Analysis

  • max time kernel
    157s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 16:27

General

  • Target

    b524bcaa36d0e6bd719d96a27f9277e9.exe

  • Size

    403KB

  • MD5

    b524bcaa36d0e6bd719d96a27f9277e9

  • SHA1

    3215d49449e2e044d1c6ced7c755b95f6115d864

  • SHA256

    cff4ec8251196642821acb071b7d68bc93c05af9261d206a58c379ab922fd4ab

  • SHA512

    b07e102ab181a2b2c2f7f44645886097f17512b7e593e371552976b52e39dc998c4e66c1ad80076e558207e19b56811a4cc17777ea4ef005017987d4d2351799

  • SSDEEP

    6144:7jtNSS4VNERBnS5NF2idZecnl20lHRxp3gxncduD7yB9VCO6Sco4q8+dE6CqS:0mRB43F3Z4mxx6DqVTVOCS

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 59 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b524bcaa36d0e6bd719d96a27f9277e9.exe
    "C:\Users\Admin\AppData\Local\Temp\b524bcaa36d0e6bd719d96a27f9277e9.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\\delmeexe.bat
      2⤵
      • Deletes itself
      PID:2992
  • C:\Windows\SysWOW64\winxp.exe
    C:\Windows\SysWOW64\winxp.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" about:blank
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
        3⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\System32\ie4uinit.exe
          "C:\Windows\System32\ie4uinit.exe" -ShowQLIcon
          4⤵
          • Drops file in System32 directory
          PID:2228
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:2
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:392
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275469 /prefetch:2
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:820
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:537610 /prefetch:2
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:3020
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:603174 /prefetch:2
          4⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" about:blank
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
        3⤵
          PID:1556
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" about:blank
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
          3⤵
            PID:2516
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" about:blank
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Program Files\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
            3⤵
              PID:2888
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" about:blank
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2176
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
              3⤵
                PID:552

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\delmeexe.bat

            Filesize

            217B

            MD5

            f8c0907f6b5d738088f7c4288de5d410

            SHA1

            efe1b2ab9caf3af5fd3a899465822b2b173f07d6

            SHA256

            86b7a62f328e3741ddd8284ea812b589a0abc1bc8096a27c894c24f4f7b0835f

            SHA512

            27ab33ad5705476fbb73a6da03888082d293ee7bb6b2f88cb2421617331aec350a930df60c09aafd05b935c2a746d80651eabd8def5997b8ebe4c094edfb3929

          • C:\Windows\SysWOW64\winxp.exe

            Filesize

            403KB

            MD5

            b524bcaa36d0e6bd719d96a27f9277e9

            SHA1

            3215d49449e2e044d1c6ced7c755b95f6115d864

            SHA256

            cff4ec8251196642821acb071b7d68bc93c05af9261d206a58c379ab922fd4ab

            SHA512

            b07e102ab181a2b2c2f7f44645886097f17512b7e593e371552976b52e39dc998c4e66c1ad80076e558207e19b56811a4cc17777ea4ef005017987d4d2351799

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            914B

            MD5

            e4a68ac854ac5242460afd72481b2a44

            SHA1

            df3c24f9bfd666761b268073fe06d1cc8d4f82a4

            SHA256

            cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

            SHA512

            5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            67KB

            MD5

            753df6889fd7410a2e9fe333da83a429

            SHA1

            3c425f16e8267186061dd48ac1c77c122962456e

            SHA256

            b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

            SHA512

            9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            1KB

            MD5

            a266bb7dcc38a562631361bbf61dd11b

            SHA1

            3b1efd3a66ea28b16697394703a72ca340a05bd5

            SHA256

            df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

            SHA512

            0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

            Filesize

            252B

            MD5

            c1cb6359c6492f2c27f62a349b2f5d28

            SHA1

            5e230e2f6d60d4a46a159928d8355922fe7efd1e

            SHA256

            8d399854b407a36acaadf31bbaad8a489dedbd117ab345bda23244b1bd394cfa

            SHA512

            d785eab846b2ff835c2d448c87091fbcea40c8f480c2aa024674ba9edd9f5ce70b4c5bc88a56aca8e8b90daa37dc4777d38a6e08137e386a4d6d74622b922639

