9601b514910f7b9f9d70381cdbe24269e

    SHA256

    eb5877392b4ea4d5384cd47de8b3a1bab2100ef34c00480ce3b0ca916fa5ced4

    SHA512

    8e5f07ad01aea496791fc630333e5fa2950f1b6ff42271064cbe76d867d5d1da4dfaec07b8b61bc0d99b3fde3135a5cc3e913c2d6b7c256915ab6e1287f42023

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    ebcacaa71b637db61a0ed14e09517d5a

    SHA1

    7d487e6bf22f49c2e3528e6a8c7a999ba66c7785

    SHA256

    9c0f5d95790d8136ed5c2269ac6fabb874ea8d0596d2237d77e9ba4a2b46de08

    SHA512

    431bad34afb612f66c1829cf1ccdbfa2223b2d8ca988016317d1702538550b6c86dac79b2cca32ca47d4f9aeb007a90fb2db558aa8f0b1eb59d4d6f74fb74fad

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    192e13ac26f9d47a5c8068440f83423c

    SHA1

    8b1454247cf7a7eba8ed7e2c7aa47302b35cd259

    SHA256

    c437b711ba3462f8d358cf4168deb1cbd5438e3443bcc2248143ff30a84a1185

    SHA512

    8ca9d36c7ce75eb074a432f9a75b3f525d84c22b8a48800a00b6593366066859f1669efa1dc11f5af7e3271cbadb40c83573ccde1ab4e5ff0822a87a48efe273

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    ba6f75005b05d63d19234fdc4c8d3ee3

    SHA1

    beb57fea64c3514a94124787dfcb7b95c1ca7179

    SHA256

    5f9fb945977b5d0341839c4fb3cfefc995572a74e010dd719972864d54b09051

    SHA512

    d29a6adb0bcaf5086b9f262220208658a5a181919e930534385a74be8bc46362296ba130fdce6b05982635ed59b4973a6564b91f00b9900b662fba7f90b9d8b7

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    d6d072e64e8b4d5c00557c507e91c6f1

    SHA1

    ae5b04b93a581ddc736378ae7127093f07eeba2e

    SHA256

    f98443a5d9593daab6fb462bc3d6e9a271757c8525d8a743ba5bb7e30af3e844

    SHA512

    7cc1a2fd02c42b044b094ff7c964ab987551ef468d99e7a3e2cba96b90d5fa1a50e199dc73df17744b8fc3746a33bba9ad2f3fd08eb6add1cfc976903784ddb1

  • C:\ProgramData\TEMP:466F9D5D

    Filesize

    113B

    MD5

    b41d9bda656e8b76c698130f7eaeb8ec

    SHA1

    0c3936dec3506c008c88a2a02eb99c798277db23

    SHA256

    012a2c913d43d19bf8efeef0c07b569490603da57d1455c460a6460adac255b0

    SHA512

    ba41e738b68f0f1193147b60907ca93771dab5cce8f537dde222ca6d9383d288e231f285507b724c00f9f5c93be106f8173fd0d50ecf0544ee9783b30fe99cdd

  • C:\Windows\SysWOW64\packet.dll

    Filesize

    82KB

    MD5

    4b9948f1f473bc97ea408a83569836d2

    SHA1

    1c4b710ec3a485ee0b656470c53976dbd827bff0

    SHA256

    6f52b5d260f3a73d4a669f05dd1b231d63ae590331f41d54cde2b0053423fb2f

    SHA512

    bc13b7a8e8c73dd9cef770baf433230fc0985ada675b8f897aeebdb58aa9a3ee6c7c3ed2ab9494ea5a660d88bbf0341965ff5b5fd28dd3b9cdf383309f7c09f5

  • C:\Windows\SysWOW64\solhost.exe

    Filesize

    437KB

    MD5

    183c22c8719fcf32b027d3a30fd34b6b

    SHA1

    6cf0ac4e9648bb12f6e5ac6e5784ff422077f56b

    SHA256

    8e1191c74675ca718985c2b24233ec0daeafe8ee98e4fda67772aa2ab181eddf

    SHA512

    26222c8b16e360f6a943a0c18a89be9979fd6259abbcde82c9bda5e2e1193dc5da9c12bed7734a6bae352c0100cdcd373f61beeea29664af412ae5f13101cf81

