Analysis

  • max time kernel
    132s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2024 10:46

General

  • Target

    bf864296d632a4f80ad03f65a0c5908d964bb3519d18e2444df296deb1a8b24f.exe

  • Size

    5.2MB

  • MD5

    386d04e063ab5bb7eb21863ab6ce6d8a

  • SHA1

    58e1ce124c0a38f900d703cb786869f05924ef02

  • SHA256

    bf864296d632a4f80ad03f65a0c5908d964bb3519d18e2444df296deb1a8b24f

  • SHA512

    a47ac301a0e4fc403a4855f5ee5c6f89a11e1a71e697e2dd2741f0006ceda0821adea721e36cbd6d9df4cb7772d25e35497c28a35b208e2a01076d3f3294cd31

  • SSDEEP

    98304:P1hAmoqJW0jB4vmdRQcYduvjhK4OQyyuz/21wH8LHd/F902scBcwucGeR7E:NemFM0jB4v+zfjhFO+mH8L9/F7fbucA

Malware Config

Extracted

Family

njrat

Version

im523

Botnet

ReZero

C2

web-authentication.gl.at.ply.gg:23352

Mutex

0bed19877875a0f3385bb55897b96af0

Attributes
  • reg_key

    0bed19877875a0f3385bb55897b96af0

  • splitter

    |'|'|

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • Detect Neshta payload 28 IoCs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Neshta family
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf864296d632a4f80ad03f65a0c5908d964bb3519d18e2444df296deb1a8b24f.exe
    "C:\Users\Admin\AppData\Local\Temp\bf864296d632a4f80ad03f65a0c5908d964bb3519d18e2444df296deb1a8b24f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\Server.exe
      "C:\Users\Admin\AppData\Local\Temp\Server.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Roaming\WIDGET~1.EXE"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Users\Admin\AppData\Roaming\WIDGET~1.EXE
          C:\Users\Admin\AppData\Roaming\WIDGET~1.EXE
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1672
    • C:\Users\Admin\AppData\Local\Temp\2.exe
      "C:\Users\Admin\AppData\Local\Temp\2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2576
    • C:\Users\Admin\AppData\Local\Temp\FatRat.exe
      "C:\Users\Admin\AppData\Local\Temp\FatRat.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\svchost.com
        "C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FatRat.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Users\Admin\AppData\Local\Temp\3582-490\FatRat.exe
          C:\Users\Admin\AppData\Local\Temp\3582-490\FatRat.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

    Filesize

    186KB

    MD5

    58b58875a50a0d8b5e7be7d6ac685164

    SHA1

    1e0b89c1b2585c76e758e9141b846ed4477b0662

    SHA256

    2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

    SHA512

    d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

  • C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

    Filesize

    1.1MB

    MD5

    566ed4f62fdc96f175afedd811fa0370

    SHA1

    d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

    SHA256

    e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

    SHA512

    cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

  • C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe

    Filesize

    422KB

    MD5

    0da2d682733a37ac0eff5886129e9192

    SHA1

    5c7def546e6e3a0fa55df37d7a0f9270ebc6119e

    SHA256

    ea67f9e673e395dce99a8e4ca5b755c4556ab7031e24f79762d6a59fbc8110fe

    SHA512

    1a9986d648f2fb77767bd267a0fa6a1a4c24f39a7a064ce3012a9110c9f087a2f367741d1039976d7848b72bece481b8597cb7acdc2ce72d710a17f7121ff2f6

  • C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE

    Filesize

    100KB

    MD5

    6a091285d13370abb4536604b5f2a043

    SHA1

    8bb4aad8cadbd3894c889de85e7d186369cf6ff1

    SHA256

    909205de592f50532f01b4ac7b573b891f7e6e596b44ff94187b1ba4bcc296bb

    SHA512

    9696e4f60a5b1166535ca8ca3fb495d718086463d1a12fa1facc08219ad5b918208ddd2a102f7955e29153b081e05985c4ae6e4302ab36d548bb62991a47db18

