Analysis

  • max time kernel
    23s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 02:40

General

  • Target

    89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe

  • Size

    1.7MB

  • MD5

    76306394646f5a2bc1b61ded001f1b26

  • SHA1

    781c36faafca1c6279cd60704a472d1503336408

  • SHA256

    89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff

  • SHA512

    6a234c69d1a6d18f2999350fb213dc29b7eca7987d76b99e78cc2c344159bcc52e28954c8ae44b7873af7b627292e9c33c9896c23d107847991064489e6c2dc6

  • SSDEEP

    24576:k5xolYQY6qObJ97J2xc20J7pBD0aej1zj1SqdAGFQZIxpK545UJoeKYd:nY4RGk7pBwVRzjYq+ZI2a5UJoeH

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

http://www.klkjwre9fqwieluoi.info/

http://kukutrustnet777888.info/

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies firewall policy service 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Sality

    Sality is backdoor written in C++, first discovered in 2003.

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 12 IoCs
  • Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 20 IoCs
  • UPX dump on OEP (original entry point) 24 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 19 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 7 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1268
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1348
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1380
          • C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe
            "C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe"
            2⤵
            • Modifies firewall policy service
            • UAC bypass
            • Windows security bypass
            • Loads dropped DLL
            • Windows security modification
            • Checks whether UAC is enabled
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:3060
            • \??\c:\users\admin\appdata\local\temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 
              c:\users\admin\appdata\local\temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Modifies system certificate store
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2580
              • C:\Users\Admin\appdata\local\temp\360TS_Setup.exe
                "C:\Users\Admin\appdata\local\temp\360TS_Setup.exe" /c:101 /pmode:2
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:2664
                • C:\Program Files (x86)\1716345634_0\360TS_Setup.exe
                  "C:\Program Files (x86)\1716345634_0\360TS_Setup.exe" /c:101 /pmode:2 /TSinstall
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Writes to the Master Boot Record (MBR)
                  PID:2600
            • C:\Users\Admin\AppData\Local\icsys.icn.exe
              C:\Users\Admin\AppData\Local\icsys.icn.exe
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2668
              • \??\c:\windows\system\explorer.exe
                c:\windows\system\explorer.exe
                4⤵
                • Modifies WinLogon for persistence
                • Modifies firewall policy service
                • Modifies visiblity of hidden/system files in Explorer
                • UAC bypass
                • Windows security bypass
                • Modifies Installed Components in the registry
                • Deletes itself
                • Executes dropped EXE
                • Loads dropped DLL
                • Windows security modification
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Enumerates connected drives
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                • System policy modification
                PID:2800
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Windows directory
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2008
                  • \??\c:\windows\system\svchost.exe
                    c:\windows\system\svchost.exe
                    6⤵
                    • Modifies WinLogon for persistence
                    • Modifies visiblity of hidden/system files in Explorer
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Drops file in Windows directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2040
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe PR
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2780
                    • C:\Windows\SysWOW64\at.exe
                      at 02:42 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                      7⤵
                        PID:560
                      • C:\Windows\SysWOW64\at.exe
                        at 02:43 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
                        7⤵
                          PID:2540
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
                PID:1460

              Network

              MITRE ATT&CK Matrix ATT&CK v13

              Persistence

              Boot or Logon Autostart Execution

              3
              T1547

              Registry Run Keys / Startup Folder

              2
              T1547.001

              Winlogon Helper DLL

              1
              T1547.004

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Pre-OS Boot

              1
              T1542

              Bootkit

              1
              T1542.003

              Privilege Escalation

              Boot or Logon Autostart Execution

              3
              T1547

              Registry Run Keys / Startup Folder

              2
              T1547.001

              Winlogon Helper DLL

              1
              T1547.004

              Create or Modify System Process

              1
              T1543

              Windows Service

              1
              T1543.003

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Defense Evasion

              Modify Registry

              10
              T1112

              Hide Artifacts

              1
              T1564

              Hidden Files and Directories

              1
              T1564.001

              Abuse Elevation Control Mechanism

              1
              T1548

              Bypass User Account Control

              1
              T1548.002

              Impair Defenses

              3
              T1562

              Disable or Modify Tools

              3
              T1562.001

              Pre-OS Boot

              1
              T1542

              Bootkit

              1
              T1542.003

              Subvert Trust Controls

              1
              T1553

              Install Root Certificate

              1
              T1553.004

              Discovery

              Query Registry

              2
              T1012

              System Information Discovery

              4
              T1082

              Peripheral Device Discovery

              1
              T1120

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
                Filesize

                2KB

                MD5

                1644fc022c50640be4434b7afdfc6949

                SHA1

                b66cf51b7a7cfd457b78aae87c9321a08ba7812d

                SHA256

                1728883bbe836ae1f5f4ae3e644353d519a4b60a0bc2b21798cb1163c851ad9a

                SHA512

                6a084caeb72ef3793551bf57420f589b83e3360ec8cf6a22decc857f0d42193d2359b0957a516de0a5ce6c28490e1d72d74e9bede5e06389e310f39df1fbf80f

