Analysis

  • max time kernel
    2040s
  • max time network
    1850s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/09/2024, 01:27

General

  • Target

    HaxMods.exe

  • Size

    93KB

  • MD5

    89b417c2e4b949c8888d53ddf7cef561

  • SHA1

    c93f634f3b38888c203c482b1886a741ae4ab649

  • SHA256

    f038831b116966e298441b36162b5603837322726fa82d7e7fa8b4c20d8f7ff4

  • SHA512

    abde9907b47d54ba225271ceb753277879ced5b9f3893f4b81d3c0bb6de84f23d766eddf6f00c2802407c3e49f948448d6171c40cea64c2dd79a8c3cf6a875ed

  • SSDEEP

    1536:F2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+nPIWttZVx:FZv5PDwbjNrmAE+PIc/

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2OTg1MTgzMTc0NDU5Mzk5Mg.GR0WTi.6wJSWraeR-Rzl_I7fZ7aGCVXpAfAzHPpj4n9qM

  • server_id

    976996222277672961

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Indicator Removal: Clear Windows Event Logs 1 TTPs 4 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Abuse Elevation Control Mechanism: Bypass User Account Control 1 TTPs 1 IoCs

    UAC Bypass Attempt via SilentCleanup Task.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 25 IoCs
  • Drops file in System32 directory 13 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:640
    • C:\Windows\system32\dwm.exe
      "dwm.exe"
      2⤵
        PID:564
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{e4f3720f-32c7-42e5-b3e0-6e6205c31c8a}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x4 /state0:0xa39bd855 /state1:0x41c64e6d
        2⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2332
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:696
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:1004
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:544
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1084
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:1092
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                  PID:1164
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                  1⤵
                    PID:1184
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k netprofm -p -s netprofm
                    1⤵
                      PID:1264
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1300
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                      • Indicator Removal: Clear Windows Event Logs
                      • Drops file in Windows directory
                      PID:1428
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                      1⤵
                        PID:1468
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1492
                        • C:\Windows\system32\sihost.exe
                          sihost.exe
                          2⤵
                            PID:3064
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                          1⤵
                            PID:1532
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                            1⤵
                              PID:1544
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                              1⤵
                                PID:1708
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                1⤵
                                  PID:1744
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k NetworkService -p
                                  1⤵
                                    PID:1768
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                    1⤵
                                      PID:1828
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                      1⤵
                                        PID:1896
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                        1⤵
                                          PID:1904
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                          1⤵
                                            PID:1912
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                            1⤵
                                              PID:2032
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                              1⤵
                                                PID:1196
                                              • C:\Windows\System32\spoolsv.exe
                                                C:\Windows\System32\spoolsv.exe
                                                1⤵
                                                  PID:2092
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2224
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                  1⤵
                                                    PID:2372
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                    1⤵
                                                      PID:2508
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                      1⤵
                                                        PID:2516
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k NetworkService -p
                                                        1⤵
                                                        • Drops file in System32 directory
                                                        • Modifies data under HKEY_USERS
                                                        PID:2560
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                        1⤵
                                                          PID:2608
                                                        • C:\Windows\sysmon.exe
                                                          C:\Windows\sysmon.exe
                                                          1⤵
                                                            PID:2652
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                            1⤵
                                                              PID:2680
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                                PID:2696
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                1⤵
                                                                  PID:2708
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                  1⤵
                                                                    PID:1868
                                                                  • C:\Windows\system32\wbem\unsecapp.exe
                                                                    C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                    1⤵
                                                                      PID:3076
                                                                    • C:\Windows\Explorer.EXE
                                                                      C:\Windows\Explorer.EXE
                                                                      1⤵
                                                                      • Modifies Internet Explorer settings
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:3300
                                                                      • C:\Users\Admin\AppData\Local\Temp\HaxMods.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\HaxMods.exe"
                                                                        2⤵
                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                        • Sets desktop wallpaper using registry
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:2876
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          "powershell.exe" -Command Add-MpPreference -ExclusionPath "C:\"
                                                                          3⤵
                                                                          • Command and Scripting Interpreter: PowerShell
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3484
                                                                        • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                          "SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I
                                                                          3⤵
                                                                          • Abuse Elevation Control Mechanism: Bypass User Account Control
                                                                          PID:2260
                                                                        • C:\Windows\System32\shutdown.exe
                                                                          "C:\Windows\System32\shutdown.exe" /L
                                                                          3⤵
                                                                            PID:5072
                                                                            • C:\Windows\System32\Conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              4⤵
                                                                                PID:968
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                          1⤵
                                                                            PID:3432
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                            1⤵
                                                                              PID:3452
                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                              1⤵
                                                                                PID:3852
                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                1⤵
                                                                                  PID:3936
                                                                                • C:\Windows\system32\DllHost.exe
                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                  1⤵
                                                                                    PID:4000
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc
                                                                                    1⤵
                                                                                      PID:4040
                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                      C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                      1⤵
                                                                                        PID:4224
                                                                                      • C:\Windows\system32\svchost.exe
                                                                                        C:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc
                                                                                        1⤵
                                                                                          PID:4448
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                          1⤵
                                                                                            PID:960
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                            1⤵
                                                                                              PID:4840
                                                                                            • C:\Windows\System32\svchost.exe
                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                              1⤵
                                                                                                PID:2072
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:4436
                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                1⤵
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies data under HKEY_USERS
                                                                                                PID:1700
                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:764
                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                  1⤵
                                                                                                    PID:1336
                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                    1⤵
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:4236
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                    1⤵
                                                                                                      PID:2428
                                                                                                    • C:\Windows\System32\RuntimeBroker.exe
                                                                                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:1460
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                                                                                        1⤵
                                                                                                          PID:1736
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalService -p -s BthAvctpSvc
                                                                                                          1⤵
                                                                                                            PID:4668