  • C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE

    Filesize

    2.4MB

    MD5

    a741183f8c4d83467c51abab1ff68d7b

    SHA1

    ddb4a6f3782c0f03f282c2bed765d7b065aadcc6

    SHA256

    78be3aeb507db7e4ee7468c6b9384ee0459deebd503e06bd4988c52247ecea24

    SHA512

    c15dbecc0754a662892ecaff4b9b6c1bad46f710d8e1b973f86eaee467444f8e5764b31ace8f5a9a5e936947cc4dcb97cb1b14a6930c1025f38a3544393b6b18

  • C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE

    Filesize

    859KB

    MD5

    02ee6a3424782531461fb2f10713d3c1

    SHA1

    b581a2c365d93ebb629e8363fd9f69afc673123f

    SHA256

    ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

    SHA512

    6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

  • C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE

    Filesize

    503KB

    MD5

    3f67da7e800cd5b4af2283a9d74d2808

    SHA1

    f9288d052b20a9f4527e5a0f87f4249f5e4440f7

    SHA256

    31c10320edb2de22f37faee36611558db83b78a9c3c71ea0ed13c8dce25bf711

    SHA512

    6a40f4629ddae102d8737e921328e95717274cea16eb5f23bff6a6627c6047d7f27e7f6eb5cb52f53152e326e53b6ee44d9a9ee8eca7534a2f62fa457ac3d4e3

  • C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

    Filesize

    195KB

    MD5

    6806fc8c89466f5d31a9338604c93755

    SHA1

    f20e64b9d1c63235321fcea364d315095196dc8c

    SHA256

    2398a5ccfc6c2444d711a9ae0bcf1d2f2547b73ce132e9dd08281413ce7434f8

    SHA512

    78ba9c5d64bd523d50af37ddc919d45e29e4c48108db75002d7693ad144a4822f1b45da3c571fd3c4b9619be7a35d66202e30adbc78203f3a6fa5bb781748af5

  • C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE

    Filesize

    433KB

    MD5

    c01a069ffe7075dba652a2e2e0672fd2

    SHA1

    36ff9b17d3a6093646a4427cd13a017d14a49120

    SHA256

    d47f4061dd98c1b701058b8f8c96c64613393fa59de6d3f79ad88768eb283519

    SHA512

    509732485f4d95dffb424b6d6c4672e7b203defa05393296b771c766b926e381dd88c0a8017a56269e953489bebe8cd3c32a9801f47fbc9bba57b3da13b5d4dc

  • C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

    Filesize

    715KB

    MD5

    3db4bf90dbae706c47d2323421600d28

    SHA1

    610e38d5e2e71b582ea2ac2309da9ea5b64999a3

    SHA256

    8ca4e66b53ca9f10fd589fc2e273077707b24e0f8223a143673125ce45b5e00c

    SHA512

    edb88cbf54f42a5eab6537972799acdd9ec034b45854fdca9f850111169021d2299683b61fe10302a5d590ca11c1388d1380fa1a1bd44507281e89b373222b8f

  • C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

    Filesize

    526KB

    MD5

    cc5020b193486a88f373bedca78e24c8

    SHA1

    61744a1675ce10ddd196129b49331d517d7da884

    SHA256

    e87936bb1f0794b7622f8ce5b88e4b57b2358c4e0d0fd87c5cd9fa03b8429e2a

    SHA512

    bc2c77a25ad9f25ac19d8216dafc5417513cb57b9984237a5589a0bb684fdac4540695fcfb0df150556823b191014c96b002e4234a779bd064d36166afeb09d2

  • C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

    Filesize

    714KB

    MD5

    3c86c25a76c1413747ae8851bead4bac

    SHA1

    9342be761a661f51d85fd49fa9b75818aa0c4851

    SHA256

    b7ff698e4395c9e682027bc710a529139dcc602d97e374fc294bcf5198073493

    SHA512

    e70376561100d6a4769bc91e4daa3c224ed39f8412391a5ee9b9cae83d08dd2229a25f9099f5336810a757d95b6e81faa30608f35d8761b1c4cc0f41313cb43f

