Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 15:20

General

  • Target

    cbbc6b889139695429b718d2df58eca0N.exe

  • Size

    1.9MB

  • MD5

    cbbc6b889139695429b718d2df58eca0

  • SHA1

    07910a4bc346a740409046227c7110619a0bc937

  • SHA256

    b2f12373ff1c472bc85fa522d4a791ded7472af0a9493dd7859cd9408b5412c5

  • SHA512

    666facd0adfc47ad1889ff42b66622ba0a7a2af85302d9a6d3a175b9fb2c497440d69df9d9aaf2811fb6a7083d2b909992a3d5a7f4c5c597f0eff63801a98ec9

  • SSDEEP

    24576:eTCwOJFNEy558fDlu4hKWBAjho5i9cBM9vyXsxDjQ0CIY6EDle0qji:0OzN2cTBw6ge8

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe
    "C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0n.exe
      "C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0n.exe" C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2732
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\cbbc6b889139695429b718d2df58eca0N.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2852
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2592
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:537619 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    1.9MB

    MD5

    552d7c9550ab12c3d5549084e0dc26cf

    SHA1

    499bcdbc1d857202115e87f5f9f685c15b3205f6

    SHA256

    fb98529ae6c554daf7cd46498dc82f27faac95e84c3abfec56cf82ffd6c5d3c3

    SHA512

    7fd7c2ca7af3c06d9245293f64bc152a9ab82d0fd319a494efad89b55e7c8cf892cffd261cd274405b3af2100cc92b75a42e213899485249b4fd217c6a1abbc0

  • C:\Program Files (x86)\Adobe\acrotray.exe

    Filesize

    1.9MB

    MD5

    9829da70e93313c89e5958f9763f97f2

    SHA1

    d1b64fe452e24ce36374c38abf619e01bbf0c85a

    SHA256

    625eacd9ce59973ac87fd7e7a1b4c3c8b02b869d93b4c87af8a7295fbe4f68ba

    SHA512

    928f2b9c82cbf9aa1753b935236008a253a2b399e3e090b2974487de1801c3df22cb3b579c719d8bafc0e3a14fb8416baa2c863e1b0583b8a4508adb094fbba3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10dd9e41d4e6ebdd4dfc32140135d586

    SHA1

    6cf64c4165e47f2eb43a3d4a220c2f663c05cdbb

    SHA256

    f4842a228bb0f7f6e58c18598a765a011d23e24ca180075adac5b1ff681f8f5c

    SHA512

    456958653275890b9eb6faa238b13f6682cc2e0da6db00ced00cddd778b51b66fa12b1b07d78fe8aeb866b9c0699712383bc6aaab2eb6d064abd3d5ffeddcfd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59b4ba3c6d0db1d405a22d0ee045b4bf

    SHA1

    420d00af27ac958b3190004f08e3d515025e7cc3

    SHA256

    0fa722c57d9b075b3157c9d42e7efed9e05458d6489724cea09d557a9bd42dfe

    SHA512

    fa7f5a2e815bfba1bb8f894f7868dc165a3d66e85c83f67930b459a214378118a343d01c3c7a57a04d2203d26121468c9c55ad0286293cb76b90de42f7be357f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4749c9cbc0bcdc2eabe253732bc3788c

    SHA1

    ec4b1abb0862bb3f37238486b30a811b16397db4

    SHA256

    eb5f7a296945b272de73bdfbd16d5b7ad134b5ead7be3d29b23410d8574fca05

    SHA512

    589018cba2b1a55fc32c17c11471f925000220f1d47355097685fb88b8fb90fe652e0c1175a38cf8fe242a499b7106815cdfc9518c3538483c16faaf10be4328

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d8115fac1f3cdd74e01bc71d21712ee

    SHA1

    6145a5b2412217d0415f0988281c87e265ab5b79

    SHA256

    776d9e304c3e98bda0394b5b850e10f674b429631e57cbb50b3e148b9f47f0e0

    SHA512

    acbbe2d53be1875ccb9154581301bdce84732a763ada15af962fe2a8213d8cca7284c122fccaca94a933285907b0a947089f8add27ec996f66be92f1ad77604d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27cface1cdde73c510aefc6be246d172

    SHA1

    b552374eb57112fba9cba80cfd7e468c80bcd78a

    SHA256

    560a784aed991a4fcdc243db8bb7fbe6f6936e2682f983bc08bf9baff5fab3cd

    SHA512

    0a1ae3a3565979c0ce7c3ab4a2b87c1db51b79957406cee637dc60f11fcbe5dfae602cf34da752d14230c2cd7f8e5f3425648c3b60b310026dd270e5297830c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2eb87ced14844262f84778bcd411cec3

