Analysis

  • max time kernel
    57s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 10:39

General

  • Target

    Electron.html

  • Size

    14KB

  • MD5

    0dcf64dc0f873b1d5cb1976800bc4f45

  • SHA1

    b254cf4c964db79806a9315684ce81eeb1341f7c

  • SHA256

    10ab7cb1f689ec859be78ee02b4314b3300e490d566ee7e3ca2148dd68b56690

  • SHA512

    62ef61a544c4b208ff1bfb8dcf007376f37a064482c77afd2c515719787ba416ad903bf9d06afea8b514d8f0581beda340cc4499fafaf29f9bc8c9bfd26d97a9

  • SSDEEP

    384:ve9TilUdvC+QUeUIOUeUmSEi/Li01UOUTVxWApJWDWigqWia03StSimSiYSiZ7AH:vwTilUlC9fvOflS5/u01/8xWApJingq/

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Electron.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:472083 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2168
  • C:\Users\Admin\Downloads\Electron\Electron\Electron.exe
    "C:\Users\Admin\Downloads\Electron\Electron\Electron.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 2724
      2⤵
      • Program crash
      PID:2076
  • C:\Users\Admin\Downloads\Electron\Electron\Electron.exe
    "C:\Users\Admin\Downloads\Electron\Electron\Electron.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 560 -s 2724
      2⤵
      • Program crash
      PID:1608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

          Filesize

          717B

          MD5

          822467b728b7a66b081c91795373789a

          SHA1

          d8f2f02e1eef62485a9feffd59ce837511749865

          SHA256

          af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

          SHA512

          bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61

          Filesize

          299B

          MD5

          5ae8478af8dd6eec7ad4edf162dd3df1

          SHA1

          55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

          SHA256

          fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

          SHA512

          a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          67KB

          MD5

          753df6889fd7410a2e9fe333da83a429

          SHA1

          3c425f16e8267186061dd48ac1c77c122962456e

          SHA256

          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

          SHA512

          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

          Filesize

          192B

          MD5

          f477e278dbc8060dc32e810ae7e327dc

          SHA1

          b613ba0eb90cac0074ede74ca6eaf0e3ab3b71c3

          SHA256

          61b41bac7ea06b415e0138afecee8074662550e7f7b61d13b7467565d8683162

          SHA512

          92a5a07bd2b9384d24205e0e82fc1d0cbd383d48fdc96cfe2bbd537244ba800f349b045bfba11f0c6e76b1a4be422742ea60e8599f56a14125c38d310cb811c6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61

          Filesize

          192B

          MD5

          bce95b404803c9ce8946008596aa7c1c

          SHA1

          655129aed517c0b340e3ff6379a52ee392bc32e6

          SHA256

          587743c11b10e7f83268db63c86be76ee22c4617aae16f6c5fd147e25add3214

          SHA512

          b6d6bccede25c1f65cadcb988fa4e9b01b81bb1d76af5e14a9ef6f908b56cfbb03a72b73dcd18d176c4fc52dce1e8ca2c1db6f67722338252c45b69581a40f1d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          070697767a9ffefb298d9af18a5f899a

          SHA1

          a57b391f3a1cf33fbdfdf1eaf3d5f0404771d163

          SHA256

          7eb434f3b0ba46da5a47f96eede7cca88eda4505f3c09d5fd902e329b92c7390

          SHA512

          7e7ae2068137c95ef9e35bba811f7e47c32627cd4396a0f4b4c3157f09cfb5614c1b72459a71c1cca2b37bece02adce01f8d49ba4fdea66bd5b949e4e35fb7db

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ef5c7c56ff1320a4117744f98cbd21b7

          SHA1

          0996cfbe406945f40567f304e30d86e1fa3a861e

          SHA256

          55746fd302b9c4cb85bf210344467ec5ab332acb4deee3ada76058360f9ee753

          SHA512

          f89ba86a82079932bfe5bca7653c474ac17e5ea802113c6488bd96829f508e82653ffe22ac8e1ef1a247982396d6484ba7267ed331dd897e96cfb8b62a8c0cce

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0380841116f6c2eb93b9d34cc7f67067

          SHA1

          c432090b88f938d5033503f305b711cde05d637e

          SHA256

          4d7c1b0d5fdcf301ad6af82f870c5879f6a19a470c0d3cdfc85edd5a4d3704b8

          SHA512

          412ff891ef2f4716d81cf82d623f9c86103f5297e31bd4bd5925c7293dd3b8ac4597dba3e3bdcde8e3e52279de0477a561355b9f510b6fd21c3fdf994cfef375