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            6693d06f40f167f91146fdc586553cdf

            SHA1

            014bd99fc52930516389f1ff11168ff9505e0dc2

            SHA256

            e8f2a64dd3b09e65235beffa253ff7238dc4c10b5126a01e88c88e2060106ab8

            SHA512

            21b2e82bc834afc4997a1294870ebb3cb005479ffc76b4c3c0d5759d7fe8d3cad044ed6866fd40d331aa3c148b3c91275862dfe683e8df5eaf70e357e246957a

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            6bacb26ea43a7982b5e44ee6d12505da

            SHA1

            d939c9ce520988496446d6efac5f689e5c8e5300

            SHA256

            d1a24e548218e460b6be35ed6a2a651f8d624cf76717166c661d60a8febf3b8b

            SHA512

            5e7f19e8fd316a48a7592830ca92f5728e9284305ffcccfcf68429200cf587fd6890b0236798debf7d6ac4ba82db4f4bb7674ca21a5c68f9ae45978d3f577d77

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            b823a6bf42dcf3e48688808b9ab6329c

            SHA1

            bfa9928aa931db6b92c270ee0722c15ce989957f

            SHA256

            29ef34be395c0cbacab144ebb432205b1f9f5cbee69e6e71355cc9ea41207623

            SHA512

            0c0b03c3bef4469cc1095042728a2c7fda70ec094e709fc2830cd9d65938c23095d06017705b942919881d72af1a6de0378e52fc2da6fe64f47dcfad62f1062f

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            8bd49d941bdf716f08b46a951833512b

            SHA1

            413def1a10e74c443e2a7fafd712fafff67a4d3b

            SHA256

            0225006185ff93761ace6a84093ba131ff8d0bd17cf1ef58dd3ce57f99ff80fe

            SHA512

            17d5d0f461a4e02d059dda0705de6ec11c9e683fe42f26f4c280ebed15cbe155cb2c1696b17df0c9bce37a1c2021e4b1835d2ea8fb5422936b80a7870b6057e9

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            274bef99abe956fe5ed7bbe6ff6ce04a

            SHA1

            aea1faf0fb15956207b026f89960deb466aab948

            SHA256

            31b6b9632853e7c1e2412a175e8668cf32499547a5ff04c1f8237a0f4963d99b

            SHA512

            c41227317d1925ef6aecbe39ec7d86a7716fee8dcc1f35f5f287fcb1c7c81a196db591a06bb00b92388ad4d92f617cb419440bbdc0b0967814f6f505949dffa0

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            26bc389abebbf76636ec847125c0d427

            SHA1

            a4c45c8cf2543ed955bd4a8b20031817d1decdd3

            SHA256

            a71c23e85b3f2a0ec873cfbcc19605439dc1a21b65a2d6ec996bf1b56247117a

            SHA512

            b4cca4f89f60fdaff6219ef63c73830f4b7de51f8e75cf9afcceab15aafcf9a15ab86839dc74720d90d82b547cd822791b400b3a5ea088322c5a6b7438b36501

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            d82fd31a14ff36e350a6d86aef937cf2

            SHA1

            3f4266ddf632193618b34192de18ed842d737d51

            SHA256

            7dcd7204988bda244306d448cc89e992dbd4ebc7ba8ee80fbf0b884c6598e21a

            SHA512

            d3309beeb2b97439ced80bce954d024a89911e8beaa178562697b7ed4a4d5b51aa469af12135fac92533d846fda00aa57a7848455d9ae8b15b74d67e62fb4738

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            0356a6b5767f22f4f979577b654692e7

            SHA1

            1f7d9a155a367d061036357975523ff1bb72d618

            SHA256

            8c681cbe7606c669dc30f7b16ba0ab571182a95f39e1ce66e36702483b4b1fbd

            SHA512

            395684f6121cd27981177cf5b6e18971dc794644fabfce29293dbc80552378d3aafcf5091174e778937f0caf9e56d67fe5f1ef96812633873faadc4d7e325095

