Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-02-2023 06:18

General

  • Target

    c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2.exe

  • Size

    7KB

  • MD5

    2b53f2a5d7af79552a63a22f990e31ea

  • SHA1

    2887d0882645bab0296a5b1ee3eab11b45549533

  • SHA256

    c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2

  • SHA512

    e641ca2d1feb0717a9c5b4fad5a3c0c4e160b95d45dc4b8f06053dc20405dbfbb9f43a4aecef7194e9058542db8f38b2d98a2e44d895768519cf82ef2e065d7d

  • SSDEEP

    96:Ot5wsUHE3mr2/CnA3NBG7ILPzLA+95Gd8sY1C16yt3kh0zttKpHR5q9jYzNt:OYHExCvsL9kOstUh0ztIHPr

Malware Config

Signatures

  • Detect PureCrypter injector 4 IoCs
  • Detect rhadamanthys stealer shellcode 2 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2.exe
    "C:\Users\Admin\AppData\Local\Temp\c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA3AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
    • C:\Users\Admin\AppData\Local\Temp\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
      "C:\Users\Admin\AppData\Local\Temp\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA3AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:656
      • C:\Users\Admin\AppData\Local\Temp\Csjqumzilnpdrwediqb.exe
        "C:\Users\Admin\AppData\Local\Temp\Csjqumzilnpdrwediqb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:516
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA3AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4888
        • C:\Users\Admin\AppData\Local\Temp\Jauqhbxqtwartgau.exe
          "C:\Users\Admin\AppData\Local\Temp\Jauqhbxqtwartgau.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA3AA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4368
    • C:\Users\Admin\AppData\Local\Temp\c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2.exe
      C:\Users\Admin\AppData\Local\Temp\c0669e66ee76b460bb9e7302e2f8f613242c91270115059118854a35977b22c2.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Windows\system32\rundll32.exe
        "C:\Users\Admin\AppData\Roaming\vcredist_e573e03.dll",Options_RunDLL 0600cc00-0000-0440-0d5a-a726e796a263
        3⤵
        • Loads dropped DLL
        PID:1812
  • C:\Users\Admin\AppData\Roaming\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    C:\Users\Admin\AppData\Roaming\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA3AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4736

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe.log
    Filesize

    2KB

    MD5

    c0ef7b616bebd139d7c8c28a77c7a817

    SHA1

    c5f50d72a96e5425a6289f593600d91ad10644af

    SHA256

    06a2e33ee8293f4a67cf68e4611dc6544347548ea8483bcd8f050412b27888a0

    SHA512

    42588d0c661c8c5f096ff4d2ae118259a06a37ad61bdff8bbb5eeae7f276bbdf5ca3513495021814a535ea0a1f5276131f82dd10e69aae2148cbe41f15e6736b

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
    Filesize

    3KB

    MD5

    56efdb5a0f10b5eece165de4f8c9d799

    SHA1

    fa5de7ca343b018c3bfeab692545eb544c244e16

    SHA256

    6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

    SHA512

    91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    45KB

    MD5

    5f640bd48e2547b4c1a7421f080f815f

    SHA1

    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

    SHA256

    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

    SHA512

    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
    Filesize

    45KB

    MD5

    68aeda392ecfd9eefcc4222a57b12195

    SHA1

    cb850f1870390946364e3c9def48314f1b10ed7b

    SHA256

    455f02d1ec404a62ae01b32496fac1b872dca65c1353aacc0dcc357007add833

    SHA512

    7c76e453de0da80526f2785337f6faab09c27af73a7f9912c2048ef9152ed640963fed58a99d213fa7250542b13a54cf119a79f97d1c84621e9559f0c8a6bb3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    16KB

    MD5

    e0f34203f93b41b21c15e93f4b778734

    SHA1

    13b8ebd579cfcab176011e611c2db888c7363e9c

    SHA256

    0a68ef49562339deea190cbc94c26cc8ab743373a0959433f9cec236609ef97a

    SHA512

    2dbc402a66555e932eef9d29a8579141fa71820e99f71cb103ed51efd44bf86c952549a0359584dc90bc1a4d5553e48fdbbe4557d6383cd87db65c308104c165

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    4aac5005e69d65e7bc5560a2af4adb57