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          22ac2ad86f396c8b2f6a6661d231e0cc

          SHA1

          8aa03e161c67c7b102a16bac5487c381ea5b20e9

          SHA256

          3daa142c174c22b074cebd3109a48b96b2133122c7658790985b8d527bcff88c

          SHA512

          9a7f4a6cf7494eee92522330c54ca9c379ef9cec8ff535d28880a02e4efcb0f78a71009b28adebfcb3f2e3ba743aa3a49f1ce8ff1845bb4ef47fc09fe35f051f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f4937e0ea602a2bbfe58162f7c97c3e1

          SHA1

          067c18960dc2f8541376beffd4d5bbf7bc25853e

          SHA256

          7975b17aaf30fb865229476d9b2648d90a4e44f96108c1dc98d27621a1c2404c

          SHA512

          eb80abf92f2fde3d171c610200a6296a116dbbf97b6c5ce0fce2f8fd8ac6a8626131c1eb6bbc99a7012ba85a3e1e3a4861b7802a995b0be9591812c5eb0306ef

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7dc32cd60130c80ffccee539ca758e05

          SHA1

          5c76aea9726ece51f772a5f2d25c7c627d58fce2

          SHA256

          9da43e2b91864b015416b3097441a10b5ea09d86d91bd7bfd1338e6f9c508c28

          SHA512

          8a9660864aa7e44f1e17cceb13ca797b14fa316cd7e5df6d90b85a1125746746520abf38a5b91f86c5c2fb5e9a3ea4be41fc259782a2d18d116f9e17f31f92e7

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          959991a130036007be5e98940d603452

          SHA1

          73f3b06da20011b1717052a88bee4c8d3fc7882c

          SHA256

          fbb98ae473b43ad328eec725166e955b262428b534837b10ff51756aba57ab26

          SHA512

          00a1430ebd87a40c3d073b7c2437dda0ab05a549e296c54c22cd698c208c3ad4c08ca3467c3b0c539b483b48f43db3fe3bb6c2e0bc1b3056c08003c43d3ceed9

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ebc9f4238b843c72bc358c3975459627

          SHA1

          4bc40904c5e7d5182eb76f3ad9b0f36793e474c5

          SHA256

          c04cb5708ecc279fb734ba94510392914ba9d188be9a336560d372cee247cedc

          SHA512

          499c9479c9376c97b140428e6462a2a8f42eab5826c0fce8d68742f3559d801b697ce55af90fc7d5a92dfa258fcbebaca07e39dd485ca7604176dfdcd00093da

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OOWQLMJV\f[1].txt

          Filesize

          175KB

          MD5

          2e12c9b58e13db34155c0deb83a34e97

          SHA1

          9f505ea7d7400a9051889532827afc6fce8bc80e

          SHA256

          ad163d17926a00b152b0d6116f357f8649e6a39faa56fe24069f51b1155e4c00

          SHA512

          d0a8b7ecff55a7849a5095e39128acf8c05ea258c4a073c089f0ee75d48e1e97d44a7689ae6d4ade5e6dea7bf8169b661337cfcee303be947182bc827f62d788

        • C:\Users\Admin\AppData\Local\Temp\Cab1048.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar10A9.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • C:\Users\Admin\AppData\Local\Temp\Tar110C.tmp

          Filesize

          175KB

          MD5

          dd73cead4b93366cf3465c8cd32e2796

          SHA1

          74546226dfe9ceb8184651e920d1dbfb432b314e

          SHA256

          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

          SHA512

          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

        • C:\Users\Admin\AppData\Local\Temp\~DF7B3C4A1AFF99A7A5.TMP

          Filesize

          16KB

          MD5

          01b06ceb837109849251d07ff0bb7f55

          SHA1

          1afec9b7acebdd3994e06a2744ab81db477709fd

          SHA256

          cd55686d99a87b961abb9f7d4a51eb94e5d72b9635209b022ab610d305c2a865

          SHA512

          89d59adc83fcd975e81b92eb329e44a13561e7106e3be36c7afa7c1701b355bb70ebaf921ea39bf378bb57059dae90d5401d099af810834541e9588c8f74ae8b