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            9a9b958465dab64c7ded5b78510a060d

            SHA1

            aaf93920a4bbc3cfe6bfba317dda6b1930aef848

            SHA256

            0ffa09bedc7b4df8fd132d310098f4ceb1814d28a90abf6d6a695ae06b84b4dc

            SHA512

            e6668f9f315ad0067de28f774f810a475e2abeb976e68e0225cde23ce7cb7b4c2f335d8cf07d2e7b76abb4e3cb3ecab1db02d87284c7935e561e56008f2fd754

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            538e293d555fac8cf5dc9dbdc8a77630

            SHA1

            9b0127a486a035f0f5070f41140273d40a123053

            SHA256

            721c6e6478c9ec0d1f8e4d62f516bd0ed0715851736a25f99f1e5c08f9fb414e

            SHA512

            ac752b80b50a378f81922122f66d33e3e0f50fb5fa9526aaa6d9fb4e12549ed53c17e5176d1a80107c9d7c059dfdd6d7ae13106c2e5f7ed34d008f63736c4049

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            304B

            MD5

            16b74e789bb0aa01cbd4f584300fba66

            SHA1

            0682daeadec2ab46833b5284a8fbb0caaacf5076

            SHA256

            69ce21eaebf4fee3fff70eb0094fa8f67a03f72c33161363c83ca11e17d5cfea

            SHA512

            1a62694b3366ccd7e55db7ecbfc14d0b280224d440d23dfe45e5280f9880f792a2df9a8c74116edf64ee077c6c5b2418cb8f5358c44ae05182b5356a340a87dc

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

            Filesize

            242B

            MD5

            e9b27e501b21a0f8cfbcd2f0c654a08b

            SHA1

            25263816c449f65b46e5c6873c40685eb747466b

            SHA256

            3f8e1a85c5136d5d09c2c01069a6641ad21cdf2b254bab24284b824e12ebcf4b

            SHA512

            c122beda75331e1bd9bb824eee152730faa5385f55b7ed222d9382dc294ebe528a0b5310c3b05aff58b62d787127da94823a68d43037d7e5e2de5d2540ebe1f1

          • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico

            Filesize

            4KB

            MD5

            da597791be3b6e732f0bc8b20e38ee62

            SHA1

            1125c45d285c360542027d7554a5c442288974de

            SHA256

            5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

            SHA512

            d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

          • C:\Windows\System32\config\systemprofile\Favorites\Links\Suggested Sites.url

            Filesize

            129B

            MD5

            2578ef0db08f1e1e7578068186a1be0f

            SHA1

            87dca2f554fa51a98726f0a7a9ac0120be0c4572

            SHA256

            bdc63d9fd191114227a6e0ac32aaf4de85b91fc602fcb8555c0f3816ac8620b3

            SHA512

            b42be0e6f438362d107f0f3a7e4809753cf3491ab15145f9ffa4def413606243f4dfffc0449687bd1bb01c653e9339e26b97c286382743d14a2f0ed52e72f7ee

          • C:\Windows\System32\config\systemprofile\Favorites\Links\Suggested Sites.url

            Filesize

            236B

            MD5

            11cede0563d1d61930e433cd638d6419

            SHA1

            366b26547292482b871404b33930cefca8810dbd

            SHA256

            e3ab045d746a0821cfb0c34aee9f98ce658caab2c99841464c68d49ab2cd85d9

            SHA512

            d9a4cdd3d3970d1f3812f7b5d21bb9ae1f1347d0ddfe079a1b5ef15ec1367778056b64b865b21dd52692134771655461760db75309c78dc6f372cc4d0ab7c752

          • C:\Windows\System32\config\systemprofile\Favorites\Links\desktop.ini

            Filesize

            80B

            MD5

            3c106f431417240da12fd827323b7724

            SHA1

            2345cc77576f666b812b55ea7420b8d2c4d2a0b5

            SHA256

            e469ed17b4b54595b335dc51817a52b81fcf13aad7b7b994626f84ec097c5d57

            SHA512

            c7391b6b9c4e00494910303e8a6c4dca5a5fc0c461047ef95e3be1c8764928af344a29e2e7c92819174894b51ae0e69b5e11a9dc7cb093f984553d34d5e737bb

          • C:\Windows\System32\config\systemprofile\Favorites\desktop.ini

            Filesize

            402B

            MD5

            881dfac93652edb0a8228029ba92d0f5

            SHA1

            5b317253a63fecb167bf07befa05c5ed09c4ccea

            SHA256

            a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464

            SHA512

            592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810

          • C:\Windows\Temp\CabB3CA.tmp

            Filesize

            29KB

            MD5

            d59a6b36c5a94916241a3ead50222b6f

            SHA1

            e274e9486d318c383bc4b9812844ba56f0cff3c6

            SHA256

            a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

            SHA512

            17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

          • C:\Windows\Temp\TarB670.tmp

            Filesize

            175KB

            MD5

            dd73cead4b93366cf3465c8cd32e2796

            SHA1

            74546226dfe9ceb8184651e920d1dbfb432b314e

            SHA256

            a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

            SHA512

            ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

          • C:\Windows\Temp\wwwA6F9.tmp

            Filesize

            195B

            MD5

            a1fd5255ed62e10721ac426cd139aa83

            SHA1

            98a11bdd942bb66e9c829ae0685239212e966b9e

            SHA256

            d3b6eea852bacee54fbf4f3d77c6ec6d198bd59258968528a0231589f01b32f4

            SHA512

            51399b4eac1883f0e52279f6b9943d5a626de378105cadff2b3c17473edf0835d67437ae8e8d0e25e5d4b88f924fa3ac74d808123ec2b7f98eff1b248a1ab370

          • C:\Windows\Temp\wwwA70A.tmp

            Filesize

            216B

            MD5

            2ce792bc1394673282b741a25d6148a2

            SHA1

            5835c389ea0f0c1423fa26f98b84a875a11d19b1

            SHA256

            992031e95ad1e0f4305479e8d132c1ff14ed0eb913da33f23c576cd89f14fa48

            SHA512

            cdcc4d9967570018ec7dc3d825ff96b4817fecfbd424d30b74ba9ab6cc16cb035434f680b3d035f7959ceb0cc9e3c56f8dc78b06adb1dd2289930cc9acc87749

          • memory/684-742-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/684-937-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/684-1388-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/684-1546-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/2732-26-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-59-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-57-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-56-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-55-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-54-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-53-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-52-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-51-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-50-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-49-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-48-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-47-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-46-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-45-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-44-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-43-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-42-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-41-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-40-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-39-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-38-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-37-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-36-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-35-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-34-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-33-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-32-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-31-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-30-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-29-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-28-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-27-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-58-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-60-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-113-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/2732-61-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-62-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-63-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-64-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-65-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-2-0x0000000000400000-0x00000000004A9000-memory.dmp

            Filesize

            676KB

          • memory/2732-25-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-22-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-23-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-24-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-21-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-20-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-19-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-16-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-17-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-18-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-15-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-13-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-14-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-12-0x00000000031C0000-0x00000000032C0000-memory.dmp

            Filesize

            1024KB

          • memory/2732-11-0x00000000003F0000-0x00000000003F1000-memory.dmp

            Filesize

            4KB

          • memory/2732-10-0x0000000000510000-0x0000000000511000-memory.dmp

            Filesize

            4KB

          • memory/2732-9-0x00000000004E0000-0x00000000004E1000-memory.dmp

            Filesize

            4KB

          • memory/2732-8-0x00000000004F0000-0x00000000004F1000-memory.dmp

            Filesize

            4KB

          • memory/2732-7-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/2732-4-0x00000000004B0000-0x00000000004B1000-memory.dmp

            Filesize

            4KB

          • memory/2732-5-0x0000000000500000-0x0000000000501000-memory.dmp

            Filesize

            4KB

          • memory/2732-6-0x00000000003E0000-0x00000000003E1000-memory.dmp

            Filesize

            4KB

          • memory/2732-3-0x0000000000310000-0x0000000000364000-memory.dmp

            Filesize

            336KB