Analysis

  • max time kernel
    73s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 12:03

General

  • Target

    4b62450e0d5c4baf54a6d2bf82640e18.exe

  • Size

    67KB

  • MD5

    4b62450e0d5c4baf54a6d2bf82640e18

  • SHA1

    c355bd0767be42aef88fbe4b33348ca767f9af11

  • SHA256

    3a4cfef0dd9bf37f93a93d978cc9c0a12fe4235d4d3e5507c7bf4777c5a33348

  • SHA512

    9036cd6b6225c268c30a68c659d52852159b3d0c7742bf664e7a7e76381a1fe45143832b1916f862034d03f18e04181973a207c3aa677ca42bb093afecadd897

  • SSDEEP

    1536:k7OE59Vyzrc8K3WgFtKhJP+tcrVOXKzaJThZfaKhQiSEKNJJ:yV5998K3WQ8fjEXKgZfnhfxuJ

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 23 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 61 IoCs
  • UPX packed file 62 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 64 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 30 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b62450e0d5c4baf54a6d2bf82640e18.exe
    "C:\Users\Admin\AppData\Local\Temp\4b62450e0d5c4baf54a6d2bf82640e18.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Drops file in Drivers directory
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2240
    • C:\Windows\SysWOW64\drivers\system32.exe
      C:\Windows\system32\drivers\system32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2108
    • C:\Windows\SysWOW64\drivers\Kazekage.exe
      C:\Windows\system32\drivers\Kazekage.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1772
    • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
      "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
      2⤵
        PID:868
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
        2⤵
          PID:3012
        • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
          2⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2864
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            3⤵
            • Runs ping.exe
            PID:1440
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            3⤵
            • Runs ping.exe
            PID:1596
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            3⤵
            • Runs ping.exe
            PID:2252
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            3⤵
            • Runs ping.exe
            PID:2536
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:1096
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Runs ping.exe
          • Suspicious use of SetWindowsHookEx
          PID:600
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:2760
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:1016
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:2440
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:1972
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1312
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2156
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:756
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1000
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1928
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1916
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:936
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:940
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1568
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:960
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1056
      • C:\Windows\SysWOW64\drivers\system32.exe
        C:\Windows\system32\drivers\system32.exe
        1⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2076
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:2948
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:2672
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:2044
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:1752
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:832
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1736
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2464
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2196
      • C:\Windows\SysWOW64\drivers\Kazekage.exe
        C:\Windows\system32\drivers\Kazekage.exe
        1⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1592
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:1828
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:2100
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:2676
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:476
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1080
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1444
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2808
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe"
        1⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops desktop.ini file(s)
        • Enumerates connected drives
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Sets desktop wallpaper using registry
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:1368
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:3052
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Runs ping.exe
          • Suspicious use of SetWindowsHookEx
          PID:3012
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:1076
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:540
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.rasasayang.com.my 65500
          2⤵
          • Runs ping.exe
          PID:2588
        • C:\Windows\SysWOW64\ping.exe
          ping -a -l www.duniasex.com 65500
          2⤵
          • Runs ping.exe
          PID:1080
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2032
      • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
        "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
        1⤵
          PID:600
        • C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe
          "C:\Windows\Fonts\Admin 8 - 1 - 2024\Gaara.exe"
          1⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Drops file in Drivers directory
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops desktop.ini file(s)
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2648
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            2⤵
            • Runs ping.exe
            PID:1536
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            2⤵
            • Runs ping.exe
            PID:2344
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.duniasex.com 65500
            2⤵
            • Runs ping.exe
            PID:2424
          • C:\Windows\SysWOW64\ping.exe
            ping -a -l www.rasasayang.com.my 65500
            2⤵
            • Runs ping.exe
            PID:1108
        • C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe
          "C:\Windows\Fonts\Admin 8 - 1 - 2024\smss.exe"
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2584
        • C:\Windows\system32\conhost.exe
          \??\C:\Windows\system32\conhost.exe "388075812159036114-1751460445917817022-309343870336559399-1359962182-1074611936"
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:868

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\Fonts\Admin 8 - 1 - 2024\csrss.exe