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
                Filesize

                68KB

                MD5

                29f65ba8e88c063813cc50a4ea544e93

                SHA1

                05a7040d5c127e68c25d81cc51271ffb8bef3568

                SHA256

                1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

                SHA512

                e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                Filesize

                1KB

                MD5

                d8e0e108bd3225ee4823e2501a9c59b8

                SHA1

                90ee76ccb7a8c1cee70959c25f1cfffcb399aaeb

                SHA256

                482fed17ea597c86abe64224786bd51836c64071c1047ca970c09ae96185c1cf

                SHA512

                d7bd3501cf8a9a5d1f8cc34c5bd88af6228f40c97bb48f58cdfdded4775769d215c8029fb9fad8cfb27628e2550092c1bd82574f1218540c4288da141d581d48

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
                Filesize

                1KB

                MD5

                a266bb7dcc38a562631361bbf61dd11b

                SHA1

                3b1efd3a66ea28b16697394703a72ca340a05bd5

                SHA256

                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                SHA512

                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
                Filesize

                488B

                MD5

                d06ca1de376d9b5760f452af5b3aaae2

                SHA1

                0436b5fcb46b0235041993b2fceb881439480326

                SHA256

                f3b05f30edf05a9292e2c6b7513cf57744c38504df04e62928f89ceb7a2450f7

                SHA512

                2827c443e0e7c548ebc867b8b54d556b075d6ddc0946acb7ece9c81cb37d4d6558dc84579fcf66b7f36044f07aca5cce7667854bc9506820d064c3e72dca3f89

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                Filesize

                344B

                MD5

                ec961a426b2be7a5e6cbdca16fbde362

                SHA1

                115f843235834f27fa7d4762607bc9f04e9afb85

                SHA256

                6edeec87b86cd9296a88991a23c1d45f25349c574c3d1e0a3e3d04bb9d57a459

                SHA512

                514a2e30db640705eae6bfac5a10fe0b1603e31c26712f9c0beee024548b0e035e2558c2863ef064fc3febe70be725f3044c15d6600a5c879c8f871c016b255e

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                Filesize

                482B

                MD5

                e713c60d6e1a04bcf4c4b9e16fe9045a

                SHA1

                44a30a99727a552b2293dd27ac66479f25c97ed7

                SHA256

                7b2028e9c6f02a452323f6c73dc6fdeb103e11cea35703c2df6ea50929403477

                SHA512

                cc2b94248f1fb221dd15f770dba967dda22416935848845ef5d9d09ce432251e2febf6047380f4f04e14cffa9b16fd6fef679c33e37e0203ae9c1fa6a6312bf7

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
                Filesize

                242B

                MD5

                f4d1030e59ab3e8213e149de4a4f330f

                SHA1

                84e4e0cb3d14879a54d1340143bda70ec31c2d85

                SHA256

                3bfc9ed76807c11cb6bec91f5b1ee39fb0fd0c33134352d1c89ab29f96688173

                SHA512

                860f78c2dd8f3a384699b5bba0c2d5ac6d46f3abb5559ad6a5104356b1381fe4ff33509ac6736d852c2d6aae12ce1912cd37b558c7bf0c62f07a360c5be93e24

              • C:\Users\Admin\AppData\Local\Temp\[email protected]
                Filesize

                656B

                MD5

                184a117024f3789681894c67b36ce990

                SHA1

                c5b687db3b27ef04ad2b2cbc9f4e523cb7f6ba7e

                SHA256

                b10d5fef165fc89e61cd16e02eac1b90b8f94ef95218bdd4b678cd0d5c8a925e

                SHA512

                354d3bbc1329cbbe30d22f0cf95564e44acc68d6fe91e2beb4584a473d320faf4c092de9db7f1f93cf0b235703fc8de913883985c7d5db6b596244771a1edaf7

              • C:\Users\Admin\AppData\Local\Temp\[email protected]\setup.ini
                Filesize

                830B

                MD5

                e6edb41c03bce3f822020878bde4e246

                SHA1

                03198ad7bbfbdd50dd66ab4bed13ad230b66e4d9

                SHA256

                9fa80f0889358d9db3d249a2e747e27b7c01c6123b784d94d169c0e54cacf454

                SHA512

                2d71b7d50212f980e82562af95598c430aa0875f7a9d9cc670ba2cb1f63057fb26fd747a99cb4ca08f2355d002daa79bda2236b3ad9e37a3cfef32ae5420e2a1

