Resubmissions

29/07/2024, 01:17

240729-bnjljszdlc 9

Analysis

  • max time kernel
    87s
  • max time network
    133s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/07/2024, 01:17

General

  • Target

    mping_3.exe

  • Size

    6.8MB

  • MD5

    6bb0e7ab216ce0bfc7e50281845e819a

  • SHA1

    171f20d07a5aa2e0e55b9e0a05a39cf935a33410

  • SHA256

    4889bfd701e275aae36ff9005b4e94fa1e9e6edbc263fa7c8a50040e1d78ca83

  • SHA512

    0a122ffb342197d30a063995687aa32edb3da6abd8dbc1736861a47aafce651ef5fe64bff0c1c34f6abc0ab80e3e6826d293d66c6e0fafb6a5d11040bfe7df9f

  • SSDEEP

    196608:oXPxoWDeuKoJMC0loFRLQwhH6OJxxXK7/hw+:qJo2tOliQwhH1JxxXK7/hz

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 18 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 25 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\mping_3.exe
    "C:\Users\Admin\AppData\Local\Temp\mping_3.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • System Network Configuration Discovery: Internet Connection Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:5016
    • C:\Program Files (x86)\MultiPing\MultiPing.exe
      "C:\Program Files (x86)\MultiPing\MultiPing.exe"
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:3364
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 8EC2C42CF3F1D2EA7F692864A87DD1DE C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1436
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4044
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 4860D0002080B70ABB2BE0C20013CD55
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:560
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B569791C793A58447ABE5913FDA9D532 E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3720
        • C:\Windows\SysWOW64\cmd.exe
          /C "C:\Users\Admin\AppData\Local\Temp\{77C1F481-162A-433E-8209-F72DA1E6ED29}.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4052
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3340
        • C:\Windows\SysWOW64\cmd.exe
          /C "C:\Users\Admin\AppData\Local\Temp\{77C1F481-162A-433E-8209-F72DA1E6ED29}.bat"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4780
      • C:\Program Files (x86)\MultiPing\MultiPing.exe
        "C:\Program Files (x86)\MultiPing\MultiPing.exe" /REGSERVER /QUIET
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4520
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e585c93.rbs

      Filesize

      2.5MB

      MD5

      8392914c3a55a60c1257d010a0af8013

      SHA1

      52c11749001d4d4bdceac34cdd003e1c3ff3f55a

      SHA256

      4732468f6cb5b17d7543d69b2116c0528e0cdec063daed902c1523be50dd798e

      SHA512

      7e935dc8eab8b9f13a7031455342da728e9bdfa4e874cde0b0754a8179d920644fe4bf5728396b831b16833f50e688f15d1960a9af088db692f7138ba2a5df06

    • C:\Config.Msi\e585c95.rbs

      Filesize

      563B

      MD5

      73bff737a18162ab97636723c5d98fdc

      SHA1

      f0be782491957c83112e16356e4eb14089c4cd17

      SHA256

      f0c29e551f9cae465d15a94d6892de8cd96ee75c3fd1f480f1ccd5709b6d284f

      SHA512

      b87d885154610f391db39d75e93f773adb5f7540dead08a9ecdd9c468ddaa58cbb7ff3d0741308f988c2fa01993c3210f0eb35eb08e8a97fba4524cf16c3cfe5

    • C:\Program Files (x86)\76741077.tmp

      Filesize

      40B

      MD5

      90dd92de77f3bf3075555dad68beebe1

      SHA1

      3f273ec790f19e1a972587391617e8a5ee1d1c59

      SHA256

      a2328338e3dd35784d30a4a7f7ad19d515bea4f373a8f6141b165ea48175d995

      SHA512

      b9f0a57ab7ad26f8a6fab5768ed1617fd5817adafabc685f2470a1a15e9a5a9570b9241efa589e98d276829bc05739624c0cb810f1c053a2aa583e22347d6016

    • C:\Program Files (x86)\MultiPing\MultiPing.exe

      Filesize

      8.3MB

      MD5

      69c398afedf4845219f1e0fe86179d9b

      SHA1

      f3a6a08aeb6755188cb48d25e86cf0dbd323de4f

      SHA256

      31098601d60e5e9854950fed9530bf256893a3f57608f255e6c66eac6337db8d

      SHA512

      830756248642a8b673befb456786f4a6433561144d059efcda165b3607c2d6da1182fb709ed6949595e8ab2604c8c7b05513aebb06f10ad6bfbdfb864bf96f8f