    SHA1

    887bf8828f73c74516c0a3d3e1762122ceb86194

    SHA256

    2d13a675fa83d925324551e6cb003ffa3d204413a3ea828283c1b07a897f4a56

    SHA512

    222d98d91ee67558d2fee5577025b652e7c74164803a13376918fe96dd70c4c74a5f88271ef1d14ea81cb4c9c028fcb9c26074d91183ff2b5016c4f5e3e1b15d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    Filesize

    1KB

    MD5

    d8608e8678a04dc06c2d9b7c130a9340

    SHA1

    194117f44435df77269848a200e2b3619263b7fa

    SHA256

    70d4f39a1418d6376e34275569b36e9f2ae66fa3bf7cd808aa7c7097aece8f4f

    SHA512

    b2c2308f2b74b3812be6462ed2bc42b84c3512496688e24b7b2061b496767675b9463bb331cbccf66e2ba7d2ac23553830a15433dc82aa820f54a781af5b9a91

  • C:\Users\Admin\AppData\Local\Temp\Csjqumzilnpdrwediqb.exe
    Filesize

    7KB

    MD5

    31c1341f57f489cd5f4adb1644fbd464

    SHA1

    c983f60978b2d8bfd3cbae72a475e0fe1c338c7f

    SHA256

    14869c455b59cc7183050621ee40bebb90f4f012d831e25462f57bb8fe6e3114

    SHA512

    d535047d1f61dcec67801ec39b24e4ce1c20145da6c92925fd355c1b9317f56e81f83221ef6a71133efd2efaa9cc8164b39a828f363fe761e64ed5238ec9f2e8

  • C:\Users\Admin\AppData\Local\Temp\Csjqumzilnpdrwediqb.exe
    Filesize

    7KB

    MD5

    31c1341f57f489cd5f4adb1644fbd464

    SHA1

    c983f60978b2d8bfd3cbae72a475e0fe1c338c7f

    SHA256

    14869c455b59cc7183050621ee40bebb90f4f012d831e25462f57bb8fe6e3114

    SHA512

    d535047d1f61dcec67801ec39b24e4ce1c20145da6c92925fd355c1b9317f56e81f83221ef6a71133efd2efaa9cc8164b39a828f363fe761e64ed5238ec9f2e8

  • C:\Users\Admin\AppData\Local\Temp\Jauqhbxqtwartgau.exe
    Filesize

    7KB

    MD5

    7640a01e18b3cf2bdca011fcf79f58b7

    SHA1

    0aa8213a2268294f66737b4d4d729c2ca979bca1

    SHA256

    8a5a96871867b0f721bcfbfc7f5cdc66a9e2b655a4ec4c19c87043c9a0f48f8d

    SHA512

    767958a1dd6d8dfd085b65466a59f7d22c782bac37877fae76a617dc7b4d5036cfdf5921bd7bb54b46380b92cb79d9d547ab82455990cdea64f8205b7a479253

  • C:\Users\Admin\AppData\Local\Temp\Jauqhbxqtwartgau.exe
    Filesize

    7KB

    MD5

    7640a01e18b3cf2bdca011fcf79f58b7

    SHA1

    0aa8213a2268294f66737b4d4d729c2ca979bca1

    SHA256

    8a5a96871867b0f721bcfbfc7f5cdc66a9e2b655a4ec4c19c87043c9a0f48f8d

    SHA512

    767958a1dd6d8dfd085b65466a59f7d22c782bac37877fae76a617dc7b4d5036cfdf5921bd7bb54b46380b92cb79d9d547ab82455990cdea64f8205b7a479253

  • C:\Users\Admin\AppData\Local\Temp\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    Filesize

    7KB

    MD5

    346cc3d01aaacc93da6594178682c0e5

    SHA1

    f024459b168a0b0278c774a1536969ed0da91293

    SHA256

    620ecf1795009bc3d20a4890ef520bf4590c43c4963bc57597fbe08487a6ad74

    SHA512

    7002d79bacca298ee0f9bd24ed4d562f941326a40e67d4dffceba18017c6358c96abc92f289ab6a36311ebf4244f51d8f1557ac11c15910b689eddf7d6610037

  • C:\Users\Admin\AppData\Local\Temp\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    Filesize

    7KB

    MD5

    346cc3d01aaacc93da6594178682c0e5

    SHA1

    f024459b168a0b0278c774a1536969ed0da91293

    SHA256

    620ecf1795009bc3d20a4890ef520bf4590c43c4963bc57597fbe08487a6ad74

    SHA512

    7002d79bacca298ee0f9bd24ed4d562f941326a40e67d4dffceba18017c6358c96abc92f289ab6a36311ebf4244f51d8f1557ac11c15910b689eddf7d6610037