              • C:\Users\Admin\AppData\Local\Temp\89d8159f2b5c706c1ab897275d93455368b9bb5c496b94e9160ad29b6bfa5fff.exe 
                Filesize

                1.4MB

                MD5

                fa39b3b422dc4232ef24e3f27fa8d69e

                SHA1

                db04fa528bceb7284606997c660c74b8776892f7

                SHA256

                4966ffd1379486d8d16508579522df2d19a715aac1ba168cb14dd8310b8adaf6

                SHA512

                b60b661142653fc3007d1fc41fb25a8ab52290f7f4bc342974012fba7b53013f69f2e28dd761f9063675f48560c42eeae6523e336ed733e299f83a105a179e34

              • C:\Users\Admin\AppData\Local\Temp\Tar236E.tmp
                Filesize

                177KB

                MD5

                435a9ac180383f9fa094131b173a2f7b

                SHA1

                76944ea657a9db94f9a4bef38f88c46ed4166983

                SHA256

                67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

                SHA512

                1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

              • C:\Users\Admin\AppData\Local\Temp\{97330754-E027-4154-AE36-08737271D810}.tmp
                Filesize

                3KB

                MD5

                2fee0e7e5c0db9a7f984a58bda3be11e

                SHA1

                4647e1517cf69154de140f722ec7ef39965d7189

                SHA256

                4f2ad3f06aed602b6249c5d69b9558c546830116cc5f20d51eaff55937faf0ed

                SHA512

                7e9834e9e7b16aecd17f0aac331d7396cd6ade3c8ea71d73956c19777f68d9eebc8645348b9c9d81769c2b3a45e158084e4877f4547cf876e0b90cef9c1155e5

              • C:\Users\Admin\AppData\Roaming\mrsys.exe
                Filesize

                287KB

                MD5

                eb28b939fb236f5ce90471764f965a45

                SHA1

                f949800d83fdaaad0aa909c3a053dbf39cc9347a

                SHA256

                49c25eff72ac0bc61aa54e51edf33f8bcb637b9dacaaae76d0971b77e3ecadc5

                SHA512

                d4592576ff8461a271c97fd15e38c6a1b4a3be1381a1866572fd649f4b8af8bd170e3bda6d06a16aa20f2a8e743bdec7ad814a779de102e6ffc2434303060d05

              • C:\Windows\SYSTEM.INI
                Filesize

                257B

                MD5

                734ea6c4c025860c72b3b4078d1dcc32

                SHA1

                b0217181a3fd15dcaf066847d0dc97e3358f6018

                SHA256

                fff1ef50da80446dcacab5811ea58c3a280982dfc0f55ebcd43da8ea14db8b73

                SHA512

                75dd55e0d031c99111c23d8b9059c4f014145d0ff003cbd918c68fd69e1bbbca1ac8298c840bf8f68027fdf17fbb5a0b337fa0176fa1b05fb238cadfd247906e

              • C:\Windows\system\explorer.exe
                Filesize

                287KB

                MD5

                6bd3e32334736149c6bade625a179f8e

                SHA1

                183d56d9f589094b3c5a0e18d3f7e2dd7f82c012

                SHA256

                35f931d5b12ee9784af48002c4e0ade8430eb1939fadad3114ca2c29f9b24101

                SHA512

                c090d6856ca440e003652bbdb14d72d81b8d48ec3fccab2eb013bdd9ab88b8afa676fd03d76940dc105b5af559faddd24920b15aac65014307a0c4d8f2c7f098

              • C:\Windows\system\spoolsv.exe
                Filesize

                287KB

                MD5

                fc71c455e231a1ff92a5a272aa621d32

                SHA1

                d1bf04dccacef72ce8f9ddfd802c75033e738740

                SHA256

                ddbf14ca1c5ec6523c459039d3cedd6c6049b3c651ec335f79278cf78434c501

                SHA512

                f7fd3bce006a16958214ead142ffd0248800fef89afb48ad7bc261a38de026124202bf655509d0706508df09c956b98fc5f566602db968f43757e9630223ae1b

              • C:\asjdb.pif
                Filesize

                100KB

                MD5

                5ace2404e61e29962d7e009463e80529

                SHA1

                22959d318fcd9882a76b4885c8edc0a639130bab

                SHA256

                c2f9973bb4e35de64b32564228449713ea3a259db21114c4727f00d9d3c660d4

                SHA512

                95d82c9ec847d7ba90568417eb48e9a20529fadbd42cd599d581c6facd719f2e420523b35f287c54f546b79cf86c7f4823c4b60b05728efa035e89421b36bfaa

