Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 01:19

General

  • Target

    wireguard-amd64-0.0.38.msi

  • Size

    4.1MB

  • MD5

    6b2ea1ceb4974a9b9a77f59c2fb1bc00

  • SHA1

    53d6bac096652875d3524fd63ed4594875f75be4

  • SHA256

    b2a723c6e2309b4e1e32a3b22f5c2c3dfcd92c062f2b1e0aa00a9b6823fd2f2d

  • SHA512

    d9eb4b376f589ec347a66787c0a43c3a366fb8c283db6d9e74131b2a79e399d7ae1bcfad099efcca22902e75e5290c773fe7b1790ac4fb75643d13fba216ae33

  • SSDEEP

    98304:uV5CKiz8xjHuUY0Nyvm3Rh7l0d/mmvfMdoTy:05+z6iENyO3D7Sd/9cdoO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 20 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 31 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 24 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\wireguard-amd64-0.0.38.msi
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3200
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1296
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding B8367D8EE19270D8CF0CCB2A908E39ED
        2⤵
        • Loads dropped DLL
        PID:404
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 8F318DAD11E44E3F1CA62BC8300DBDBF E Global\MSI0000
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:2220
      • C:\Program Files\WireGuard\wireguard.exe
        "C:\Program Files\WireGuard\wireguard.exe"
        2⤵
        • Executes dropped EXE
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Program Files\WireGuard\wireguard.exe
          "C:\Program Files\WireGuard\wireguard.exe" /installmanagerservice
          3⤵
          • Executes dropped EXE
          PID:3332
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:4688
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Windows\Temp\1bfe051fb86972b9befa09c9c99801681b530aa365dcb5d3a78f185b7f7e3fb0\wintun.inf" "9" "47df9e2ab" "000000000000014C" "WinSta0\Default" "0000000000000160" "208" "C:\Windows\Temp\1bfe051fb86972b9befa09c9c99801681b530aa365dcb5d3a78f185b7f7e3fb0"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2620
    • C:\Program Files\WireGuard\wireguard.exe
      "C:\Program Files\WireGuard\wireguard.exe" /managerservice
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Program Files\WireGuard\wireguard.exe
        "C:\Program Files\WireGuard\wireguard.exe" /ui 968 964 976 984
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4444

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e587f2f.rbs

      Filesize

      9KB

      MD5

      56bdde9594a9e6410058fad076830805

      SHA1

      451d8d32e1873b67ace5b1c2bba808865f9f7d91

      SHA256

      081574dcde1917fd7259ac074343e1177b78f3b76961f480c78c5307e764ae46

      SHA512

      708ea6610a5dabcd4ef6c59d341c1760ac556979be885cefb9d2240f8f1f378654936f9353c1c36584f0fc90330c89e59240ecfbab4dca1eac5ff74cd54000dd

    • C:\Config.Msi\e587f31.rbs

      Filesize

      418B

      MD5

      3553deb882b38f22a39bbbd447672431

      SHA1

      8471fd32a71b92694f17f585d70537e3f412e0ce

      SHA256

      7a1ba6b11793f352ae19a2e95b319f73ef5324a6a6ec7f11c0d4dbd59d903675

      SHA512

      a6067c7d52c37caffd04049f467335a62348af618d670089c1fd4eba9646a69af1ca61f0da28ce6ddd704f55146466d8c358832ae56e8f85183fc4b9b14bfdc5

    • C:\Program Files\WireGuard\wireguard.exe

      Filesize

      12.1MB

      MD5

      03c54345a12a77fdfa4e65184f98eeeb

      SHA1

      ae9eed8ae1f8429341f4dd76bec49874d97c728f

      SHA256

      80d2fa7093da929f0fb5580dd28c23f1b2901cb80e15600d9b0cf82da4f3f9ab

      SHA512

      eb0a3e672370ed5f379d690b22662d1ee32fb9bf58bac8c66ec4060275240d72f69cc680413a3ac967bd66e13def0117653c42cb11f974a3387ea1ff7530b21b

    • C:\Program Files\WireGuard\wireguard.exe

      Filesize

      12.1MB

      MD5

      03c54345a12a77fdfa4e65184f98eeeb

      SHA1

      ae9eed8ae1f8429341f4dd76bec49874d97c728f

      SHA256

      80d2fa7093da929f0fb5580dd28c23f1b2901cb80e15600d9b0cf82da4f3f9ab

      SHA512

      eb0a3e672370ed5f379d690b22662d1ee32fb9bf58bac8c66ec4060275240d72f69cc680413a3ac967bd66e13def0117653c42cb11f974a3387ea1ff7530b21b

