Analysis

  • max time kernel
    86s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 06:55

General

  • Target

    da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7N.exe

  • Size

    8.2MB

  • MD5

    20bc802eb3cadde78584e22316eb13d0

  • SHA1

    91ed8b5d8f9b3de96f7ba8feb8c6f2a2096d1d7b

  • SHA256

    da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7

  • SHA512

    4b20ab3d0066934ddf4cae46433c3400becbc178b92b4e0beeeb2e03a812d1fedbdfc2ee5eea89fba63fa6d14fa35875e294bed94ffea71235ad0a9795ff1a29

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNec7:V8e8e8f8e8e8+

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Warzone RAT payload 25 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • ASPack v2.12-2.42 25 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7N.exe
    "C:\Users\Admin\AppData\Local\Temp\da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7N.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7N.exe
      "C:\Users\Admin\AppData\Local\Temp\da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7N.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2888
      • \??\c:\windows\system\explorer.exe
        c:\windows\system\explorer.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2948
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2080
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2592
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 36
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:484
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe SE
            5⤵
              PID:948
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 948 -s 36
                6⤵
                • Program crash
                PID:2252
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
                PID:2792
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 36
                  6⤵
                  • Program crash
                  PID:1664
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                  PID:2576
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 36
                    6⤵
                    • Program crash
                    PID:1028
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                    PID:1936
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 36
                      6⤵
                      • Program crash
                      PID:796
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                      PID:2368
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 36
                        6⤵
                        • Program crash
                        PID:1776
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                        PID:372
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 36
                          6⤵
                          • Program crash
                          PID:2740
                    • C:\Windows\SysWOW64\diskperf.exe
                      "C:\Windows\SysWOW64\diskperf.exe"
                      4⤵
                        PID:804
                  • C:\Windows\SysWOW64\diskperf.exe
                    "C:\Windows\SysWOW64\diskperf.exe"
                    2⤵
                      PID:2840

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Chrome\StikyNot.exe

                    Filesize

                    8.2MB

                    MD5

                    20bc802eb3cadde78584e22316eb13d0

                    SHA1

                    91ed8b5d8f9b3de96f7ba8feb8c6f2a2096d1d7b

                    SHA256

                    da79254ae977647110f2aed5b96a32fbfcec4aa2d7a6a29d58582f8c642e21c7

                    SHA512

                    4b20ab3d0066934ddf4cae46433c3400becbc178b92b4e0beeeb2e03a812d1fedbdfc2ee5eea89fba63fa6d14fa35875e294bed94ffea71235ad0a9795ff1a29

                  • C:\Windows\system\explorer.exe

                    Filesize

                    8.2MB

                    MD5

                    b996a6fd59f5aef75c88294b2b1941f3

                    SHA1

                    160873a1a64d27e1226cae0955d5aa16f2c59ec0

                    SHA256

                    34670d708047299fa6f9ea331a002a92e29b3823bac364493f22cac82b0e9f44

                    SHA512

                    ff0b061c63e5813d0535568c8df51532103b3dc180fb5292c6aebc638305b1dd089241cc93d4e8bafea70ca82ae20be75241079b90798ab78ecb22583f35ad48

                  • C:\Windows\system\spoolsv.exe

                    Filesize

                    7.9MB

                    MD5

                    bcc0862eedd63cbbf2387aec306bef30

                    SHA1

                    7aba02b61339849b2e4bf217b86fa53607694e14

                    SHA256

                    4f5dd31714090347f506a92d7b0a04674b74fc9c5df50fc34e86e03e2f822b70

                    SHA512

                    0abd421fecaff2827b63998664337ff2b3aad5509d040b87f96c983e86b681229575637dcdba810d39b54498dfbd2ebc98e2cd8999ab08fab37590c0a07454c2

                  • C:\Windows\system\spoolsv.exe

                    Filesize

                    6.1MB

                    MD5

                    ad8e075529ceff7fdfa6b82b3d5374ae

                    SHA1

                    fe70613b535417858ec42b02bbba109a46c07a7c

                    SHA256

                    db5d4e547773ae431e452a19a9de4d4dd50533d91ab0d77a92f698bdfceeac64

                    SHA512

                    6635ffd6946850dd79a996f829671501a0b1c9ad87eff52bc9db7cdae72dbd8ac2a945c096c679914199f43a7fcd95bd0ce0fcd9315691b6f688f3965e0223fc

                  • C:\Windows\system\spoolsv.exe

                    Filesize

                    4.9MB

                    MD5

                    bcf6f9613139a7f42d4a71310dec79a0

                    SHA1

                    cd7524c8e554c51aa51cc5e0ef28df4de8e8c034

                    SHA256

                    54c3e7abc3a6d31461940b6afb62036fbd3e5454f45099288967100db31e653b

                    SHA512

                    4d393f732a9c4ff205488e2a84fe14d843b084290fcff4db1e0aef33a0065507a53ffdabbf7236061687f6db985da276eb67fecb99285b4f721f1e5f7627bd15