        • C:\Users\Admin\Downloads\Electron.zip.p5ym7v4.partial

          Filesize

          3.8MB

          MD5

          c7bb96092112ddfe949ca9cd39e5d7d2

          SHA1

          1badf937c2c29f631ae036508e945dd61c84ccb3

          SHA256

          f283c5361a9de52e07bd7260fc76a9768cb4ebc71fa247e0c313d064a7fcaa7a

          SHA512

          c7a69a7c12d361ae9ca1586559ddc401fee95e5386c5a51e3271789486e41bf08680e91dca584830d6342cc0ba344fc13aff663b75e7d9e7d9d4f25ad912c7ad

        • C:\Users\Admin\Downloads\Electron\Electron\Microsoft.Web.WebView2.Wpf.dll

          Filesize

          42KB

          MD5

          240bd782a3480dee44dbb4632ddc7240

          SHA1

          590e339cdfd0c90ff57f2e05e2c7436d947d8c17

          SHA256

          034872ce8a62bd5d7bc1627058cb0b16435e895e398ea5ad0d6b0114b4eedffa

          SHA512

          03e74d8263b0e71af812338823f26efb2f45f99ac73011083d63c6c20ffec79b8575836564b09ecd4c0532565cdc0daee53bed40b7eb7cf47a685123e20d461b

        • C:\Users\Admin\Downloads\Electron\Electron\WebView2Loader.dll

          Filesize

          112KB

          MD5

          5b17da9adfc5a07fa499dded4fd52747

          SHA1

          d1c37478f1029930a03b6bc195c8ef7093ac49b1

          SHA256

          9d5918cec81470225be7478c7e092c24f248e8caa824d667fb57431cad94be71

          SHA512

          f50196d520d77b920c32a12e6c6de20a2dbdf84c88e2c66e086813017a2bda909caa1aabfb4545de4f2b8cd23f2dad1e10b1571abdc62524d44bcfb355ef5432

        • \Users\Admin\Downloads\Electron\Electron\Microsoft.Web.WebView2.Core.dll

          Filesize

          418KB

          MD5

          f342d254fdd33e76b2fd6a3f8b517de3

          SHA1

          79c91621ea96a6635e3934e9b46dcf23d1fc762e

          SHA256

          8ccde337ed97230a54e20db8608e3e74e6dbe3f4d153846a07484c2fa5ae596a

          SHA512

          618963615db38d9ead4855555e7ca7558b0f3c9cc425a950e3f3457d49a5b50645fc9718a0693398d07bc1d822067e9fd8289d45f889586884daf25aedeb6cba

        • memory/560-743-0x0000000000370000-0x000000000037A000-memory.dmp

          Filesize

          40KB

        • memory/560-729-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-740-0x0000000000370000-0x000000000037A000-memory.dmp

          Filesize

          40KB

        • memory/560-741-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-739-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-738-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-736-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-734-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-733-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-732-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-727-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/560-731-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-730-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/560-742-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-728-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/560-726-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-724-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-722-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-737-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-720-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/560-735-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/560-716-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-715-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-714-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-713-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/560-712-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/688-663-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-699-0x00000000054C0000-0x0000000005500000-memory.dmp

          Filesize

          256KB

        • memory/688-703-0x0000000005A20000-0x0000000005A8C000-memory.dmp

          Filesize

          432KB

        • memory/688-705-0x0000000004F80000-0x0000000004F90000-memory.dmp

          Filesize

          64KB

        • memory/688-706-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/688-707-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-709-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/688-710-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-711-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/688-698-0x0000000000690000-0x000000000069A000-memory.dmp

          Filesize

          40KB

        • memory/688-697-0x0000000000690000-0x000000000069A000-memory.dmp

          Filesize

          40KB

        • memory/688-696-0x0000000005360000-0x00000000054AA000-memory.dmp

          Filesize

          1.3MB

        • memory/688-695-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/688-694-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB

        • memory/688-693-0x00000000776C0000-0x00000000776C2000-memory.dmp

          Filesize

          8KB

        • memory/688-692-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-691-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-690-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-689-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-688-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-685-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-686-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/688-687-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-684-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-683-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-682-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/688-680-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-678-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-672-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-671-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-668-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-667-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-665-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-666-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-664-0x0000000076520000-0x0000000076567000-memory.dmp

          Filesize

          284KB

        • memory/688-662-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-661-0x0000000076F70000-0x0000000077080000-memory.dmp

          Filesize

          1.1MB

        • memory/688-660-0x0000000001140000-0x0000000001B4C000-memory.dmp

          Filesize

          10.0MB