    • C:\Program Files\WireGuard\wireguard.exe

      Filesize

      12.1MB

      MD5

      03c54345a12a77fdfa4e65184f98eeeb

      SHA1

      ae9eed8ae1f8429341f4dd76bec49874d97c728f

      SHA256

      80d2fa7093da929f0fb5580dd28c23f1b2901cb80e15600d9b0cf82da4f3f9ab

      SHA512

      eb0a3e672370ed5f379d690b22662d1ee32fb9bf58bac8c66ec4060275240d72f69cc680413a3ac967bd66e13def0117653c42cb11f974a3387ea1ff7530b21b

    • C:\Program Files\WireGuard\wireguard.exe

      Filesize

      12.1MB

      MD5

      03c54345a12a77fdfa4e65184f98eeeb

      SHA1

      ae9eed8ae1f8429341f4dd76bec49874d97c728f

      SHA256

      80d2fa7093da929f0fb5580dd28c23f1b2901cb80e15600d9b0cf82da4f3f9ab

      SHA512

      eb0a3e672370ed5f379d690b22662d1ee32fb9bf58bac8c66ec4060275240d72f69cc680413a3ac967bd66e13def0117653c42cb11f974a3387ea1ff7530b21b

    • C:\Program Files\WireGuard\wireguard.exe

      Filesize

      12.1MB

      MD5

      03c54345a12a77fdfa4e65184f98eeeb

      SHA1

      ae9eed8ae1f8429341f4dd76bec49874d97c728f

      SHA256

      80d2fa7093da929f0fb5580dd28c23f1b2901cb80e15600d9b0cf82da4f3f9ab

      SHA512

      eb0a3e672370ed5f379d690b22662d1ee32fb9bf58bac8c66ec4060275240d72f69cc680413a3ac967bd66e13def0117653c42cb11f974a3387ea1ff7530b21b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D

      Filesize

      471B

      MD5

      7cccd0087427c47c2ffc1a44abdbaacd

      SHA1

      34ec0ca0e0e010cacab806f838db31d0d98a20a8

      SHA256

      8420d86c0a3fd6ad812bb278fed5a08522e2367d974042d5e4978f9bc4df979b

      SHA512

      000ced172de3cad8f1cbe1504034082413734ad2041a017394ebdfb3057a48840430ab5a71f7b205944291039107395a5f28c5bb4b206d524d73205018ccc6bb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DA3B6E45325D5FFF28CF6BAD6065C907_94FAF4007D97DD988E34ECDCFF463840

      Filesize

      471B

      MD5

      0b5bee3f0b052048a8bf1e727f7a3e77

      SHA1

      d331e84eec38c9f3e0e2fc37f211f6dcf20de09e

      SHA256

      7bb7e6049c2cd596d4f394c8c84f3ecbc4b991bd40b297d13d4bacf96e55891c

      SHA512

      bc857a5516290857c1dbb33798fab0d8cdcde6f7cd8fe64466e7fd18f44387bb581601bff3f53435353ed68abc051f20e1da9459331cf2c37077404049eaf727

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8890A77645B73478F5B1DED18ACBF795_C090A8C88B266C6FF99A97210E92B44D

      Filesize

      396B

      MD5

      1ec198938a90ffc7b79bba00e6b9d3c4

      SHA1

      5919d0f43c90174997132f0abe288f8ea39a34d8

      SHA256

      1bf7f23c6faf40cc349d749b9888bbf3b8cd1df563295a1e497b82c26cd0b9a3

      SHA512

      448d457f02630fa415f349488b98074d9c488c56ddd3f989b21592dfc295ac906aaca98955a2575d3e8e522dce1aaa40f1f5660923ad7ec9cc98ff94c2d08b27

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DA3B6E45325D5FFF28CF6BAD6065C907_94FAF4007D97DD988E34ECDCFF463840

      Filesize

      408B

      MD5

      50aff3a200e2b982c82f53e74223ae94

      SHA1

      b4d7ebe6e45a36b6161199ba9fb7f45d1b901603

      SHA256

      842a4d37d461acebfb5dec797ef7d403770bd7849bf0dfe0bf30591ea18b1240

      SHA512

      3ddacbc7a0fe1085514feca91b53f9779e6b1410672fa1d4e66a1ca55ea0c823bc2ca8d3285d5d02baa886a549e3efd73c2f7d99215879ac1f652ae6f6da01b7

    • C:\Windows\Installer\MSI80C4.tmp

      Filesize

      103KB

      MD5

      124f15d8326edaa27a51d7a1d2242643

      SHA1

      ee7c14399f438b60bb2abbca053f9226fb1c9468

      SHA256

      5c2f81324d16042e40f235a3e03bad4dc03cef3eef1c58f69b88b22f082ec261

      SHA512

      c3ce96f790f2d8c82e8c95d5252388552bc159cf0c3d5df0eda3b59bc06659e71a4c1d24f63898af2626e2d98fc32db9f50327d066d4df6e719c251ff36c2271