                  • C:\Windows\system\spoolsv.exe

                    Filesize

                    3.1MB

                    MD5

                    4bca45a5969fbde74fd99f23d764ebe9

                    SHA1

                    f831fc17079561f6c27a0584928d83d4db8ff99f

                    SHA256

                    9249d43a63ad1fc171ad6e3e07c824c5670e94d9b9ab7967c50a943827a20c22

                    SHA512

                    aad87496eab072f92f5940f9999a872fb344f521af3c22993401233254b9060366eabee983c71ebfb1915a9e94eec96b4712c4c4fba866ebbcac8deccbcbebd9

                  • \Windows\system\spoolsv.exe

                    Filesize

                    8.1MB

                    MD5

                    2ed4be4b3a6b031fac253b8db69bc834

                    SHA1

                    4871e2285fa2a936e48bac4b8256c6e595aa74cb

                    SHA256

                    fa1908f7bfba40718d7688f597477f07e3acc85ae7fb4c5e840763f051043d9e

                    SHA512

                    4935b7def5d4e77fca133ef0ee045ac55f3b88c6aec73247a519784e1fba5d107f20fe199bbdda206a25952856910dec9b91b6f0c926bbf7b7a00f72d8713323

                  • \Windows\system\spoolsv.exe

                    Filesize

                    7.6MB

                    MD5

                    cf99b13c3bc91b81187eeb4a8b5ad4c5

                    SHA1

                    593421d4e86fdc6d133f7f60cd09b4c0eb700066

                    SHA256

                    a12e2541a5e6ba8023556af7d01924307cef02ec61830ec398e3e4a8990b0e83

                    SHA512

                    acbce54964a19db7aec2c81273449dc897d24c35b69d2c8e8c41bb095684d366232edefa28f92b050c913956e0c8715b90fc83655fb21dd7c63a4992fba7e933

                  • \Windows\system\spoolsv.exe

                    Filesize

                    7.1MB

                    MD5

                    54c4c5d4040c03445a625fe1c892533c

                    SHA1

                    37d98e16e3df353bd058af24d257d9272b20e134

                    SHA256

                    257dbda065575129e471d6053dc5a0ed2f11118c3587c79e5a76df30d2b6c26d

                    SHA512

                    aee258229a7cd5cc6cf7986eb8365c9c3e325a1b2f06711abb1ac3ae46a6cf3bd5fdb04bf0d67bd5840db046eee607f0c6e866a030ae849c7b9015033fca36e9

                  • \Windows\system\spoolsv.exe

                    Filesize

                    7.4MB

                    MD5

                    cf66de887f516cd7c45762eb857714c0

                    SHA1

                    860de16273c914833c5ea164565b890c499d91b7

                    SHA256

                    bf1b0364664f98148158ebef33b718b170515f4c7068a3b95040fe8fd8aa571d

                    SHA512

                    13c1e1e12fd47a711bc5cd2fd1228532047fcfa0b711bafefb68d5c9342524d228a6553ad5ed3d77d98e356ccb8ad88024e05ab732800a3a8b1391a323ee5bb7

                  • \Windows\system\spoolsv.exe

                    Filesize

                    6.6MB

                    MD5

                    7e769307ed2ed27fcc01de312ba07ae4

                    SHA1

                    276356996c4b33eac6b4cb05810183dbce432c29

                    SHA256

                    2cf6bc2bd36caa78e672001f172165fecbe3ae0aa5c00bb4fc5fca8f2cea4ba1

                    SHA512

                    612de9b5cfefbeea10b4fa2d7457a35bcd8355057405903d51332898a6d8ec4a6188a78120985b4c0ecb37caa1e5e0a5b957308fdb74bbb288babdca42b518e0

                  • \Windows\system\spoolsv.exe

                    Filesize

                    6.6MB

                    MD5

                    2dd92809564e5be55e48b2294e55802f

                    SHA1

                    7c013f8e30d2d57ad42fca31c3118dcd1a5b0887

                    SHA256

                    dc02e0a85ae9cbf1e11922db402a2e1ed11af7de7aedd6691ce8654f2dae58ce

                    SHA512

                    1a8f5de500bbb89d730a1f71073bbf7f766cf44a422d68e29cbcb57afd00edaa67642a5b850aef8aab96ecb5dd6032205ed8d60f6d0dce360464db3f86061dcb

