Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 01:17

General

  • Target

    a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe

  • Size

    2.2MB

  • MD5

    3dd16a69ae2efa70fbc2d6262cec8711

  • SHA1

    01e80986f14fa79285b60b702a4fdb3517f1bc9c

  • SHA256

    a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc

  • SHA512

    f6f4008ba7f25de05853411c21c2cba18e9426a9d7add3de4dc17d603a626c74d8988ba30f9d31aa8d4dacbc9fb5ba1cb9ff28e6af2ac0eeb6201a522ac995e4

  • SSDEEP

    49152:Luu30mRbTChxKCnFnQXBbrtgb/iQvu0UHOYy:LH0mR6hxvWbrtUTrUHOYy

Malware Config

Signatures

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • UPX dump on OEP (original entry point) 31 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 31 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\@AE16BC.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE16BC.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:536
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:876
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2580
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 876
                7⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:2588
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1716
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    PID:2480
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:2528
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
            PID:844
        • C:\Users\Admin\AppData\Local\Temp\a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe
          "C:\Users\Admin\AppData\Local\Temp\a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe"
          3⤵
          • Adds policy Run key to start application
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Modifies WinLogon
          • Drops autorun.inf file
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2688
          • C:\Windows\SysWOW64\KHATRA.exe
            C:\Windows\system32\KHATRA.exe
            4⤵
            • Adds policy Run key to start application
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies WinLogon
            • Drops autorun.inf file
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1084
            • C:\Windows\Xplorer.exe
              "C:\Windows\Xplorer.exe" /Windows
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: GetForegroundWindowSpam
              PID:1916
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /C AT /delete /yes
              5⤵
                PID:2592
                • C:\Windows\SysWOW64\at.exe
                  AT /delete /yes
                  6⤵
                    PID:2932
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                  5⤵
                    PID:2484
                    • C:\Windows\SysWOW64\at.exe
                      AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                      6⤵
                        PID:1740
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll
                      5⤵
                        PID:1648
                        • C:\Windows\SysWOW64\regsvr32.exe
                          RegSvr32 /S C:\Windows\system32\avphost.dll
                          6⤵
                            PID:1516
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /C netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                          5⤵
                            PID:1436
                            • C:\Windows\SysWOW64\netsh.exe
                              netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                              6⤵
                              • Modifies Windows Firewall
                              PID:2372
                        • C:\Windows\System\gHost.exe
                          "C:\Windows\System\gHost.exe" /Reproduce
                          4⤵
                          • Executes dropped EXE
                          • Enumerates connected drives
                          • Suspicious behavior: GetForegroundWindowSpam
                          PID:2620
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /C AT /delete /yes
                          4⤵
                            PID:1144
                            • C:\Windows\SysWOW64\at.exe
                              AT /delete /yes
                              5⤵
                                PID:1244
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                              4⤵
                                PID:1032
                                • C:\Windows\SysWOW64\at.exe
                                  AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\KHATRA.exe
                                  5⤵
                                    PID:1480
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /C RegSvr32 /S C:\Windows\system32\avphost.dll
                                  4⤵
                                    PID:1676
                                    • C:\Windows\SysWOW64\regsvr32.exe
                                      RegSvr32 /S C:\Windows\system32\avphost.dll
                                      5⤵
                                        PID:1592
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /C netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                                      4⤵
                                        PID:2368
                                        • C:\Windows\SysWOW64\netsh.exe
                                          netsh firewall add allowedprogram program=C:\Windows\system32\KHATRA.exe name=System
                                          5⤵
                                          • Modifies Windows Firewall
                                          PID:1744
                                • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
                                  "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
                                  1⤵
                                  • Drops file in System32 directory
                                  • Drops file in Windows directory
                                  • Modifies Internet Explorer settings
                                  • Modifies registry class
                                  • Suspicious behavior: AddClipboardFormatListener
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2756

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\(Empty).LNK

                                  Filesize

                                  1KB

                                  MD5

                                  630374ddc3c2234298e6e20491cdbad1

                                  SHA1

                                  e7139a9591afa87978853c414345092690e9e6c8

                                  SHA256

                                  415b3302ce6fc0a76d362b54680d4dd738c3038b30d5783a651dba9a964b5ad4

                                  SHA512

                                  3130357f45ef113ff3426babddc25ac0faebabbff711167c26757c20a8627fbd823f1e50a87619c897a378dddfe4750a8a93876676f7bc6329dec71f12933bfb