    • C:\Windows\Installer\MSI80C4.tmp

      Filesize

      103KB

      MD5

      124f15d8326edaa27a51d7a1d2242643

      SHA1

      ee7c14399f438b60bb2abbca053f9226fb1c9468

      SHA256

      5c2f81324d16042e40f235a3e03bad4dc03cef3eef1c58f69b88b22f082ec261

      SHA512

      c3ce96f790f2d8c82e8c95d5252388552bc159cf0c3d5df0eda3b59bc06659e71a4c1d24f63898af2626e2d98fc32db9f50327d066d4df6e719c251ff36c2271

    • C:\Windows\Installer\MSI81EE.tmp

      Filesize

      275KB

      MD5

      2232c07e354364e0eb1dc80024593826

      SHA1

      65bb4232c0416cfb2c158bfc32a7732ad72cee72

      SHA256

      fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f

      SHA512

      f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572

    • C:\Windows\Installer\MSI81EE.tmp

      Filesize

      275KB

      MD5

      2232c07e354364e0eb1dc80024593826

      SHA1

      65bb4232c0416cfb2c158bfc32a7732ad72cee72

      SHA256

      fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f

      SHA512

      f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572

    • C:\Windows\Installer\MSI83E4.tmp

      Filesize

      103KB

      MD5

      124f15d8326edaa27a51d7a1d2242643

      SHA1

      ee7c14399f438b60bb2abbca053f9226fb1c9468

      SHA256

      5c2f81324d16042e40f235a3e03bad4dc03cef3eef1c58f69b88b22f082ec261

      SHA512

      c3ce96f790f2d8c82e8c95d5252388552bc159cf0c3d5df0eda3b59bc06659e71a4c1d24f63898af2626e2d98fc32db9f50327d066d4df6e719c251ff36c2271

    • C:\Windows\Installer\MSI83E4.tmp

      Filesize

      103KB

      MD5

      124f15d8326edaa27a51d7a1d2242643

      SHA1

      ee7c14399f438b60bb2abbca053f9226fb1c9468

      SHA256

      5c2f81324d16042e40f235a3e03bad4dc03cef3eef1c58f69b88b22f082ec261

      SHA512

      c3ce96f790f2d8c82e8c95d5252388552bc159cf0c3d5df0eda3b59bc06659e71a4c1d24f63898af2626e2d98fc32db9f50327d066d4df6e719c251ff36c2271

    • C:\Windows\Installer\MSI855C.tmp

      Filesize

      275KB

      MD5

      2232c07e354364e0eb1dc80024593826

      SHA1

      65bb4232c0416cfb2c158bfc32a7732ad72cee72

      SHA256

      fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f

      SHA512

      f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572

    • C:\Windows\Installer\MSI855C.tmp

      Filesize

      275KB

      MD5

      2232c07e354364e0eb1dc80024593826

      SHA1

      65bb4232c0416cfb2c158bfc32a7732ad72cee72

      SHA256

      fb1cd5e7c3ea30dfafd3cc1862e311388361d896610db28c63716da9d71e8f3f

      SHA512

      f0d295565b209f4dedd2a79123fa54ff9b8cbb173f14463ab3d3707b8d87aad84b05c2898478ecc148e29d02fa07ddda9499795e0ceafc2982c0adbd570a3572

    • C:\Windows\Installer\e587f2e.msi

      Filesize

      4.1MB

      MD5

      6b2ea1ceb4974a9b9a77f59c2fb1bc00

      SHA1

      53d6bac096652875d3524fd63ed4594875f75be4

      SHA256

      b2a723c6e2309b4e1e32a3b22f5c2c3dfcd92c062f2b1e0aa00a9b6823fd2f2d

      SHA512

      d9eb4b376f589ec347a66787c0a43c3a366fb8c283db6d9e74131b2a79e399d7ae1bcfad099efcca22902e75e5290c773fe7b1790ac4fb75643d13fba216ae33

    • C:\Windows\System32\DriverStore\Temp\{0ffe2e2c-6ae3-1744-bb59-36c06869f066}\wintun.cat

      Filesize

      9KB

      MD5

      faba2ccb8fe366fd281ca6be6d2bb7c2

      SHA1

      bb7bd32a21f3eba652fde24146387ffc5278143e

      SHA256

      602187e5470ddbdf9421045bb0515f358c88bf88f59fd8a886fb6373da5d0f82

      SHA512

      ec424a545e2598f299706499dab07b4d12b0734a52f928216a53bca2b7f384b97bd4fc092d7d68de636a75daf79ac392c4b49b7251ec011236de1659253d6214

    • C:\Windows\System32\DriverStore\Temp\{0ffe2e2c-6ae3-1744-bb59-36c06869f066}\wintun.sys