  • C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    349c6f2f4e32553e8fea4d29772e40e6

    SHA1

    e2f7856aa519006f8cbc9943cc3fb34c4461932d

    SHA256

    7c4fd44a9cda339ac3e7fa93b0b2a24b1e0ac16996dbb19cfdcd6323170b1fd3

    SHA512

    0b9f9aafb1a682f9e5a5dccae0dc19e3cf21c5d2aa4df3e22311f5744255f668e9a1e11ee21f2656d9f45236c484e0b7b460a57db1c34f2d344bd4cbece42588

  • C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

    Filesize

    485KB

    MD5

    87f15006aea3b4433e226882a56f188d

    SHA1

    e3ad6beb8229af62b0824151dbf546c0506d4f65

    SHA256

    8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919

    SHA512

    b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

  • C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

    Filesize

    536KB

    MD5

    3e8de969e12cd5e6292489a12a9834b6

    SHA1

    285b89585a09ead4affa32ecaaa842bc51d53ad5

    SHA256

    7a25fc3b1ce0f1d06a84dd344c8f5a6c4604732f7d13a8aaad504c4376b305cf

    SHA512

    b14a5936181a1d8c0f966d969a049254238bf1eacdb1da952c2dc084d5d6dcd5d611d2d058d4c00d6384c20046deef5e74ea865c0062bb0761a391a1eaf1640e

  • C:\Users\Admin\AppData\Local\Temp\3582-490\2.exe

    Filesize

    45KB

    MD5

    ddb085c51c1d739d35e6cfb3f647b6a7

    SHA1

    309b857dc06c0e458a5b2207157f97bdbe033bbe

    SHA256

    f6ecd05109a7894fd71e26efb6a9c7f211682b026d28508af792abecce2322b5

    SHA512

    04f6b7ca78d4c2bb9270e07c774077d79e64b6703919bfa3215f27c022993ae7b110e1ea47fb9bf06e1d7b30e1626f0b4c476d2624cc2a657a073edf2865e121

  • C:\Users\Admin\AppData\Local\Temp\FatRat.exe

    Filesize

    112KB

    MD5

    618fba54db5ea661575520f4123e00d4

    SHA1

    ff2e63b913940ebf861ba675876d4f6ab5a3941d

    SHA256

    bfb6a2c92bf846643cb5964591cde4067d59ce0cb295bc7cfbdbabefad5ea2d5

    SHA512

    838773f4b14e9e91eef0e3af31d69e0ad727dd43745a5b7e54a8490f49af5fda58c347b371daca45398572a1d803ff03073fb906cfffa2091cb48573dd84040a

  • C:\Users\Admin\AppData\Local\Temp\Server.exe

    Filesize

    37KB

    MD5

    01ce791be97aa5a1746af78c8fe7ccf5

    SHA1

    688b851e079fa103a652cd1ae5c84d31eb9d143d

    SHA256

    fd425b904cc91842cfebc84882bcb75e181f5d647176dfa7dbd8b56fd1976028

    SHA512

    6f2d785842415383e4e1cd87519313bd7cfdd9612175fe8fb82ab75952d14ce4a3aebeb94eadecad28b4487338439296da8b277b49e93601fe2c0b730b6cbbe6

  • C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

    Filesize

    8B

    MD5

    130ae28ddb3a2b80fea43d51f3a425fa

    SHA1

    5246a8c6d712d934de30d38e2b17a4253c5eadf7

    SHA256

    4e704a726a84e12a5bd43437d152f59ec223e7c5bba4f8a56667ea7c5938a2e5

    SHA512

    3c83a7b9ee820afa34f9c648171ff980e9f6f5cc9d2c8fdfc1af09e8e6d121be8d0cd9c0e446a652ab6f4d5149f36448f9d6935b4ca354e99a8a5d476c0ceadc