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i25hlbm3.ubf.ps1

                                                                                                            Filesize

                                                                                                            60B

                                                                                                            MD5

                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                            SHA1

                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                            SHA256

                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                            SHA512

                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                                            Filesize

                                                                                                            338B

                                                                                                            MD5

                                                                                                            2f0a9a32ca60556919c974664a1f53ef

                                                                                                            SHA1

                                                                                                            79600f2bad0d953a1fcb6904fe6e7b60eb201d0f

                                                                                                            SHA256

                                                                                                            9c414ba3b6c767b3dc5b54053d53b5ca6baab7a79b084e4e33365a7a13e469b0

                                                                                                            SHA512

                                                                                                            3a1bfe32bf6ecd5ae6db636941824f4e5df748a487b6cd26b961588a8e0b4243729f2950a310aee249893f6618f688bbfbc24bfc7fdf24eb12c4a6d05365c65e

                                                                                                          • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                                            Filesize

                                                                                                            412B

                                                                                                            MD5

                                                                                                            8306684233cf3c8c96cfb967d0708402

                                                                                                            SHA1

                                                                                                            c7438166b703e0591363cadd866d462094fcc91f

                                                                                                            SHA256

                                                                                                            a8f94cf6ab8a0afaf60b59b0b70c6d071759bbdc3bf7c483f05e796f2ab392c7

                                                                                                            SHA512

                                                                                                            eb98dea43f2b9942d99f07aa1058dbeb5a9974df57ad881165f0f6358ad281786774ad6e7f310c000bdfe22ac7441d3e9d59e0600ff824ab7782e901e4c08b16

                                                                                                          • memory/544-59-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/544-58-0x0000021ABFCB0000-0x0000021ABFCDA000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/564-48-0x0000027AB7A60000-0x0000027AB7A8A000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/564-49-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/640-42-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/640-40-0x000001F0083D0000-0x000001F0083FA000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/640-38-0x000001F0083A0000-0x000001F0083C3000-memory.dmp

                                                                                                            Filesize

                                                                                                            140KB

                                                                                                          • memory/696-44-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/696-41-0x000001FACD200000-0x000001FACD22A000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/1004-55-0x0000025FA0F70000-0x0000025FA0F9A000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/1004-56-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1084-61-0x0000025C284C0000-0x0000025C284EA000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/1084-62-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1092-92-0x00007FF7DAA90000-0x00007FF7DAAA0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/1092-90-0x00000184346A0000-0x00000184346CA000-memory.dmp

                                                                                                            Filesize

                                                                                                            168KB

                                                                                                          • memory/2648-32-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                            Filesize

                                                                                                            256KB

                                                                                                          • memory/2648-33-0x00007FF81AA00000-0x00007FF81AC09000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                          • memory/2648-36-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                            Filesize

                                                                                                            256KB

                                                                                                          • memory/2648-34-0x00007FF819610000-0x00007FF8196CD000-memory.dmp

                                                                                                            Filesize

                                                                                                            756KB

                                                                                                          • memory/2648-29-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                            Filesize

                                                                                                            256KB

                                                                                                          • memory/2648-30-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                            Filesize

                                                                                                            256KB

                                                                                                          • memory/2648-31-0x0000000140000000-0x0000000140040000-memory.dmp

                                                                                                            Filesize

                                                                                                            256KB

                                                                                                          • memory/2876-27-0x00007FF819610000-0x00007FF8196CD000-memory.dmp

                                                                                                            Filesize

                                                                                                            756KB

                                                                                                          • memory/2876-266-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/2876-1-0x0000016038D80000-0x0000016038D9C000-memory.dmp

                                                                                                            Filesize

                                                                                                            112KB

                                                                                                          • memory/2876-322-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/2876-301-0x0000016054400000-0x00000160546CA000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.8MB

                                                                                                          • memory/2876-2-0x00000160534D0000-0x0000016053692000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.8MB

                                                                                                          • memory/2876-267-0x000001603AC20000-0x000001603AC2E000-memory.dmp

                                                                                                            Filesize

                                                                                                            56KB

                                                                                                          • memory/2876-6-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/2876-5-0x00007FFFF9AF3000-0x00007FFFF9AF5000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2876-4-0x0000016053CD0000-0x00000160541F8000-memory.dmp

                                                                                                            Filesize

                                                                                                            5.2MB

                                                                                                          • memory/2876-3-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/2876-25-0x0000016053450000-0x000001605348E000-memory.dmp

                                                                                                            Filesize

                                                                                                            248KB

                                                                                                          • memory/2876-35-0x00007FF819611000-0x00007FF81968E000-memory.dmp

                                                                                                            Filesize

                                                                                                            500KB

                                                                                                          • memory/2876-0-0x00007FFFF9AF3000-0x00007FFFF9AF5000-memory.dmp

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                          • memory/2876-26-0x00007FF81AA00000-0x00007FF81AC09000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.0MB

                                                                                                          • memory/2876-28-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/3484-24-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/3484-9-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/3484-10-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/3484-11-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB

                                                                                                          • memory/3484-12-0x000002E020B40000-0x000002E020B62000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/3484-21-0x00007FFFF9AF0000-0x00007FFFFA5B2000-memory.dmp

                                                                                                            Filesize

                                                                                                            10.8MB