    • C:\Program Files (x86)\MultiPing\MultiPing.ini

      Filesize

      284B

      MD5

      d02857011cb3f5f5dd52cd190aaf67c4

      SHA1

      14d0b9aff040670f9d5363f3bbb731316cc02658

      SHA256

      63ab3fa6418a36ff09d7ab8574bcc4b92887a9f4a432d6c27a812edca03620a6

      SHA512

      708457a4593c5093620bcc5f2eaf6ee3c919245ef187698bd37b02e2424a4167201f4bef40cbc5dea5279a773d41cd7ab221e706ec48932840f4e3d179032ad0

    • C:\Program Files (x86)\MultiPing\MultiPing.ini

      Filesize

      377B

      MD5

      e7debdf09dfd457406001f6cb1aaa0d0

      SHA1

      8cb3ea25fef833f73439ff234aa371706269f13e

      SHA256

      5f9a1c42714aa0f907336b9bcb42e03dbcfa2ba6ff13074118a801d7473c6115

      SHA512

      eb6942e4be6a7eb467efcfd2ec861bf826232d20d65d9182db813faf06162bd98dedcb67e52a742601a9707a53e6509940d5b2b332bacff7b449035d746523eb

    • C:\Program Files (x86)\MultiPing\Sample Alerts.ini

      Filesize

      1KB

      MD5

      c2cbba5d32dbc7c21d45010870b1df9f

      SHA1

      0e7d321575b4231287b1af4008e63b98bd926af9

      SHA256

      0e8225834659783199716a3c36905d784bee0ec276f17d11945ee0f009e2736c

      SHA512

      f16b64a2bbd4ae85d6f00f574290ea3f9f214845e2ae05c1ca51ced60705794cdf59cfd869c855de3a7611c517a53841fc4e20cc0b9b21afdda8e13b288cfff9

    • C:\Program Files (x86)\MultiPing\libeay32.dll

      Filesize

      1.2MB

      MD5

      445329ac62452841c4e7e0a72d9c1d41

      SHA1

      bd031b175bfdd2b01ce0245a7ab08628abdacb4c

      SHA256

      e7005a53343604b6198d8c4a3ea711ed7c90f7280c15d6cee714e8ff22110bda

      SHA512

      52d6d51b9ac05598a57e12560c4c9a07eebb722ca0287bd9102c4eedc2e004b10ef900846a04da694fdec9f5e98a1d602cd2b415f9384c2b6d2c46cca7ed8952

    • C:\Program Files (x86)\MultiPing\ssleay32.dll

      Filesize

      332KB

      MD5

      b5baca3d9da826f3a30fb6f0f1c0ee9c

      SHA1

      7729a7634c89944440e28b3dfa3ccc9443bc23cc

      SHA256

      389731549d6e3aed3f0920730068f1f0fc8c9d96423a2440c350027c5635e091

      SHA512

      5253e5a3d9eb09dbb58a43e42bd90678fa0c9120923dd43632816a2e5305ced0dc78c4968cdeacfb46be71effdfa20d850830d1281fe60738d1160aff2e77fd3

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MultiPing\Uninstall or modify installation.lnk

      Filesize

      1KB

      MD5

      f251fb722440b82474cfa2a1ed0f5d0d

      SHA1

      bb767a78b99c009a2e52227857bbf016698202f7

      SHA256

      c8fd5e2c25d87b6475f9009aa7b758645475d8b302d798593aebc8c4f4dbf938

      SHA512

      2f62033cc9bab179f9d41b2340c32fc1aed45d968e8cfa38ed7b33d375e76d2b2d8920bd7e0549f930406761e706521926dde2b98c7857baba58de0f1e9ef997

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MultiPing\Uninstall or modify installation.lnk

      Filesize

      1KB

      MD5

      deadbc09852964582e1f3ee7cd8024c8

      SHA1

      c5bfaf706e2a727bc92ef8c7eb9b04439ed5b881

      SHA256

      07240fe6b5e8355857a95ff06b206f34a7352571bfb6ef1d880da7112c15f2ea

      SHA512

      4682c89da57db97667e9016804d2dc7ee48c0541b2904215c6d4ede5bf7dab4386c37421029d3530e2cda7053a277e6632cdb806863bc77c0fef947badda6402