    SHA1

    ef9a81bc7c37904bdd3b754a0e718ff0fb96a39f

    SHA256

    246c6031652d51e7a893a28359b7441bef665b8966f161c594ff8b68e4281546

    SHA512

    3293524234465b5f0f5a99cfc131c0f33e823fbf2b2a31bd1be7d93879f9ed0889f173b93557d3ff1f2ac485d5db633c35cb9a3502f837e66d3cc8f5a8169fc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31ec65df23a3750dc850f9ba09eb0f37

    SHA1

    d14404862d8c54061575825b6111b223d8070ca5

    SHA256

    d7d897427d7c2c8a33cdca038cb0c5711e1c73fcc25d5ba6ded07ff22e7ee01d

    SHA512

    930fa476ddbb08061b2f5ae35446bd3f90e1e6777f7b06f6eb4e505425c85611071245c382b66f6760d5c7165ad12bb31b840b1b37a7ddcca049c7106874527f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d530842b09582cbfd6b0ab2694458a1

    SHA1

    af1789dcdcde592beb9a88bd0ddfbd233a568d3e

    SHA256

    b784f584dc08f55c9f0cd29ce0b6c80463d661baaafd7b72b350350a9d9929af

    SHA512

    f16e6491a024a65d7497167d7e1a53abc06d3836e3791412715b2212a0a6679f5e35287430e415116ae268a35f224285e56475c68d169a288e6734ec154b6942

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0322f91b7fdb8c8eb701b3b686f8f1ea

    SHA1

    fe79d79a6e5290cd140e0551a1a05bab77c233e0

    SHA256

    5a3c6a7b4d8525319bbc7c72c76004e942067e3c0d8c32697c2867c474161662

    SHA512

    85f82aa6420abc0a4cb27f3609bf3923a8fc29f91fd7ba04af1fcecff7ccf7fd6639db3480e66c19b78c77f097ca6bfb340d9f8ea6a8cc9ff6ccb0fe25dbe10a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1cf2b3eca80454c7bc2b072bdf7a4777

    SHA1

    14c8faba6d023ed2147a37d194e4c2d4f9fc86fd

    SHA256

    3ffbbb1af7418a806eaf27c022bc723e132c2963ae56a76e0b2ea80497ec9e59

    SHA512

    685e8293a4b7cbc16a4a3c41c041dec009cf6e9c26321bf1ab9915781dc8c573596043eb7755103eb3e2d790df4a20972756959f4d26b65ae61d087eba3bed2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a839987fec8dbb29c41b6c834dc39938

    SHA1

    8aa3dc98bd7de414acbb492445e3223a15aac669

    SHA256

    792e96d07064de31ccea7083c8fdb3f7f83d946c73a84acca42dcacb1f495d5c

    SHA512

    b4d2e219ee8e151b84e25be9bcb0726ae63e33664735df6bc62810cbc379223aa528dd3814c362ab6b99f5ed320dc155e0d6202b5d25e7bb793745585520646b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09bb74cd768addd7feb6a6dd648342d1

    SHA1

    0dc14050a161844d0c8a595db95c254eb2f82cf5

    SHA256

    dfbfec1f0eecf707744e6f627d2723eba4e2512e77758106f1dafabba91d8ac2

    SHA512

    0a525e1bc392ed994b954720af32f6e86c621b8c4cfc0fde2e8277103148fe04e00c72df5a59b30fb831b4e35dbddcccbb5c63923779c64aa2667a5eb37f0358

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6135239ed57e4c7b5ad1a1db8a3b54a

    SHA1

    0e44cd2a0b51ec146558ccbc7777b3f5b923baf0

    SHA256

    0cf23594ae4cf39eddb781561aad0ad25077db88ad62553d33cf3e53b464a3c1

    SHA512

    af41d8452dd072677cc789338fb8f18e6eae11b90d75fefcc0aca97b45608154d9d1770825798eac2c3d14add5907ed1e2f8bbb818b837440069f6187a149193

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    203b896654edaec5e9ceb348ca704667

    SHA1

    506182bf33abae6d5bd724a8de9dc9e6314e17e1

    SHA256

    2e71390ed8098edb7ab9b8d48b35d61ccf4f08f5c04d7289f74fb8b9b44078fa

    SHA512

    aa29ff164da569cf70a3002d8bb42853579962a3a2dc59e9ab5c9d3ba1db7c010eba3388075d46150f29b668976adb8d915c0f9021d9f85c5da87488b7aea142

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95a3748399ae2cb4c0decf6a8b3f1852

    SHA1

    edc4edce86442e296fa1fa8eeb8ecf784b78c680

    SHA256

    d7569fca76f5b1a3832286fa1b23bc9735fb5f5844e5099c0e4d32237393af71

    SHA512

    41588cea94aa0e111d511d214d7c206d368e3a4ddb3bf453091807b8b057b89c34898b920595c38888a013be86e3d36ff3f23990476fe013f65c21494d53bb71