          Filesize

          67KB

          MD5

          4b62450e0d5c4baf54a6d2bf82640e18

          SHA1

          c355bd0767be42aef88fbe4b33348ca767f9af11

          SHA256

          3a4cfef0dd9bf37f93a93d978cc9c0a12fe4235d4d3e5507c7bf4777c5a33348

          SHA512

          9036cd6b6225c268c30a68c659d52852159b3d0c7742bf664e7a7e76381a1fe45143832b1916f862034d03f18e04181973a207c3aa677ca42bb093afecadd897

        • \Windows\Fonts\Admin 8 - 1 - 2024\smss.exe

          Filesize

          67KB

          MD5

          b1ddf017cfd6d99f890a551ad78a41f9

          SHA1

          f20e354307603f4dc4c9f2695610377fd6fc3722

          SHA256

          9a08364ebff54a748305c7e01232a4ddc6c566c153810468bac7c2359b634e77

          SHA512

          3ae83cf88f9b28b14fdcb2e99ceda2f074c5325b21a8c26b674c7eca7ebb4cb0bdb24d99e8a63ee74e11b2de646a1d2c1c5e2505316edd93be1addb843baedc8

        • memory/600-129-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/600-125-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/756-293-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/832-242-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/832-239-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/868-311-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/936-279-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/936-277-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/940-275-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/960-268-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/960-265-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1000-290-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1056-264-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1080-191-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1312-304-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1368-144-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1368-176-0x0000000000300000-0x000000000032A000-memory.dmp

          Filesize

          168KB

        • memory/1368-280-0x0000000000300000-0x000000000032A000-memory.dmp

          Filesize

          168KB

        • memory/1368-238-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1368-308-0x0000000000300000-0x000000000032A000-memory.dmp

          Filesize

          168KB

        • memory/1368-513-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1368-183-0x0000000000300000-0x000000000032A000-memory.dmp

          Filesize

          168KB

        • memory/1368-260-0x0000000000300000-0x000000000032A000-memory.dmp

          Filesize

          168KB

        • memory/1368-322-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1444-187-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1568-272-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1592-227-0x0000000000290000-0x00000000002BA000-memory.dmp

          Filesize

          168KB

        • memory/1592-269-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1592-200-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1592-323-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1736-237-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1736-235-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1772-314-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1916-284-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/1928-287-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2032-135-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2032-136-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2076-247-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2076-281-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2076-324-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2076-261-0x00000000004B0000-0x00000000004DA000-memory.dmp

          Filesize

          168KB

        • memory/2108-317-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2156-294-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2156-297-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2196-229-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2196-228-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2240-32-0x00000000025C0000-0x00000000025EA000-memory.dmp

          Filesize

          168KB

        • memory/2240-0-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2240-319-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2240-437-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2240-331-0x00000000025C0000-0x00000000025EA000-memory.dmp

          Filesize

          168KB

        • memory/2240-134-0x00000000025C0000-0x00000000025EA000-memory.dmp

          Filesize

          168KB

        • memory/2240-132-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2240-37-0x00000000025C0000-0x00000000025EA000-memory.dmp

          Filesize

          168KB

        • memory/2464-232-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2584-80-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2648-92-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2648-225-0x0000000000480000-0x00000000004AA000-memory.dmp

          Filesize

          168KB

        • memory/2648-444-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2648-124-0x0000000000480000-0x00000000004AA000-memory.dmp

          Filesize

          168KB

        • memory/2648-199-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2648-233-0x0000000000480000-0x00000000004AA000-memory.dmp

          Filesize

          168KB

        • memory/2648-321-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2808-177-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2808-180-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2864-174-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2864-318-0x00000000003B0000-0x00000000003DA000-memory.dmp

          Filesize

          168KB

        • memory/2864-320-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2864-83-0x00000000003B0000-0x00000000003DA000-memory.dmp

          Filesize

          168KB

        • memory/2864-438-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/2864-89-0x00000000003B0000-0x00000000003DA000-memory.dmp

          Filesize

          168KB

        • memory/2864-298-0x00000000003B0000-0x00000000003DA000-memory.dmp

          Filesize

          168KB

        • memory/2864-40-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB

        • memory/3012-307-0x0000000000400000-0x000000000042A000-memory.dmp

          Filesize

          168KB