                  • \Windows\system\spoolsv.exe

                    Filesize

                    6.6MB

                    MD5

                    87c3a721030146bfd5d6f9ad4b91f269

                    SHA1

                    03fee2c6d46fe8c53d76859f0adc0c2ca6f5eaff

                    SHA256

                    d1d190a9e3eeace8bbcc44e68d595a2e4f5a3c4d6f0f87511d1c34b8c24d0c16

                    SHA512

                    9a83300e6a3372c3df98170d45a2e97d4426566ae8246adc3240d9d06c3792b05864e190ad07659dc5ffbed2acacc312549089a143e2a13ffd53aa97ff61f9bd

                  • \Windows\system\spoolsv.exe

                    Filesize

                    6.4MB

                    MD5

                    265055a4ed2241e91cedb12856648bfa

                    SHA1

                    8a3ab80e7fcaba1b1c55e759ce514e98d12c4a2c

                    SHA256

                    99c8958737143570940e70d3cb7f9884f402144735c28ae2cc1ecae20a443c5e

                    SHA512

                    1c49609d6dec4e21eedc3cb015993e1dd17096a0fc8250a651e66e7f52a8a14a564c4ec5d57c4465d467c91bf3b884e30e120b61df15612742d77f141e8eeadf

                  • \Windows\system\spoolsv.exe

                    Filesize

                    5.9MB

                    MD5

                    146049f8c3ca10222189ba446d70ed22

                    SHA1

                    a8ed054fec045e7020ffed4d4cc9cb6638b8fb7b

                    SHA256

                    9d4edf9c4def517c80017a3be08aab6acd96d684f0765ffeca0d66a832e9d8a8

                    SHA512

                    58fe3f069bee1940504af10ce27744cf5e73e3f341d17024f2a30c215a95974b375c22d97f89688676c104c4014479083e858ab544ebc840614b3b46ebff6f88

                  • \Windows\system\spoolsv.exe

                    Filesize

                    4.9MB

                    MD5

                    549fa7f2a04a966727d19e3fcdd4da05

                    SHA1

                    2bb859f4ee81a07e71d35c6c0b7ba53e67e10a21

                    SHA256

                    9807b923b5e74f4cfeb20d5aebc15c3003f158b376b50147280644332f586489

                    SHA512

                    a9487464e4b3c271cdd7845902a28833fcf17b537a2d4d2caf540122785bf6429b5e3b5ae0083b817f53a6bb6a5ac819eed6cda7e4467b9cc58fe85946840914

                  • \Windows\system\spoolsv.exe

                    Filesize

                    4.6MB

                    MD5

                    4734234853df5bb2c3bc178b33e4a429

                    SHA1

                    33a3b9d4b05edb35213730f26e14d914a0b9092f

                    SHA256

                    921508bbbecab1c655657e725192131e6197a1990844809e6c23654a3a27a9d5

                    SHA512

                    f6cc65693a1bf006f0b9ecd6e32fd2adc2af675b9ca0b09c2d43501f9c119131ade598ed3bf10eb61ee2f6c98092f4c2ab8988f389dde28bffe03c667d8fb84c

                  • \Windows\system\spoolsv.exe

                    Filesize

                    4.6MB

                    MD5

                    063bbc631f387142eaab772cc33b6556

                    SHA1

                    f9ff37a7125ea9d10d8aaaca5547f17ac6a3ada2

                    SHA256

                    21238163eea69cc3afdf6344d96756c7045820dfe0280add3fb4c59fa12dd8af

                    SHA512

                    27a361568544fb967fe80529344bf789c8e6cae9abd3c95ade1815773c5eccd34c4b05260c59558b80414775662f06fa624d08bd088a4132b001780d2194cdd4

                  • \Windows\system\spoolsv.exe

                    Filesize

                    5.1MB

                    MD5

                    b365fe676170f77e2d76fb4ab1d4b333

                    SHA1

                    01263f365c04d956eea749f391315dfdaf5bbace

                    SHA256

                    21932a5d763d09b1c1c97055e620e9ba8f4ad9541527a1414859d31147ffcb3a

                    SHA512

                    1f13477022f47c787ddc0b9764d52b6ded63b45bcd11cfea9670777fa2e27d2b524c52db12b3fd21686b9861823592ecb6f1100d162dbf8788a49ced211b134b

                  • \Windows\system\spoolsv.exe

                    Filesize

                    5.1MB

                    MD5

                    ae0a7ee4428711dd8be5eb17a376916b

                    SHA1

                    8e49e2d86f8404eb8ec48284f01abe12fac57dcf

                    SHA256

                    5cf1923abf605f4048cdf47fe0f38e419d90194a138f6fbdf42ac3007e037d8c

                    SHA512

                    d6fd98846dc71496211f0ad6f8adcc53e3c675f9ff5523b106f3fc4f31f382f1399e7591278bd499c907df9855803872acf695edd8b2d198183894d3352df283