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e358b3d6962d581d73bf31c28d6c1d0f

    SHA1

    70a5822569e3784017ea7d7c147cfdab5108b4f8

    SHA256

    d6c87c2b7b78eac0fb87ffbaa172c73ad1c72bd90cd96f2b32735f099cf9b416

    SHA512

    0ae55a5e56c91c7c6439b6f08e47141b48d7782aff28d3854e3a6bb0b846a070bcd72f27500b92145a17d01416eb24a6cf2f0f6bcf375ac9a42423ff8b67b075

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19b6cb6f666dfe31af1bea6a6df78b9f

    SHA1

    bb3b21149da7eeb9129f64f41a530d876e329700

    SHA256

    9efaa6108197eeb16d7f3953d2988ccd2dddfe185b294048ad20093f28001cba

    SHA512

    6e1fd6f32897172697d7226f9d9a5e29dfbbcad63ad673645b21c721c893ea83c4771a7cb7ba17f1966858073aea79f5a7d07dcd97be7b1cae19cea46e90b357

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c3bac3ebf3205cb58b02dac40a0af06d

    SHA1

    4d0a327eb6193f7ff3b85ab157597c1fe224f636

    SHA256

    ea032dd21d4c7ea43f57e0d88213828381de7764fbe4706138efe89352074eee

    SHA512

    1a8fded898417216b01f9f41b9a3d8b0f71d1e7c882bd57327d8486d06034caec1841ee78410fd6232a988dee98bbcd27d90ad50cce1aebff196f756aa69798d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    afccbb6d00e9c16bb6355f81d99d8da7

    SHA1

    520930e7cd65196c3befa406e7bc433906e13aef

    SHA256

    a452aac40df41ff0846444df370d1a59d21be9942ffb6dbd4ad20c5d5e8763ff

    SHA512

    c190604abc5c2164a6a12b142501e97d1d94a5698ecd16f2afdbedb67352185f93f9de35d21bc9b8d68a734a79e88404273fd26a617330209c8029dbd36a5db8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f22263a572e0678b9763912ee510b2d

    SHA1

    b5cc736cc8d79ce330c5dcbab20207dede397922

    SHA256

    43f9240ba20fb09535da126c3c93bc0b95f49c18821e16224da195bafe37df83

    SHA512

    96c6e6b6fb5f074f10cc79e1ea557be0b2c97f4ca1fd73c5de20e8fe99040b31ded9ebfd5ffac281d66c5e85370d2f435ff88206283f011048d4cc0520b62aba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7deea117a8982af7b49ec03bb8a0abc5

    SHA1

    87a74fed885afe19ffd0ba1f9446e8f9ceec1cef

    SHA256

    68f4226fd6d66ac154d15bcb9f65389857cd64cb29bc6e7832a331c164240ee3

    SHA512

    5bdee08f099e4bf2efc450598913c8bf3153244da6c598f008ac3a57e110056d5cda0ace311ddaffd82daf2349a1bcde2d6c686f484b3f540aaa075fcd905be7

  • C:\Users\Admin\AppData\Local\Temp\Cab3717.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3789.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GFQNQJARTII8C9SKPJZ7.temp

    Filesize

    3KB

    MD5

    85568122144d4c20622bafc7027330b3

    SHA1

    0f9996905f10f8172a7cf6401df4ae42ca504d54

    SHA256

    ebb1ce5262ad878fce2ccc7a7107991da19b72a1bb462ace853f4b7329b23cae

    SHA512

    7b4f85f66570400cc5e0a7fc05e2b5f8cce283a2b7bbb9ad017591c8170e33c8b2c856e0fcdce38e435ec740c823f6d2a662fd6b501beaee9dfe6fea86e1275a

  • memory/880-621-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/880-40-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2732-11-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2732-5-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2820-39-0x0000000000480000-0x000000000049D000-memory.dmp

    Filesize

    116KB

  • memory/2820-303-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2820-38-0x0000000000480000-0x000000000049D000-memory.dmp

    Filesize

    116KB

  • memory/2820-620-0x0000000000480000-0x000000000049D000-memory.dmp

    Filesize

    116KB

  • memory/2852-45-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2852-622-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2988-609-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3048-188-0x0000000003360000-0x000000000337D000-memory.dmp

    Filesize

    116KB

  • memory/3048-49-0x00000000034E0000-0x00000000034E2000-memory.dmp

    Filesize

    8KB

  • memory/3048-0-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3048-24-0x0000000003360000-0x000000000337D000-memory.dmp

    Filesize

    116KB

  • memory/3048-10-0x0000000002A00000-0x0000000002A1D000-memory.dmp

    Filesize

    116KB

  • memory/3048-9-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3048-4-0x0000000002A00000-0x0000000002A1D000-memory.dmp

    Filesize

    116KB

  • memory/3048-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB