Analysis Overview
SHA256
3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3
Threat Level: Known bad
The file 3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe was found to be: Known bad.
Malicious Activity Summary
Modifies firewall policy service
Adds policy Run key to start application
Boot or Logon Autostart Execution: Active Setup
Executes dropped EXE
Checks computer location settings
Adds Run key to start application
UPX packed file
Suspicious use of SetThreadContext
Unsigned PE
System Location Discovery: System Language Discovery
Enumerates physical storage devices
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Modifies registry key
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-17 14:52
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-17 14:52
Reported
2024-11-17 14:55
Platform
win7-20241023-en
Max time kernel
149s
Max time network
122s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe
"C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe"
Network
Files
memory/1548-4-0x0000000000230000-0x0000000000231000-memory.dmp
memory/1548-2-0x0000000000230000-0x0000000000231000-memory.dmp
memory/1548-14-0x00000000002D0000-0x00000000002D1000-memory.dmp
memory/1548-26-0x00000000002F0000-0x00000000002F1000-memory.dmp
memory/1548-38-0x0000000000310000-0x0000000000311000-memory.dmp
memory/1548-58-0x0000000000360000-0x0000000000361000-memory.dmp
memory/1548-68-0x0000000000380000-0x0000000000381000-memory.dmp
memory/1548-76-0x00000000003A0000-0x00000000003A2000-memory.dmp
memory/1548-21674-0x00000000003C0000-0x00000000003C2000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-17 14:52
Reported
2024-11-17 14:55
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
145s
Command Line
Signatures
Modifies firewall policy service
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe:*:Enabled:Windows Messanger" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile | C:\Windows\SysWOW64\reg.exe | N/A |
| Key created | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications | C:\Windows\SysWOW64\reg.exe | N/A |
Adds policy Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
Boot or Logon Autostart Execution: Active Setup
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA} | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA} | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{AA7D4AA4-AA9A-CF2C-C399-0A7A12E929AA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" | C:\Windows\SysWOW64\reg.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\DJXMLHG7SI.exe" | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2044 set thread context of 1644 | N/A | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe |
| PID 1740 set thread context of 4664 | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe |
| PID 1740 set thread context of 3148 | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\reg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\reg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\reg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\reg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\reg.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\cmd.exe | N/A |
Modifies registry key
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\reg.exe | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe
"C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe"
C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe
"C:\Users\Admin\AppData\Local\Temp\3de4b098967dd1c1b3ebaf0be242415323608fda76969559d9fbe61c3d4f0fb3.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FCQQE.bat" "
C:\Windows\SysWOW64\reg.exe
REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe
"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe
"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe
"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe:*:Enabled:Windows Messanger" /f
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
C:\Windows\SysWOW64\cmd.exe
cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" /f
C:\Windows\SysWOW64\reg.exe
REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe:*:Enabled:Windows Messanger" /f
C:\Windows\SysWOW64\reg.exe
REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
C:\Windows\SysWOW64\reg.exe
REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
C:\Windows\SysWOW64\reg.exe
REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\DJXMLHG7SI.exe:*:Enabled:Windows Messanger" /f
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 200.163.202.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | kreuz.hopto.org | udp |
| US | 8.8.8.8:53 | kreuz.hopto.org | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 1kreuz.hopto.org | udp |
| US | 8.8.8.8:53 | 2kreuz.hopto.org | udp |
| FR | 78.159.135.230:43194 | 2kreuz.hopto.org | tcp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 3kreuz.hopto.org | udp |
| US | 8.8.8.8:53 | 4kreuz.hopto.org | udp |
| US | 8.8.8.8:53 | 5kreuz.hopto.org | udp |
Files
memory/2044-3-0x00000000022F0000-0x00000000022F2000-memory.dmp
memory/2044-2-0x00000000022D0000-0x00000000022D2000-memory.dmp
memory/2044-4-0x0000000002310000-0x0000000002312000-memory.dmp
memory/2044-5-0x0000000002330000-0x0000000002332000-memory.dmp
memory/2044-6-0x0000000002340000-0x0000000002342000-memory.dmp
memory/2044-7-0x0000000002BA0000-0x0000000002BA2000-memory.dmp
memory/1644-8-0x0000000000400000-0x000000000040B000-memory.dmp
memory/1644-10-0x0000000000400000-0x000000000040B000-memory.dmp
memory/1644-11-0x0000000000400000-0x000000000040B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\FCQQE.txt
| MD5 | 6831b89d0b8dc3e07588d733e75c122b |
| SHA1 | 8c70088c3224bbaf535ed19ec0f6bd5231c543be |
| SHA256 | 9fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2 |
| SHA512 | 699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da |
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe
| MD5 | 57cfafefb06b96e49c5c9798c3f90a56 |
| SHA1 | df9a862faadd7b5c8965132745c2774660d06742 |
| SHA256 | cb9d84bb754bfb413f80c3b2214b09b5e5268f6dda066f1a9f2b3204f4023728 |
| SHA512 | a86ee5afde43202617109f5d7c939e01870b85c427823a2fd299fa8cea2357881f6c3a47908a4e7365eeadf2dd2062b147b0f6d89a6aeb240df84f1ba778d3fc |
memory/1644-37-0x0000000000400000-0x000000000040B000-memory.dmp
memory/1740-39-0x0000000000400000-0x000000000043E000-memory.dmp
memory/1740-41-0x0000000000400000-0x000000000043E000-memory.dmp
memory/1740-42-0x0000000000400000-0x000000000043E000-memory.dmp
memory/3148-47-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-51-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-56-0x0000000000400000-0x000000000047B000-memory.dmp
memory/1644-62-0x0000000000400000-0x000000000040B000-memory.dmp
memory/1740-55-0x0000000000400000-0x000000000043E000-memory.dmp
memory/4664-66-0x0000000000400000-0x000000000040B000-memory.dmp
memory/3148-67-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-69-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-73-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-78-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-82-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-86-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-91-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-95-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-99-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-104-0x0000000000400000-0x000000000047B000-memory.dmp
memory/3148-108-0x0000000000400000-0x000000000047B000-memory.dmp