  • C:\Windows\SysWOW64\solhost.exe

    Filesize

    650KB

    MD5

    03ff274fe7fc6890a7dbb23e64feca36

    SHA1

    c75a5dfa1f28b7d07e54500dfd3de64afbe43ffc

    SHA256

    e21dd0e95cb55d26c54cee8b761493ee877d0d398151f230130ea0de9f9c7316

    SHA512

    7de94e9dccaf913bd5572fd56dac3228704b8f5d8e9f5de712cb5c346ff415e024c0a830b7a83cf3f6f694ff493d55d203ccdd2aa56eacffc3c547b5b2c36ae7

  • C:\Windows\SysWOW64\solhost.exe

    Filesize

    672KB

    MD5

    c1bb33d1d12245d84a9dba3872c7ca01

    SHA1

    5781db3ea7c3b52d5a17fc37bea8269aa954fb28

    SHA256

    3a494a15ba47870470d05716be1315efdbf05285d9930341d3eb302e71344031

    SHA512

    a1e421f8db021e2722a200246da6618005a95e095f54bc60cc6bd2c2e4cc7f3ff93d1d455d97b38c1e999b88106b006c68d4bc9b4495bdddbacb8b1b399a206d

  • C:\Windows\SysWOW64\solhost.exe

    Filesize

    475KB

    MD5

    6470b08fcfdfd10c77dd9e4d56b8ad7d

    SHA1

    1d3f0dc591665a1a173fad94b23750c2ad46b662

    SHA256

    a904d5d97b04364eccd0629e2291c7276651b3b7c98836995766b29e9881da71

    SHA512

    2b91cedf63126cdb22bc07a2895b22af2cdf7d9c5fa5cd13b554a04fa9639630a8c6336840daa8bfae9a98aa2439d2ce3a4ac510d0a3c0991c9b4e65e9a43013

  • C:\Windows\SysWOW64\wpcap.dll

    Filesize

    148KB

    MD5

    73ff261ea5de6047d7c1509e89d606a6

    SHA1

    fef59f843db82d252c27c5318458ac2035de059a

    SHA256

    042c941d2b0ab07ebcb5472391963ac264daf9b93212f04a9c1df8665f2f0f32

    SHA512

    21f916f2321e382bbebfd95a85240f4ff88cc985065e8537db4fdc6d019bccb79e4c85ed70e741acb4968ac38e82f4fb0b827291f471832ec281337b6ca98265

  • \Windows\SysWOW64\drivers\npf.sys

    Filesize

    41KB

    MD5

    243126da7ba441d7c7c3262dcf435a9c

    SHA1

    42616f7034c0f12e3e4a2166ebe082eb3f08223a

    SHA256

    80d36efd5b3abb82c421149d423e5019c21f203f085ae2655429a44bb5a9f5c0

    SHA512

    f5539774d89e8f025da97e7b49d143b7224fcf899db967a34445de70f9228ea5e2d5daffe6444492ce82a3dfb2734786e09140277c208ec1e64580ad74883e68

  • \Windows\SysWOW64\packet.dll

    Filesize

    45KB

    MD5

    97a6f8800d2bb98b0935b5ffd85201ce

    SHA1

    fa27fb9ca8242f2933e0ae9339ea1af8692e8fea

    SHA256

    6cac80957cec90d86232fbf72eb9b57e64edf50dba6e516b38fb957b7db23a80

    SHA512

    5c3ffc3f5d55a69bf45df9a2a6a1ee1244f97facf7abb8071e4c7aba68fc23f5dd30744ba64750c2d1b02ab986fdef36388b4755d92abd64ca53e6e9f9001b9b

  • \Windows\SysWOW64\packet.dll

    Filesize

    86KB

    MD5

    3eb0beb8e318646104362537570fc6bc

    SHA1

    3cb48ea9073fcca5835adad307e14ebf0cfe7279

    SHA256

    ab3f8c80b85aae70f89c8e7919d7dd147c2bc3ec68769e0bdb05fcc4083e3643

    SHA512

    db5fd16749641de6282d36af7b1921f908850ece3429ffe5ad33d990431bf4990f0314d28af082394af1f4d66516d9d89806a38e2801c34b4dd1ccb69bfafe47

  • \Windows\SysWOW64\solhost.exe

    Filesize

    748KB

    MD5

    044fcfca1a6312ab03eefa861a8e6df0

    SHA1

    8c90193b9b96c44e0c4d528c5942e4b9bd0e9023

    SHA256

    ac53caaddc9cf223c0148cbc873ca9bdf2bb92d9c488d3a15abccfd97936049a

    SHA512

    f228bffd8aaa72e32506cc2ea039afb6de18ef49b5adb3875e143e89269d6ba03d07dd400ed42dbbef323974278f528f0e007da2a098eabbe1daff41ca80f4ff

  • \Windows\SysWOW64\solhost.exe

    Filesize

    677KB

    MD5

    603598d11b7353ffdf5d422185060454

    SHA1

    748cebd57b48cc45a1328d93daeb1c05b72da328

    SHA256

    6d055eec509c111a0a1164fa926487398c2ff9cbc143759760246f2037184da7

    SHA512

    52e05049a3ef57246da9d6fccc437c482f774d4893abbaedb48a6b86ffde752c9f1ec34f005a76c63237501446ef729fe89862a8c038a24e083834883bd9d384

  • \Windows\SysWOW64\solhost.exe

    Filesize

    857KB

    MD5

    c5bb596b7d5e46204e71788227e079cc

    SHA1

    573e5dfd1b59fbf86f5269e9ac3ce73ac1bb794a

    SHA256

    770b3681a842acacbabd58d4a5d932a2e9647995e6787e39857f2bb0c6a056b0

    SHA512

    ac42119ec7e8e9a60f77211c2612e07ee0b84a056b676fef08659c152eede0d3ef638a6eb1c9bbeb3463ea004098b38970c04e7b469c1adad3ab83a05aeddaab

  • \Windows\SysWOW64\solhost.exe

    Filesize

    580KB

    MD5

    1fc8d1b2ec2f6ff6541f1c4b23edd6e2

    SHA1

    dbc43a02cbcea015c1d2b21dd945f7c21a6366b1

    SHA256

    88ad898e4110ad177ce4f43dc3e93db3cb267d7e7867fb858bb79d0c0c7e433c

    SHA512

    d10883d7d3e76548da35fe66d753fd40c728ed0cfdf0a32d2a96606b87fa65bf2e06473d0f5a4d752012e6ce67cadbfe1f35a4a508af03ac52af1d17acc1615d

  • \Windows\SysWOW64\solhost.exe

    Filesize

    570KB

    MD5

    a7fe034441bbabcf1b7605ea948d15d2

    SHA1

    7aedc6288fb97b4fc9b9b793ec3caa45adad536b

    SHA256

    33414111612bfd28082758b552d6b33e5148f618fca7baa79f0f1017e87fb2b9

    SHA512

    b576bd64a5307d22788e9ad86061307684b4fd3c3e40ff1fb6b0c2121db12e07060e03882daefc1cedba7efa5987a6c385d425fcb1c82fcf8674fcf37cb2d6b8

  • \Windows\SysWOW64\solhost.exe

    Filesize

    411KB

    MD5

    c015d1b1a416e1d7372a2805fd14250e

    SHA1

    7de370ea691bce7e4e3a2e8323438ccc2adfc3ad

    SHA256

    64c24c3cc52a1f1f07319ed38696cd556ddfba678b5a257ce6d10bd27dc3c530

    SHA512

    8d95f5dee34b43ceb6cfa3c6b14e520ccc71ec147d7d8f11b4543fd056df0d59ebbc5d063ceb4008999ad789d3117b6e8bf51bcfe7e86aaac8d19080b606453c

  • \Windows\SysWOW64\solhost.exe

    Filesize

    466KB

    MD5

    4e7c959f85cc1c1f91f632c5dfe083aa

    SHA1

    da8f24f3bd9c892e3dd242518e43cf547315e005

    SHA256

    6b6d8ccb283c449043bf2877a26933c759a1ff0867c58478340c378001a45d49

    SHA512

    f0d6f892f79b9d322cf125116b28452df205d7f07b5365765af409a5669efe198e518736d3492f59ed4020aa87b53259bacee5550d11d4ce3bbd4e7b325b02d8

  • \Windows\SysWOW64\solhost.exe

    Filesize

    912KB

    MD5

    4d4321e055d988604577b2fa45e1034b

    SHA1

    10518b085d3b8d8aaae5f7afd43b939d66c32774

    SHA256

    ed044ef78b41b64571af0feadfffda2fe9a504328d6c9c26872ea7b369d43461

    SHA512

    af4b54851cefea6ccb727f4a6a993b19f2ace002f617582313e1a8cba6014da5d4426a5dea04d26d85ab03e0de01b51e8d952c76f365098cce0a25a59bb07689

  • \Windows\SysWOW64\solhost.exe

    Filesize

    800KB

    MD5

    d759a327d5b8e0204c3c4c0dc5e66799

    SHA1

    82a53c81f6469d816d047fcb4fdb33281ee21ff8

    SHA256

    02511d4b393c127b5eb7e388f2520f4c98c3427267b992bcc1a3564be01aecfa

    SHA512

    30257e86b0f3532b0d61435a40e51461d03238c001dbc34897624492c54b26bf399e882759d38df7c1f16431aff9572b0e1ddf3c1b5b5b9bab8b6b69c4444062

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    190KB

    MD5

    37d3c7022b4daa681f0ddca1263186c6

    SHA1

    0c071134515067f70e91cc1ed298c2548f6d31ef

    SHA256

    8bc0b0cb8f4f77855b911e2c8f993d9e042b95f78f804351f77de29daa308db6

    SHA512

    6d2b6b867dc972febc9f198a881e288994d5c84e937f9d3175181364053566a3717228093d1148a6a0d323e7188a5de2b01cda7557846de8f25dbc0e12d15f8c

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    234KB

    MD5

    cb0afba4f0fb6ca2b2ea0d2c3e86b588

    SHA1

    2459367892e012314b451e05de1f1162448a05fa

    SHA256

    1b0fe60175c88f7cd3f3765b2f0f3eb1530b2e5e5b51f89a83e0322de32bdcf7

    SHA512

    a4e2d66af68dee67be5883c4770c1339b6be4847a993619389404af6a7ec9763361d9a14c632ca6704f63d84b05483f4bea2ec035b466fdaf03ce68c5cbca128

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    1KB

    MD5

    de4800cf02562eb10dcaefcd6939dc97

    SHA1

    610767bcba90ee93567b2d1c1f6fbd08dee0464a

    SHA256

    3d28d3d9e26783c285fc52f9785061a8fd89120c8495704879598770b1c4fce7

    SHA512

    59d5be211be94b4a101adc085d1471be01524683f38c04c1e09766e4b81ce5af02b7f4cd5c6de3631479773cbe3fd70e731c309a180da523f424983afbdace8e

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    46KB

    MD5

    4b30a8ac265fbe611e4cb32f7c3c2c4b

    SHA1

    427187dd8ba5513194feb88756b45b05635f5e9c

    SHA256

    9f8998705cf7a4c5ffdd9adc16a5fe0b421e3d5c938d92961b972caa93aea6c7

    SHA512

    b288e9e40cb91b43352d4501224eea928dfe132a2d2352468606278ee4aec2d079b484c9397f2fd03354d6f776e88fcd196cd8c6eacc8ae550836ca279d754ae

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    206KB

    MD5

    d4c583ec50da446c3f1240743be66186

    SHA1

    52b47a4e5121129f11316cd5d4f22d0acb890d15

    SHA256

    2e0c659abaf299ebf5a29d42d24f957693d6f5c726ca6827590566cce562fea4

    SHA512

    f351857f71b2bf07781c64ec5721e396f69eebbf660bbd426fad8c1f7ace90b0bde707c100d9f00e729466c3afbc5dabf5215bfe880edd8e2cd9c13aedaf7718

  • \Windows\SysWOW64\wpcap.dll

    Filesize

    183KB

    MD5

    4c4e3bd4f945ec9a3d6a1b336d64377b

    SHA1

    74f7a1b38507fb78d6ec0c5003b28b0c822f41cd

    SHA256

    1e4f14bba725258783fb4de4606a28e340f350cde71e4c2ee5cc120528fed13e

    SHA512

    9430e8ce4c832bca2a4689d9f1cb82d19e5cce9caf0387b5cef0836aded8ea44b3b7d24c7af16d5a0234f5dec6f896906b7efd361e7caa6636361f0b90ae24b3

  • memory/272-345-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/272-357-0x0000000001F70000-0x0000000002009000-memory.dmp

    Filesize

    612KB

  • memory/272-372-0x00000000022A0000-0x00000000022A9000-memory.dmp

    Filesize

    36KB

  • memory/1032-314-0x0000000001F80000-0x0000000002019000-memory.dmp

    Filesize

    612KB

  • memory/1032-344-0x00000000036A0000-0x0000000003862000-memory.dmp

    Filesize

    1.8MB

  • memory/1032-336-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1032-305-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1032-354-0x0000000001F80000-0x0000000002019000-memory.dmp

    Filesize

    612KB

  • memory/1032-335-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1032-356-0x0000000001F80000-0x0000000002019000-memory.dmp

    Filesize

    612KB

  • memory/1032-355-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1032-341-0x00000000036A0000-0x0000000003862000-memory.dmp

