Analysis

  • max time kernel
    71s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2023 11:58

General

  • Target

    cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe

  • Size

    1.5MB

  • MD5

    721740f1413193e8cbc2bc5072beada7

  • SHA1

    943cad4421ddd671c65231dd01f34c5590afd5d2

  • SHA256

    cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0

  • SHA512

    4682774873438a2ac9bb05629a6d3124abcd93741381d053cbfdf64266c6cd74c0c58d7f3122040a1c3a0f09d12bbd98dbe2beb90b14e177b245cb02ec26f5cc

  • SSDEEP

    24576:7JHa6PX0VhuxwQR+6CKOmi6qZsokbbbFXj+4Xnrsjp9gawa0Stirk2BK5IoW6g1S:9JkVh76CbmdqxIbbdC4XrsjpBwaFmnJM

Malware Config

Signatures

  • Generic Chinese Botnet

    A botnet originating from China which is currently unnamed publicly.

  • Chinese Botnet payload 2 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe
    "C:\Users\Admin\AppData\Local\Temp\cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Users\Admin\AppData\Local\Temp\._cache_cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c md C:\windowss64
        3⤵
          PID:328
        • C:\windowss64\computer.exe
          "C:\windowss64\computer.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2412
          • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Enumerates connected drives
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:1020
          • C:\ProgramData\Synaptics\Synaptics.exe
            "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
              "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:4424
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c md C:\windowss64
                6⤵
                  PID:4328
                • C:\windowss64\computer.exe
                  "C:\windowss64\computer.exe"
                  6⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:3940
                  • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
                    "C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"
                    7⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:4820
        • C:\ProgramData\Synaptics\Synaptics.exe
          "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4752
          • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
            "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:548
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c md C:\windowss64
              4⤵
                PID:2472
              • C:\windowss64\computer.exe
                "C:\windowss64\computer.exe"
                4⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:5104
                • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
                  "C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe"
                  5⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:4544
        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
          1⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2428

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        Query Registry

        4
        T1012

        System Information Discovery

        5
        T1082

        Peripheral Device Discovery

        1
        T1120

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Synaptics\Synaptics.exe
          Filesize

          1.5MB

          MD5

          721740f1413193e8cbc2bc5072beada7

          SHA1

          943cad4421ddd671c65231dd01f34c5590afd5d2

          SHA256

          cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0

          SHA512

          4682774873438a2ac9bb05629a6d3124abcd93741381d053cbfdf64266c6cd74c0c58d7f3122040a1c3a0f09d12bbd98dbe2beb90b14e177b245cb02ec26f5cc

        • C:\ProgramData\Synaptics\Synaptics.exe
          Filesize

          1.5MB

          MD5

          721740f1413193e8cbc2bc5072beada7

          SHA1

          943cad4421ddd671c65231dd01f34c5590afd5d2

          SHA256

          cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0

          SHA512

          4682774873438a2ac9bb05629a6d3124abcd93741381d053cbfdf64266c6cd74c0c58d7f3122040a1c3a0f09d12bbd98dbe2beb90b14e177b245cb02ec26f5cc

        • C:\ProgramData\Synaptics\Synaptics.exe
          Filesize

          1.5MB

          MD5

          721740f1413193e8cbc2bc5072beada7

          SHA1

          943cad4421ddd671c65231dd01f34c5590afd5d2

          SHA256

          cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0

          SHA512

          4682774873438a2ac9bb05629a6d3124abcd93741381d053cbfdf64266c6cd74c0c58d7f3122040a1c3a0f09d12bbd98dbe2beb90b14e177b245cb02ec26f5cc

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\GO3L93KT\exploror[1].exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_cdc95392f7aaf04457256258571c08966e093503028339eeeb586a3d1d2903e0.exe
          Filesize

          362KB

          MD5

          146301a1b80222c9892ab54e2a1ca5f8

          SHA1

          26d2a517a2419f2d6f035c4ea674d29f19e4ac35

          SHA256

          9679a5ede73e38c23204f7552cf1b84ddf3743d02782069d0baac86bed6907cd

          SHA512

          91d4a0bcc35ccaa2b34831ba876aff720d193f3d166cfd784a06fa9a5848ae8a962699a73fe4d3b48f343559a558c93d0d523de6a52edaccdf8a4f7ad8055e07

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\._cache_computer.exe
          Filesize

          400KB

          MD5

          20beeb0a82adcce3a58372804acc46be

          SHA1

          c579d9017d2c8298fe075ff5c05963901330e72a

          SHA256

          d1aaa7e7d31bf648c57f0c721d6f6ee2b17395b4e09d9d89a4f6dbd5dd706a8e

          SHA512

          7636912ba6323063cefb7fac5a6cff9e44a474e452a4d5d4f77ef88968266de184c68112e3667585e02e811781f51ee020e61ce820e3f9a38dcfdf30e6d522bd

        • C:\Users\Admin\AppData\Local\Temp\cBHA5EMF.xlsm
          Filesize

          17KB

          MD5

          e566fc53051035e1e6fd0ed1823de0f9

          SHA1

          00bc96c48b98676ecd67e81a6f1d7754e4156044

          SHA256

          8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

          SHA512

          a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

        • C:\windowss64\computer.exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • C:\windowss64\computer.exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • C:\windowss64\computer.exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • C:\windowss64\computer.exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • C:\windowss64\computer.exe
          Filesize