    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MultiPing\Uninstall or modify installation.lnk~RFe588b91.TMP

      Filesize

      1KB

      MD5

      bb6ee812615f6a30f53984faac9d8a5a

      SHA1

      df537a41a2b131ad49b6e5e6b5145d7a0717d2fc

      SHA256

      f7498b17257d2801195b650136a0bac927d353642415a399aea4567207b8ab0c

      SHA512

      63ef5f8faaeb3870bb426b83233d74ca2077a458e402303a12dc7e1f60dc8e41f3935b2368716990e4a74d27c8c3cd5c4701aa9988e4d392febdd36939a46a4a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_B5408224970389A1C2D228B1F06E63F2

      Filesize

      727B

      MD5

      651ba571cb55ce32b084006016c69ecd

      SHA1

      cefa55df700f6e89a3a96549a9b38b2014131cf0

      SHA256

      bbc020a4a7400e179a2148c9bcbbedc724e30785f10012e2dc971b00bbe7ce6b

      SHA512

      e3423af2a7c2dd13b750234a8dec6150e56e4fc9f689420b5466f6f07d80fc615696813bcee239a4571c3ede1431b38def2c16fc87319e019a3edf4a99118841

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      a972544953b3f0272c08e7f3c4d83626

      SHA1

      3e84ca5a9eb6c9aba16d4f2360f951d632be71f3

      SHA256

      969e2973348d2a3bb570747d4abadcc847da865a075d937e3f785948206eb308

      SHA512

      beddfb0df9c2dc3508446d4f672e3a768e303c5274ce538113f19cf20577c141c018eae1b9e7e5cdc62e80d7d53aa046b9002b648c877f40cbd80aac698b3929

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_B5408224970389A1C2D228B1F06E63F2

      Filesize

      408B

      MD5

      df6a826e25d58106b2125ec29acb1cd6

      SHA1

      83b3cec51f24a5a724743b58b1a9bbb509fd1411

      SHA256

      ae96f33bd05a57af2d6afb066bcaf2bc4a990428309583cdb3ba5ec55d1e9517

      SHA512

      eb9a5cce930443c6c3eaf90c499ca4bc1d2d51cd0b4a55c2698af75fbf1ae4b9bba8dd94e36aa0cb77baf507277984964360da2ef4721e66cad32d031b1eaa02

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      7ec7f255913a60f8de63eef8e2f82355

      SHA1

      b551312f928c3389ffdd3a8b82272a5b73acce39

      SHA256

      df12f14c33249e32dfc779a910160d7356220ee2baf3684371269381bb6ca574

      SHA512

      c190e605b382e87c994bc305b128174fec67d6b355930a8eb58ed1f23f8607facbe6a7ae726477f5769b79cf638d06c48e3c423d712577bf6bf8d8a35067ea7b

    • C:\Users\Admin\AppData\Local\Temp\42c215c8.tmp

      Filesize

      40B

      MD5

      81285baf673711d78e5d4cf6580e9ffb

      SHA1

      0bf5195de403cb993b4a972d54d85bd830816fef

      SHA256

      17d3e6ba228993a12988f75ccc85337708cfe771eaa5421ba4a8c2fcbeb0d8bf

      SHA512

      288fb7fe8306789abdbf2080526c8898ad6cfd12ccdede524e6fb2305ff4fb462360471e8c123670b7778efc8dd2b2efbf9d149ec2e7cfc3396cdd626dfa0cfa

    • C:\Users\Admin\AppData\Local\Temp\MSICC0D.tmp

      Filesize

      380KB

      MD5

      2160822ba37161cbacff695771afa2ed

      SHA1

      87b5fd899791d245b1ed7eb5a7f0f0e8ec5cf79f

      SHA256

      6c7fa74530bb1140309ba0803cb240bc3e54e507c4abd790cf2dd49834435bcb

      SHA512

      061454ee65ad95f19890f7336278a72538a805f565ae80a0fe5eabca546d401eae18cf08c2274733ccc755439b7c8d8925919d0131ec0a28789e6c3bc2614011

    • C:\Users\Admin\AppData\Local\Temp\MSID6A1.tmp

      Filesize

      85KB

      MD5

      d6886121671fd85181af0adfbd1cecbc

      SHA1

      3d3d65a4d3111449f66a0e61f9b1c8c9c17d1c78

      SHA256

      d49bebdb46e9588a38199c7f1302808c43862f3727f88b1cf12264bf29dc7515

      SHA512

      03dc0b198832ff15af70cba917c2de23ad442113dfe27dd9d43c45f0dc6dc03403ed8c870027a5dea1736dcf1d82b71ed06d7306cf0086d5df5326c507f08e48

    • C:\Users\Admin\AppData\Local\Temp\nsu930A.tmp\System.dll

      Filesize

      11KB

      MD5

      ca332bb753b0775d5e806e236ddcec55

      SHA1

      f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f

      SHA256

      df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d

      SHA512

      2de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00

    • C:\Users\Admin\AppData\Local\Temp\{77C1F481-162A-433E-8209-F72DA1E6ED29}.bat

      Filesize

      104B

      MD5

      4f50a604090e5d6fd08cf19f73d785cf

      SHA1

      1377f48652446ca8afd7a73b7f007f700ead3e84

      SHA256

      b0a07811dfca7434ee415454955501f5850254148a5b9f6730216b9370773162

      SHA512

      0686b02dc5b351e73a9e7974016bbffb39c469b7827f57e5f526fabcc3b490e59198804932f106c07c4ef313bb8aa932fdc3c68feaf28ad269b324448e31f36e

    • C:\Users\Admin\AppData\Roaming\Downloaded Installations\{17968687-DFE4-45F1-BE7C-0AC7C666CCCC}\{19C7BE49-C761-4E1D-95C1-315F70D9654D}.msi

      Filesize

      12.9MB

      MD5

      fd476441bcfc1a7baee0af3b0a01b983

      SHA1

      7e94daaa95fe287e30af998541345ebc346131cc

      SHA256

      afb2f5dc7f728bd2cccca131cee5c8e11e3c8eea5536f185646df571862af5d0

      SHA512

      156ff9bbef3a60aa95c8c3d8d7a9c45217437f2854afae5cd3c1787d52e6617c9a9bb059905998ad10a6df70236c25520e7f0f7bdc641005c471656cf85fab9d

    • C:\Windows\Installer\MSI64E1.tmp

      Filesize

      850KB

      MD5

      3c8b918b23de1dab7de8e823e62e3be4

      SHA1

      0895364f613a14270a0754cfd6aa5b4bfba1a64a

      SHA256

      7025bc4b79c9bd487f4a79b814930d9125322ae67215532557133bfe575e3a01

      SHA512

      ddb201dbbfeff42a23087934acb794494e886edc53faaa973a132e18ec5f5dabd6e040f59d49812b0bda3eb497d0e96be20a00aaa89dd40900288f66c3fa2ad9

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      12.8MB

      MD5

      f7ee74d9c91bfc427e1d5954f327c610

      SHA1

      ce5a71d112dc8f6e343589d49420338e749c14f1

      SHA256

      26962106cd61825627ff02548c9d64c7eea8d87ee1bcf2a19456d753f79ab479

      SHA512

      9375c9b000ea9d87eff385082c802d6de77976d32fa6c4854238a36bd283027f82f3a132bf02feaf16726f867231aa8a498c25e336c609f170f46cf3376410a9

    • \??\Volume{afcdac1a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ca70d521-c38c-49d5-95be-0ca90b841cdc}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      d618b060fb7da2fa68c797a47aa8cfee

      SHA1

      e89380e09df1225670cb279fe0657659d9e70af0

      SHA256

      f0c15c0f6e53338573e51d7eb73a3f064b17455d26071b1934b6ca94be420fd0

      SHA512

      6ffbc6488f5cbd44291c23b2819d3a9237485646f7de7468cfc2033513ee96b36151f9f60fc1389779d4955875437040e886c991dcd6052fac9ea9108be21695

    • memory/1436-55-0x0000000002660000-0x000000000267F000-memory.dmp

      Filesize

      124KB

    • memory/3364-204-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-226-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-202-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-203-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-249-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-205-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-206-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-207-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-208-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-209-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-243-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-236-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/3364-228-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-119-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-118-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-117-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-128-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-120-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-116-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-121-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-122-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB

    • memory/4520-115-0x0000000000E10000-0x0000000001E1F000-memory.dmp

      Filesize

      16.1MB