                                • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                                  Filesize

                                  240KB

                                  MD5

                                  84299c2e19c2b31c9bb377d032e72d2e

                                  SHA1

                                  c09b1da66a6ad98e9101111ca21540dc4228277a

                                  SHA256

                                  d59413b24c7c08bf4546b771a6ec36f4116033ab65339e46db08e281c9751b2b

                                  SHA512

                                  e847e55488f30af4729dac365f145b8b5ed925ca0e5e258d81ed1c5873df20a04da3ac007bb0f46d40e3e23546eb147c2d1694308e92ac25fb7e9051b0e3238b

                                • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                                  Filesize

                                  1KB

                                  MD5

                                  48dd6cae43ce26b992c35799fcd76898

                                  SHA1

                                  8e600544df0250da7d634599ce6ee50da11c0355

                                  SHA256

                                  7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                                  SHA512

                                  c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                                • C:\Users\Admin\AppData\Local\Temp\2952.tmp

                                  Filesize

                                  406B

                                  MD5

                                  37512bcc96b2c0c0cf0ad1ed8cfae5cd

                                  SHA1

                                  edf7f17ce28e1c4c82207cab8ca77f2056ea545c

                                  SHA256

                                  27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

                                  SHA512

                                  6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

                                • C:\Users\Admin\AppData\Local\Temp\tmp1D14.tmp

                                  Filesize

                                  120KB

                                  MD5

                                  f558c76b0376af9273717fa24d99ebbf

                                  SHA1

                                  f84bcece5c6138b62ef94e9d668cf26178ee14cc

                                  SHA256

                                  01631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a

                                  SHA512

                                  2092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

                                  Filesize

                                  172KB

                                  MD5

                                  daac1781c9d22f5743ade0cb41feaebf

                                  SHA1

                                  e2549eeeea42a6892b89d354498fcaa8ffd9cac4

                                  SHA256

                                  6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

                                  SHA512

                                  190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

                                • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

                                  Filesize

                                  129B

                                  MD5

                                  d1073c9b34d1bbd570928734aacff6a5

                                  SHA1

                                  78714e24e88d50e0da8da9d303bec65b2ee6d903

                                  SHA256

                                  b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

                                  SHA512

                                  4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

                                • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

                                  Filesize

                                  196B

                                  MD5

                                  761137d07c5276e224003addfc498635

                                  SHA1

                                  e69d3f147328fd8744b8802e6e240216f3b1a515

                                  SHA256

                                  9945de4c16d5510203a557f3686955a6c58137d9d9656c84fbfd8e3ad5584f3f

                                  SHA512

                                  bc8ed875786f8f9585ad434488deb7e280fc86c38d4b9cbc960e6897c3878e80a8c2b261f885e4ab86ff96859d98e1ffcab68f850d91f606b09f931376efdbfe

                                • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

                                  Filesize

                                  125B

                                  MD5

                                  19e2ee044b5f0ef952d2f864860ecb39

                                  SHA1

                                  a71194f8de6dce946fa62d2ff3cdf8d473d19ce0

                                  SHA256

                                  e14d87d489dbb49efbaa7af4b4183663d0399fc4a6e754ddf27215d697cb9ed2

                                  SHA512

                                  56f26852c929c025dc00f1c80a14c6dc4cb07ceb90bfdaf06a76dbd74cdf7e81f6decbc92be2b0bd5f0ca3468133e980ff922ce592b73356828dafc7467537df

                                • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

                                  Filesize

                                  102B

                                  MD5

                                  3ca08f080a7a28416774d80552d4aa08

                                  SHA1

                                  0b5f0ba641204b27adac4140fd45dce4390dbf24

                                  SHA256

                                  4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

                                  SHA512

                                  0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

                                • C:\Windows\SysWOW64\mscaps.exe

                                  Filesize

                                  200KB

                                  MD5

                                  78d3c8705f8baf7d34e6a6737d1cfa18

                                  SHA1

                                  9f09e248a29311dbeefae9d85937b13da042a010

                                  SHA256

                                  2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

                                  SHA512

                                  9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

                                • C:\Windows\inf\Autoplay.inF

                                  Filesize

                                  234B

                                  MD5

                                  7ae2f1a7ce729d91acfef43516e5a84c

                                  SHA1

                                  ebbc99c7e5ac5679de2881813257576ec980fb44

                                  SHA256

                                  43b2fee4fbe5b4a83ae32589d11c3f45ad1988dd5357f790ec708fdfd6709a98

                                  SHA512

                                  915b67d31a7034659360355cb00f9620bf9c64cc06660ea55e5fcba0096f1ac782ac7550f778c4874f63082820c03fbbf4dd05169b0de61a661a202f10a4eff9