          1.1MB

          MD5

          be689578752179e22bf915dbcf4f7520

          SHA1

          e798e703bfb90707a2872b51da73f32af566aedb

          SHA256

          de8c1aa37dd523e0699a10be71185f7a8ac1cde972d04107068f49250ef7317e

          SHA512

          89c95b387e566dfaf3f6a4ab60ee6e24d2574dd3802458e4d8f15e4c44136ac54c5b3a53addc1d28748656320050ee735fa2e8e5c57cdfb53fbdddc6eb586da8

        • memory/328-1490-0x0000000000000000-mapping.dmp
        • memory/548-2858-0x0000000000000000-mapping.dmp
        • memory/1020-2864-0x0000000010000000-0x0000000010018000-memory.dmp
          Filesize

          96KB

        • memory/1020-2855-0x0000000000000000-mapping.dmp
        • memory/1472-2852-0x0000000010000000-0x0000000010018000-memory.dmp
          Filesize

          96KB

        • memory/1472-1487-0x0000000000000000-mapping.dmp
        • memory/2412-2847-0x0000000000000000-mapping.dmp
        • memory/2428-2872-0x00007FF87EF90000-0x00007FF87EFA0000-memory.dmp
          Filesize

          64KB

        • memory/2428-2869-0x00007FF87EF90000-0x00007FF87EFA0000-memory.dmp
          Filesize

          64KB

        • memory/2428-2903-0x00007FF87CE00000-0x00007FF87CE10000-memory.dmp
          Filesize

          64KB

        • memory/2428-2889-0x00007FF87CE00000-0x00007FF87CE10000-memory.dmp
          Filesize

          64KB

        • memory/2428-2875-0x00007FF87EF90000-0x00007FF87EFA0000-memory.dmp
          Filesize

          64KB

        • memory/2428-2874-0x00007FF87EF90000-0x00007FF87EFA0000-memory.dmp
          Filesize

          64KB

        • memory/2428-2871-0x00007FF87EF90000-0x00007FF87EFA0000-memory.dmp
          Filesize

          64KB

        • memory/2472-2861-0x0000000000000000-mapping.dmp
        • memory/3940-4250-0x0000000000000000-mapping.dmp
        • memory/4288-137-0x0000000077050000-0x00000000770CA000-memory.dmp
          Filesize

          488KB

        • memory/4288-133-0x0000000077150000-0x00000000772F3000-memory.dmp
          Filesize

          1.6MB

        • memory/4288-132-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-134-0x00000000752B0000-0x00000000754C5000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-1485-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-136-0x0000000076DE0000-0x0000000076F80000-memory.dmp
          Filesize

          1.6MB

        • memory/4288-1486-0x0000000002460000-0x0000000002560000-memory.dmp
          Filesize

          1024KB

        • memory/4288-1484-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-1494-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-1481-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-1482-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4288-1483-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4328-4248-0x0000000000000000-mapping.dmp
        • memory/4420-2862-0x0000000000000000-mapping.dmp
        • memory/4420-2879-0x0000000077050000-0x00000000770CA000-memory.dmp
          Filesize

          488KB

        • memory/4420-4263-0x0000000002550000-0x0000000002650000-memory.dmp
          Filesize

          1024KB

        • memory/4420-4242-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-2868-0x00000000752B0000-0x00000000754C5000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-4241-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-4240-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-2876-0x0000000076DE0000-0x0000000076F80000-memory.dmp
          Filesize

          1.6MB

        • memory/4420-4262-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-2867-0x0000000077150000-0x00000000772F3000-memory.dmp
          Filesize

          1.6MB

        • memory/4420-4245-0x0000000002550000-0x0000000002650000-memory.dmp
          Filesize

          1024KB

        • memory/4420-4118-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-4238-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4420-4239-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4424-4246-0x0000000000000000-mapping.dmp
        • memory/4544-2953-0x0000000000000000-mapping.dmp
        • memory/4752-1498-0x0000000076DE0000-0x0000000076F80000-memory.dmp
          Filesize

          1.6MB

        • memory/4752-2843-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-3876-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-3321-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-1491-0x0000000000000000-mapping.dmp
        • memory/4752-2851-0x00000000022B0000-0x00000000023B0000-memory.dmp
          Filesize

          1024KB

        • memory/4752-2850-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-2846-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-2845-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-2844-0x0000000000400000-0x0000000000620000-memory.dmp
          Filesize

          2.1MB

        • memory/4752-3878-0x00000000022B0000-0x00000000023B0000-memory.dmp
          Filesize

          1024KB

        • memory/4752-1499-0x0000000077050000-0x00000000770CA000-memory.dmp
          Filesize

          488KB

        • memory/4752-1495-0x0000000077150000-0x00000000772F3000-memory.dmp
          Filesize

          1.6MB

        • memory/4752-1496-0x00000000752B0000-0x00000000754C5000-memory.dmp
          Filesize

          2.1MB

        • memory/4820-4257-0x0000000000000000-mapping.dmp
        • memory/5104-2877-0x0000000000000000-mapping.dmp