              • \Users\Admin\AppData\Local\Temp\1716345634_00000000_base\360base.dll
                Filesize

                1.0MB

                MD5

                b192f34d99421dc3207f2328ffe62bd0

                SHA1

                e4bbbba20d05515678922371ea787b39f064cd2c

                SHA256

                58f13d919f44d194827b609b6b267246abc47134bb202472c0dfe033b9d7ed73

                SHA512

                00d4c7a0a0097eb4b31a71a0eaf6ff0d44619f77a335c75688565e34e6d7f4fb6c258917457d560c6b0a5077603845ce012e01d9862e87fb5327d7f8da970f95

              • \Users\Admin\AppData\Local\Temp\{E56AA509-D042-4de1-B7DB-30F029F369A4}.tmp\360P2SP.dll
                Filesize

                824KB

                MD5

                fc1796add9491ee757e74e65cedd6ae7

                SHA1

                603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

                SHA256

                bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

                SHA512

                8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

              • \Users\Admin\AppData\Local\icsys.icn.exe
                Filesize

                287KB

                MD5

                0655b67e940ee126cb08c1420b3c25f1

                SHA1

                c902b5cbbe052b69b6f2c291846021e537f22d77

                SHA256

                25c49ee82561993047f1ebf0a1f5cac9eabd8402ff6a087aa983e4a88dd4ade2

                SHA512

                6e63d036fddffee1b59e19267349404ad210bbb607739f3ac139930e0e077573e921a14507feaf377ad0326d01e38f92ea4db0d5108f527b14ff9185b1f92fa1

              • \Windows\system\svchost.exe
                Filesize

                287KB

                MD5

                b609a85a5e17542b75c564c2ea80d448

                SHA1

                b7220e52f9b0da1ff7b51317fe5c2e659e2fd851

                SHA256

                348a99b2dbe32e7abe1d5a7d9515c09dd95e1a1c9fd0855784714706b654d6cc

                SHA512

                2cef72229058b4e5c3f25303481a83a2ff6184edc8b1cf20083f3d963a54d35d0500e14c58c2806f4816a0608ee88db6d2e799c5202530e1c9f044815f28b7db

              • memory/1268-14-0x00000000001A0000-0x00000000001A2000-memory.dmp
                Filesize

                8KB

              • memory/2008-120-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2008-87-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2040-106-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2040-112-0x0000000002C30000-0x0000000002C71000-memory.dmp
                Filesize

                260KB

              • memory/2580-59-0x00000000029A0000-0x00000000029A1000-memory.dmp
                Filesize

                4KB

              • memory/2580-244-0x00000000029A0000-0x00000000029A1000-memory.dmp
                Filesize

                4KB

              • memory/2580-225-0x0000000003720000-0x0000000003721000-memory.dmp
                Filesize

                4KB

              • memory/2668-49-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2668-72-0x00000000032A0000-0x00000000032E1000-memory.dmp
                Filesize

                260KB

              • memory/2668-125-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2780-113-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2780-117-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/2800-206-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-207-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-202-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-211-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-205-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-231-0x0000000002E50000-0x0000000002E51000-memory.dmp
                Filesize

                4KB

              • memory/2800-204-0x0000000003450000-0x00000000044DE000-memory.dmp
                Filesize

                16.6MB

              • memory/2800-73-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/3060-7-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-12-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-13-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-50-0x0000000005400000-0x0000000005441000-memory.dmp
                Filesize

                260KB

              • memory/3060-91-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-132-0x0000000000330000-0x0000000000332000-memory.dmp
                Filesize

                8KB

              • memory/3060-139-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/3060-0-0x0000000000400000-0x0000000000441000-memory.dmp
                Filesize

                260KB

              • memory/3060-95-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-126-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-11-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-48-0x0000000005400000-0x0000000005441000-memory.dmp
                Filesize

                260KB

              • memory/3060-23-0x0000000000330000-0x0000000000332000-memory.dmp
                Filesize

                8KB

              • memory/3060-24-0x0000000000340000-0x0000000000341000-memory.dmp
                Filesize

                4KB

              • memory/3060-26-0x0000000000340000-0x0000000000341000-memory.dmp
                Filesize

                4KB

              • memory/3060-6-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-27-0x0000000000330000-0x0000000000332000-memory.dmp
                Filesize

                8KB

              • memory/3060-28-0x0000000000330000-0x0000000000332000-memory.dmp
                Filesize

                8KB

              • memory/3060-8-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-10-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-5-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-9-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB

              • memory/3060-102-0x00000000025D0000-0x000000000365E000-memory.dmp
                Filesize

                16.6MB