      Filesize

      37KB

      MD5

      1945d7d1f56b67ae1cad6ffe13a01985

      SHA1

      2c1a369f9e12e5c6549439e60dd6c728bf1bffde

      SHA256

      eb58bf00df7b4f98334178e75df3348c609ea5c6c74cf7f185f363aa23976c8b

      SHA512

      09af87898528eaa657d46c79b7c4ebc0e415478a421b0b97355294c059878178eb32e172979ee9b7c59126861d51a5831e337a96666c43c96cb1cf8f11bc0a0f

    • C:\Windows\Temp\1BFE05~1\wintun.cat

      Filesize

      9KB

      MD5

      faba2ccb8fe366fd281ca6be6d2bb7c2

      SHA1

      bb7bd32a21f3eba652fde24146387ffc5278143e

      SHA256

      602187e5470ddbdf9421045bb0515f358c88bf88f59fd8a886fb6373da5d0f82

      SHA512

      ec424a545e2598f299706499dab07b4d12b0734a52f928216a53bca2b7f384b97bd4fc092d7d68de636a75daf79ac392c4b49b7251ec011236de1659253d6214

    • C:\Windows\Temp\1BFE05~1\wintun.sys

      Filesize

      37KB

      MD5

      1945d7d1f56b67ae1cad6ffe13a01985

      SHA1

      2c1a369f9e12e5c6549439e60dd6c728bf1bffde

      SHA256

      eb58bf00df7b4f98334178e75df3348c609ea5c6c74cf7f185f363aa23976c8b

      SHA512

      09af87898528eaa657d46c79b7c4ebc0e415478a421b0b97355294c059878178eb32e172979ee9b7c59126861d51a5831e337a96666c43c96cb1cf8f11bc0a0f

    • C:\Windows\Temp\1bfe051fb86972b9befa09c9c99801681b530aa365dcb5d3a78f185b7f7e3fb0\wintun.inf

      Filesize

      1KB

      MD5

      8480579050970b0812cc3d9a1bce1340

      SHA1

      edebebd090602f4eee375ad754c8566d4fda23cb

      SHA256

      44098408ab9611dd99a38e140c7fb1ca5dce6eb2d5f0d5e500547ac1ba5d235b

      SHA512

      46de9202c3cf0ddbf19f9e0e02ec17530f2722abfa08669fd30a6095ce2342fa89a2cc59c1d47afd82b48c915bb95f4c6d16e7c21129a9c8f09c2bf239566933

    • C:\Windows\Temp\1bfe051fb86972b9befa09c9c99801681b530aa365dcb5d3a78f185b7f7e3fb0\wintun.inf

      Filesize

      1KB

      MD5

      8480579050970b0812cc3d9a1bce1340

      SHA1

      edebebd090602f4eee375ad754c8566d4fda23cb

      SHA256

      44098408ab9611dd99a38e140c7fb1ca5dce6eb2d5f0d5e500547ac1ba5d235b

      SHA512

      46de9202c3cf0ddbf19f9e0e02ec17530f2722abfa08669fd30a6095ce2342fa89a2cc59c1d47afd82b48c915bb95f4c6d16e7c21129a9c8f09c2bf239566933

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      23.0MB

      MD5

      a2e027dcca4fce291e49b0576adde9c0

      SHA1

      f2795333fba3dd9d913759ae318456a814f81332

      SHA256

      57b5a7669bf866a429bd07d374e8ece20d97eabc3ca59a2a2f50de8c1b6ae9cb

      SHA512

      c1e0fdc811e5a6afd867cb35ebfb1dd93f30ff30e48b7b1ce989ab7106371ef082931fd3a7ed9ca3704a21c3e6b41803d29b1049ae1a53e3168e8d6a3b2de6f8

    • \??\Volume{990d5e2d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{78c78d63-25f1-41df-a135-062ffd0efd9c}_OnDiskSnapshotProp

      Filesize

      5KB

      MD5

      741610d627de1207ec8adcb5f56db952

      SHA1

      03354e923885bf05fe62efc97436454132e54372

      SHA256

      6e122d57bbe5dc47ebaac1f0ced342d36e925241458dbf7684ffa1e324fa9015

      SHA512

      a9c08e9434065c4a695d2c7d7af8f96b3dc3217c3bd5a95767133eea76bce6a6fda78737e7975cea790f49a28c2fe0eea6e0df6366dfae145a4c3789088cf332

    • memory/3332-229-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/3924-233-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/3924-235-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/3924-248-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-234-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-236-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-238-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-241-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-243-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-245-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-247-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-249-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/4444-251-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB

    • memory/5072-223-0x0000000000BB0000-0x00000000017F2000-memory.dmp

      Filesize

      12.3MB