                  • \Windows\system\spoolsv.exe

                    Filesize

                    4.5MB

                    MD5

                    a6e66eb7a90e87427db6112ab8c8ef44

                    SHA1

                    e1550ab6322131049c679093631ab8a7e01a131f

                    SHA256

                    69a6f676cb63195ccdc70e6224ca6aaec28d8b2bd48c4159f66ee63f43805a24

                    SHA512

                    55f92c4bf70dafcc8dbdd0494a34ffbbbd0cf007e299f11cde97c5d6406591f48960136cff1da607e7d3ae080afff0d7ad6b888958a5faf929dd12cf1ce4482a

                  • \Windows\system\spoolsv.exe

                    Filesize

                    2.9MB

                    MD5

                    738ff5c590d84f1d551730e1721d8c0e

                    SHA1

                    6650219fd1e4a4c5a6a07aaeafaae9d48b15bb37

                    SHA256

                    b85f72a232ee840935377bb3afbcb32236f59a6c9928e3eb9ca79acd42c32766

                    SHA512

                    13f68b5902db7b2017552d465fe4248f7182aabfa7d86b40dc17ff7549f79168996fd3cbb4625b2c5d84f12eb9e3a5064d3cfc0251438ed0d1ee63dce39b67a5

                  • \Windows\system\spoolsv.exe

                    Filesize

                    3.7MB

                    MD5

                    6edf857f3ac7d6aec9dd7fca2227f1d4

                    SHA1

                    9208682646d1a88fb6c2939375f02068f6ae6abc

                    SHA256

                    1305f4df8b6d84ab8f1b5974bfb33981c34579f21485cc28829c47169ea71d57

                    SHA512

                    6dacc4e6813e5c182c986e01dc4b8db194437cc30b783e12002c8916a22b7fed75aecfaa135df9bfdd5c566cc9153b719842d8afab5a3b736d4f081793478258

                  • \Windows\system\spoolsv.exe

                    Filesize

                    3.4MB

                    MD5

                    1c56d4a631066ffcb996fb9adc63b8c3

                    SHA1

                    2eaa1ec7d742b9c0c1598753391d9a93a91da06d

                    SHA256

                    1b5ad4223f7100f575e3444050b11ab5c66256a82cce416d4b5a120f1e6d8ed9

                    SHA512

                    ba5ed00ebdc78d89ec373daf610798e78c184abe2ea1747e2debf69ea953a07a4b355142271f995e209e6fbb744fd21f9668ffc91e8e77d14fda20f6f90881e0

                  • \Windows\system\spoolsv.exe

                    Filesize

                    8.2MB

                    MD5

                    ac972d5d888688bf94a24729f1cee1be

                    SHA1

                    4b17f708951dc9f743d030502071e97a9f712554

                    SHA256

                    3dd9865024657af6ef7a0c4f739192e82577c3e9af70c9070549c0587b1cd7f6

                    SHA512

                    baa9088f2ffe519e42004f97dcfce2367fc1a1022a40de7655632d52c1bd8ad079806d80baacb4b599b7db7089c7ee808f088753821acbcf7733bb0f1253da8c

                  • memory/948-135-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-6-0x0000000000220000-0x0000000000221000-memory.dmp

                    Filesize

                    4KB

                  • memory/1732-36-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-1-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-3-0x0000000000220000-0x0000000000221000-memory.dmp

                    Filesize

                    4KB

                  • memory/1732-0-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-2-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-22-0x0000000003310000-0x0000000003424000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1732-4-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1936-189-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2080-143-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2080-104-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2080-103-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2080-102-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2592-115-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2592-124-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-52-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-88-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-58-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-55-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-53-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2632-54-0x0000000000400000-0x0000000000514000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2840-37-0x0000000000400000-0x0000000000412000-memory.dmp

                    Filesize

                    72KB

                  • memory/2840-34-0x0000000000400000-0x0000000000412000-memory.dmp

                    Filesize

                    72KB

                  • memory/2840-31-0x0000000000400000-0x0000000000412000-memory.dmp

                    Filesize

                    72KB

                  • memory/2840-29-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2840-27-0x0000000000400000-0x0000000000412000-memory.dmp

                    Filesize

                    72KB

                  • memory/2888-12-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-14-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-10-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-26-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-45-0x00000000032F0000-0x0000000003404000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2888-57-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-23-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2888-51-0x00000000032F0000-0x0000000003404000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-116-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-132-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-152-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-134-0x0000000000400000-0x000000000043E000-memory.dmp

                    Filesize

                    248KB

                  • memory/2948-101-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-170-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-188-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/2948-213-0x00000000032C0000-0x00000000033D4000-memory.dmp

                    Filesize

                    1.1MB