  • C:\Windows\directx.sys

    Filesize

    45B

    MD5

    15db81b0c2dd1f0b88b93c2aebbbb392

    SHA1

    d9b43bd6e3c9c288ec4f9337e0e624b2186fd890

    SHA256

    00632b7a76b7174edb719f7c809f537eb36931a5d178b0bd5be538e111dcb500

    SHA512

    be595660289a2cec14772061b15bdc52a153a4ae7a76f9d7e841aad39c9133b4db2912aedecfc6b1a855b0cff05292134732243ff6ac4fde4762a40a3c9a01f9

  • C:\Windows\svchost.com

    Filesize

    40KB

    MD5

    36fd5e09c417c767a952b4609d73a54b

    SHA1

    299399c5a2403080a5bf67fb46faec210025b36d

    SHA256

    980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2

    SHA512

    1813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

    Filesize

    252KB

    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE

    Filesize

    130KB

    MD5

    7ce8bcabb035b3de517229dbe7c5e67d

    SHA1

    8e43cd79a7539d240e7645f64fd7f6e9e0f90ab9

    SHA256

    81a3a1dc3104973a100bf8d114b6be35da03767a0cbbaf925f970ffcbe5f217c

    SHA512

    be7fcd50b4f71b458ca001b7c019bf1169ec089d7a1ce05355134b11cbe75a5a29811f9efec803877aeb1a1d576ea2628926e0131361db23214275af6e89e80c

  • \Users\Admin\AppData\Local\Temp\2.exe

    Filesize

    86KB

    MD5

    d59c194ab2b0248d61ab9c659eba0fcb

    SHA1

    8bcad802416804c1c6d960904537cf8e58201b82

    SHA256

    f3ba3930941393350117de1fb68425db11ef4462a256ad5dbc8aae44b48fb8fd

    SHA512

    04d5955f101763576a930378682ba5ab1fef0c5a3bac3d8baac848544e2469dd6af6a81508d58beb0cb8ad6a0e8eaea740410f6534b26b46423e26bd79695f0a

  • \Users\Admin\AppData\Local\Temp\3582-490\FatRat.exe

    Filesize

    72KB

    MD5

    ccf360d4e7bb60abcae997f1929c44dd

    SHA1

    207dc16a638fb40f9cad4b18dd0ef83aa3fd2def

    SHA256

    0530f03b56c5a156c5057ba986548ddf87c1df0b5c9912313989d85c9ac23276

    SHA512

    b53eaef698fae41c1ab9be84f1a59d8564145061e03834e598db947cebaee9b9715fff48a33c76479b1a521e73850c77b370f4e371f8f829a58f7c69c2c372a4

  • memory/848-236-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/848-246-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1596-15-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1596-28-0x0000000000CB0000-0x0000000000CB1000-memory.dmp

    Filesize

    4KB

  • memory/1596-72-0x0000000000408000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/1596-41-0x0000000000400000-0x0000000000CA4000-memory.dmp

    Filesize

    8.6MB

  • memory/1596-44-0x0000000000400000-0x0000000000CA4000-memory.dmp

    Filesize

    8.6MB

  • memory/1596-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1596-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1596-5-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1596-6-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1596-8-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1596-10-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/1596-13-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/1596-0-0x0000000000408000-0x0000000000768000-memory.dmp

    Filesize

    3.4MB

  • memory/1596-18-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1596-20-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1596-23-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1596-25-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1596-76-0x0000000000400000-0x0000000000CA4000-memory.dmp

    Filesize

    8.6MB

  • memory/1596-30-0x0000000000CB0000-0x0000000000CB1000-memory.dmp

    Filesize

    4KB

  • memory/1596-31-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/1596-33-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/1596-35-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

    Filesize

    4KB

  • memory/1596-36-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/1596-38-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/1596-43-0x0000000000400000-0x0000000000CA4000-memory.dmp

    Filesize

    8.6MB

  • memory/1596-40-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

    Filesize

    4KB

  • memory/2000-237-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-235-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-239-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2180-243-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2576-238-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2576-242-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2576-234-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2788-64-0x00000000021C0000-0x0000000002200000-memory.dmp

    Filesize

    256KB