    Filesize

    1.8MB

  • memory/1216-182-0x0000000001F20000-0x0000000001FB9000-memory.dmp

    Filesize

    612KB

  • memory/1216-166-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1216-168-0x0000000003890000-0x0000000003A52000-memory.dmp

    Filesize

    1.8MB

  • memory/1216-170-0x0000000001F20000-0x0000000001FB9000-memory.dmp

    Filesize

    612KB

  • memory/1216-184-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1216-159-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1216-160-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1216-181-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1216-139-0x0000000001F20000-0x0000000001FB9000-memory.dmp

    Filesize

    612KB

  • memory/1216-130-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1628-313-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1628-302-0x00000000035F0000-0x00000000037B2000-memory.dmp

    Filesize

    1.8MB

  • memory/1628-315-0x0000000001F10000-0x0000000001FA9000-memory.dmp

    Filesize

    612KB

  • memory/1628-311-0x0000000001F10000-0x0000000001FA9000-memory.dmp

    Filesize

    612KB

  • memory/1628-300-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1628-292-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1628-272-0x0000000001F10000-0x0000000001FA9000-memory.dmp

    Filesize

    612KB

  • memory/1628-267-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1632-255-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1632-257-0x0000000001F30000-0x0000000001FC9000-memory.dmp

    Filesize

    612KB

  • memory/1632-260-0x00000000036B0000-0x0000000003872000-memory.dmp

    Filesize

    1.8MB

  • memory/1632-248-0x0000000001F10000-0x0000000001F19000-memory.dmp

    Filesize

    36KB

  • memory/1632-271-0x0000000001F30000-0x0000000001FC9000-memory.dmp

    Filesize

    612KB

  • memory/1632-218-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1632-269-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1632-228-0x0000000001F30000-0x0000000001FC9000-memory.dmp

    Filesize

    612KB

  • memory/1632-265-0x00000000036B0000-0x0000000003872000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-110-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-116-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1840-136-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-132-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-124-0x00000000003F0000-0x00000000003F9000-memory.dmp

    Filesize

    36KB

  • memory/1840-87-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-122-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-117-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-113-0x00000000003D0000-0x00000000003E5000-memory.dmp

    Filesize

    84KB

  • memory/1840-134-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-108-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-98-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-93-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/1840-109-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-107-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-106-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-104-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/1840-103-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2244-227-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2244-226-0x0000000001F00000-0x0000000001F99000-memory.dmp

    Filesize

    612KB

  • memory/2244-204-0x0000000002040000-0x0000000002049000-memory.dmp

    Filesize

    36KB

  • memory/2244-172-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2244-183-0x0000000001F00000-0x0000000001F99000-memory.dmp

    Filesize

    612KB

  • memory/2244-211-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2244-214-0x0000000003570000-0x0000000003732000-memory.dmp

    Filesize

    1.8MB

  • memory/2244-216-0x0000000001F00000-0x0000000001F99000-memory.dmp

    Filesize

    612KB

  • memory/2244-225-0x0000000002040000-0x0000000002049000-memory.dmp

    Filesize

    36KB

  • memory/2496-12-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-18-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-0-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-6-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/2496-52-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-13-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-15-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-16-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-17-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-8-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/2496-19-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/2496-32-0x00000000002D0000-0x00000000002D9000-memory.dmp

    Filesize

    36KB

  • memory/2496-26-0x00000000003E0000-0x00000000003F5000-memory.dmp

    Filesize

    84KB

  • memory/2496-44-0x0000000003370000-0x0000000003532000-memory.dmp

    Filesize

    1.8MB

  • memory/2496-1-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/2496-49-0x00000000005D0000-0x0000000000669000-memory.dmp

    Filesize

    612KB

  • memory/2496-36-0x00000000002D0000-0x00000000002D9000-memory.dmp

    Filesize

    36KB

  • memory/2848-64-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-56-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-53-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-60-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-61-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-63-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-67-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-45-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-47-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-66-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-65-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-72-0x0000000002350000-0x0000000002365000-memory.dmp

    Filesize

    84KB

  • memory/2848-76-0x00000000021C0000-0x00000000021C9000-memory.dmp

    Filesize

    36KB

  • memory/2848-77-0x00000000021C0000-0x00000000021C9000-memory.dmp

    Filesize

    36KB

  • memory/2848-79-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-78-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-80-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-85-0x0000000003510000-0x00000000036D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-96-0x0000000000400000-0x00000000005C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2848-95-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB

  • memory/2848-94-0x0000000000940000-0x00000000009D9000-memory.dmp

    Filesize

    612KB