  • C:\Users\Admin\AppData\Roaming\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    Filesize

    7KB

    MD5

    346cc3d01aaacc93da6594178682c0e5

    SHA1

    f024459b168a0b0278c774a1536969ed0da91293

    SHA256

    620ecf1795009bc3d20a4890ef520bf4590c43c4963bc57597fbe08487a6ad74

    SHA512

    7002d79bacca298ee0f9bd24ed4d562f941326a40e67d4dffceba18017c6358c96abc92f289ab6a36311ebf4244f51d8f1557ac11c15910b689eddf7d6610037

  • C:\Users\Admin\AppData\Roaming\Mjhdfovnvvxxdbhmskhidkquphbiaw.exe
    Filesize

    7KB

    MD5

    346cc3d01aaacc93da6594178682c0e5

    SHA1

    f024459b168a0b0278c774a1536969ed0da91293

    SHA256

    620ecf1795009bc3d20a4890ef520bf4590c43c4963bc57597fbe08487a6ad74

    SHA512

    7002d79bacca298ee0f9bd24ed4d562f941326a40e67d4dffceba18017c6358c96abc92f289ab6a36311ebf4244f51d8f1557ac11c15910b689eddf7d6610037

  • C:\Users\Admin\AppData\Roaming\vcredist_e573e03.dll
    Filesize

    52KB

    MD5

    b562ce6be5a1cd98914b18182bfcac4d

    SHA1

    feeea675f8fd51c295b9e670615762e1c11a36de

    SHA256

    0b11454d1b63358a4ee6e7c4cf02a9cf4ee92cbc75e808c42696fa1d22cf1ca5

    SHA512

    b28b92a99e1c7489d42e03d153e67159eaece0a5daedc74093887ca2b0cdfb3d423cc678a29a35687dc1325773ee9f3118b84566a4db5c85d50819456ee0e245

  • \Users\Admin\AppData\Roaming\vcredist_e573e03.dll
    Filesize

    52KB

    MD5

    b562ce6be5a1cd98914b18182bfcac4d

    SHA1

    feeea675f8fd51c295b9e670615762e1c11a36de

    SHA256

    0b11454d1b63358a4ee6e7c4cf02a9cf4ee92cbc75e808c42696fa1d22cf1ca5

    SHA512

    b28b92a99e1c7489d42e03d153e67159eaece0a5daedc74093887ca2b0cdfb3d423cc678a29a35687dc1325773ee9f3118b84566a4db5c85d50819456ee0e245

  • memory/516-417-0x000002551A670000-0x000002551A6D2000-memory.dmp
    Filesize

    392KB

  • memory/516-369-0x0000000000000000-mapping.dmp
  • memory/516-372-0x000002557F860000-0x000002557F866000-memory.dmp
    Filesize

    24KB

  • memory/516-377-0x0000025519F90000-0x000002551A218000-memory.dmp
    Filesize

    2.5MB

  • memory/516-418-0x000002551A6E0000-0x000002551A706000-memory.dmp
    Filesize

    152KB

  • memory/516-419-0x000002551AEB0000-0x000002551AED2000-memory.dmp
    Filesize

    136KB

  • memory/516-421-0x000002550149A000-0x000002550149F000-memory.dmp
    Filesize

    20KB

  • memory/656-355-0x000001C6AD5C0000-0x000001C6AD636000-memory.dmp
    Filesize

    472KB

  • memory/656-346-0x0000000000000000-mapping.dmp
  • memory/1812-363-0x0000000000000000-mapping.dmp
  • memory/2688-179-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-293-0x00000000082D0000-0x00000000087CE000-memory.dmp
    Filesize

    5.0MB

  • memory/2688-144-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-145-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-146-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-147-0x0000000000650000-0x0000000000658000-memory.dmp
    Filesize

    32KB

  • memory/2688-148-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-149-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-150-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-151-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-152-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-153-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-154-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-155-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-156-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-157-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-158-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-159-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-160-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-161-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-162-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-163-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-164-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-165-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-166-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-167-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-168-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-169-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-170-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-171-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-172-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-173-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-174-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-175-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-176-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-177-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-178-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-115-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-186-0x00000000071D0000-0x000000000744E000-memory.dmp
    Filesize