                                • \Users\Admin\AppData\Local\Temp\@AE16BC.tmp.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  0333d72729b8430e448fed1d7337627c

                                  SHA1

                                  513ed07954962870f75de65765494b346cdc2906

                                  SHA256

                                  9727bb7c238ccd96f6a88dacf7a291fec2214bef1eb5694a8f311aae6a02b07b

                                  SHA512

                                  696cf6cf7395a5898208bba3bdad499fdb897e5448f00f2dfd10b213b71fab52b955367392f5970464ec74d6d4b602b112197b23245c559f5585272f47653061

                                • \Users\Admin\AppData\Local\Temp\a5e04fde7fc118e447c2cfd1e93aac7245f881c43d34d48e0a5d39c663b5e2cc.exe

                                  Filesize

                                  475KB

                                  MD5

                                  f76e712e7d4a7105beae26912839a54e

                                  SHA1

                                  4fdb2bdf9e0c71efc34a297b3f1eb9bdee227a69

                                  SHA256

                                  c25155bf317cd421d795762bb5c3d7737c8fdc3e4acf0a3e178117df15d47997

                                  SHA512

                                  7a428894a6162d47c9703ebb922436155c1795a547a69d2a23c4d5749393b2e28a3f1afcc96c21bb00ad20d6e570692a1a4525d9741e8e294d2c20a3cc8f129f

                                • \Users\Admin\AppData\Local\Temp\wtmps.exe

                                  Filesize

                                  276KB

                                  MD5

                                  75c1467042b38332d1ea0298f29fb592

                                  SHA1

                                  f92ea770c2ddb04cf0d20914578e4c482328f0f8

                                  SHA256

                                  3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

                                  SHA512

                                  5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

                                • \Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

                                  Filesize

                                  1.7MB

                                  MD5

                                  227933e32c0c7767d9d98699e472986e

                                  SHA1

                                  88465bd35f130c2957b30e70287dfe8ee822526c

                                  SHA256

                                  7f2945f692b9843ee961d2d66dc302ed18e0c88ee373e6f924d7de2c2130b0b0

                                  SHA512

                                  5fcdde81b310024e635c077ad6074e7361624a9912b81ff3e37b749dde4b8cdb6bbf74a5a5a1c43459f90d7c2e238b8cc07bf344cee27a2c325f0d69810b11d4

                                • \Users\Admin\AppData\Roaming\Temp\mydll.dll

                                  Filesize

                                  202KB

                                  MD5

                                  7ff15a4f092cd4a96055ba69f903e3e9

                                  SHA1

                                  a3d338a38c2b92f95129814973f59446668402a8

                                  SHA256

                                  1b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627

                                  SHA512

                                  4b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae

                                • memory/1084-529-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1084-299-0x00000000008D0000-0x000000000095D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1084-244-0x00000000003D0000-0x00000000003E0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1916-561-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-558-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-573-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-570-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-567-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-564-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-540-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-543-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-309-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-537-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-555-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-531-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-552-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-547-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/1916-534-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2576-23-0x0000000010000000-0x0000000010015000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/2588-354-0x0000000010000000-0x0000000010015000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/2620-559-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-553-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-538-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-544-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-535-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-548-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-532-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-565-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-574-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-556-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-349-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-571-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-568-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-562-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2620-541-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2652-14-0x0000000000A80000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2652-21-0x0000000000A80000-0x0000000000B0D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2688-195-0x0000000002670000-0x0000000002680000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2688-528-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2688-22-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2688-530-0x0000000000400000-0x000000000048D000-memory.dmp

                                  Filesize

                                  564KB

                                • memory/2756-403-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                  Filesize

                                  64KB