    2.5MB

  • memory/2688-187-0x0000000007590000-0x00000000075B2000-memory.dmp
    Filesize

    136KB

  • memory/2688-189-0x0000000007850000-0x0000000007BA0000-memory.dmp
    Filesize

    3.3MB

  • memory/2688-116-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-117-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-118-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-119-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-121-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-120-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-122-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-123-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-124-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-125-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-292-0x0000000005840000-0x00000000058D2000-memory.dmp
    Filesize

    584KB

  • memory/2688-142-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-126-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-143-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-298-0x00000000057A0000-0x0000000005802000-memory.dmp
    Filesize

    392KB

  • memory/2688-127-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-141-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-128-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-129-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-130-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-131-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-140-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-132-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-139-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-138-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-137-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-136-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-133-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-134-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/2688-135-0x00000000774C0000-0x000000007764E000-memory.dmp
    Filesize

    1.6MB

  • memory/3040-394-0x000002161EB00000-0x000002161EB4C000-memory.dmp
    Filesize

    304KB

  • memory/3040-297-0x0000021603A40000-0x0000021603A46000-memory.dmp
    Filesize

    24KB

  • memory/3040-395-0x000002161EB50000-0x000002161EBA4000-memory.dmp
    Filesize

    336KB

  • memory/3040-373-0x000002161E7B0000-0x000002161E862000-memory.dmp
    Filesize

    712KB

  • memory/3040-339-0x00000216056F0000-0x0000021605712000-memory.dmp
    Filesize

    136KB

  • memory/3040-337-0x000002161E070000-0x000002161E348000-memory.dmp
    Filesize

    2.8MB

  • memory/3040-374-0x000002161E860000-0x000002161E8D8000-memory.dmp
    Filesize

    480KB

  • memory/3040-375-0x000002161E950000-0x000002161E9EE000-memory.dmp
    Filesize

    632KB

  • memory/3040-376-0x000002161E450000-0x000002161E4A6000-memory.dmp
    Filesize

    344KB

  • memory/3040-294-0x0000000000000000-mapping.dmp
  • memory/3348-200-0x0000000000000000-mapping.dmp
  • memory/3348-241-0x0000000007940000-0x0000000007F68000-memory.dmp
    Filesize

    6.2MB

  • memory/3348-236-0x00000000051C0000-0x00000000051F6000-memory.dmp
    Filesize

    216KB

  • memory/3348-260-0x0000000007FE0000-0x0000000008046000-memory.dmp
    Filesize

    408KB

  • memory/3348-261-0x00000000081F0000-0x0000000008256000-memory.dmp
    Filesize

    408KB

  • memory/3348-281-0x00000000097D0000-0x00000000097EA000-memory.dmp
    Filesize

    104KB

  • memory/3348-264-0x00000000081D0000-0x00000000081EC000-memory.dmp
    Filesize

    112KB

  • memory/3348-280-0x000000000A0D0000-0x000000000A748000-memory.dmp
    Filesize

    6.5MB

  • memory/3348-269-0x0000000008920000-0x0000000008996000-memory.dmp
    Filesize

    472KB

  • memory/3348-265-0x0000000008B80000-0x0000000008BCB000-memory.dmp
    Filesize

    300KB

  • memory/3656-365-0x0000000000400000-0x0000000000437000-memory.dmp
    Filesize

    220KB

  • memory/3656-351-0x0000000000B70000-0x0000000000B8D000-memory.dmp
    Filesize

    116KB

  • memory/3656-336-0x0000000000400000-0x0000000000437000-memory.dmp
    Filesize

    220KB

  • memory/3656-300-0x000000000040531D-mapping.dmp
  • memory/3656-366-0x0000000000B70000-0x0000000000B8D000-memory.dmp
    Filesize

    116KB

  • memory/4368-422-0x0000000000000000-mapping.dmp
  • memory/4736-399-0x0000000000000000-mapping.dmp
  • memory/4876-413-0x0000000000000000-mapping.dmp
  • memory/4876-416-0x000002823B3E0000-0x000002823B3E6000-memory.dmp
    Filesize

    24KB

  • memory/4876-420-0x0000028255B10000-0x0000028255DF4000-memory.dmp
    Filesize

    2.9MB

  • memory/4888-378-0x0000000000000000-mapping.dmp