Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18-03-2023 08:11

General

  • Target

    69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00.exe

  • Size

    14KB

  • MD5

    20b40647e48a2d6e05bbc6b057abaeeb

  • SHA1

    99cbdc68e4410487021f871544cefe931ca811a9

  • SHA256

    69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00

  • SHA512

    0225af49ac50708ff50411243c1ceab8d37107ba931d27235539e06d72b6f63fe8ec2440334b091d8e90dace1bc3c032f9654ec138032857fa7feae8092d2f2b

  • SSDEEP

    192:xGsuh2IoMFW2sa4rYSgL2Zvb2s/92+wtuTwbKhsR2b85iHtQmHPL:xGsdP6A5rY9L2Zvb2sl2+wwoXKQmHP

Malware Config

Extracted

Family

purecrypter

C2

http://cleaning.homesecuritypc.com/packages/Yrirafgkx.png

http://cleaning.homesecuritypc.com/packages/Bhoewhjcalc.bmp

http://cleaning.homesecuritypc.com/packages/Qfold.png

http://cleaning.homesecuritypc.com/packages/Nkprcjqps.png

Signatures

  • Detect rhadamanthys stealer shellcode 4 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Executes dropped EXE 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00.exe
    "C:\Users\Admin\AppData\Local\Temp\69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
    • C:\Users\Admin\AppData\Local\Temp\Dqkpcelketyaphnwomaatunx.exe
      "C:\Users\Admin\AppData\Local\Temp\Dqkpcelketyaphnwomaatunx.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2876
      • C:\Users\Admin\AppData\Local\Temp\Ykffhlrbjhzxqnklzrbkjdn.exe
        "C:\Users\Admin\AppData\Local\Temp\Ykffhlrbjhzxqnklzrbkjdn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3744
        • C:\Users\Admin\AppData\Local\Temp\Mhdpncimdnevuhvhfnxvqkgnhuvifts.exe
          "C:\Users\Admin\AppData\Local\Temp\Mhdpncimdnevuhvhfnxvqkgnhuvifts.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3500
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4452
    • C:\Users\Admin\AppData\Local\Temp\69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00.exe
      C:\Users\Admin\AppData\Local\Temp\69a2806df93b940b5994427a85d50f9eb2094a2ff2f7563ec3d2da2894b05d00.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Windows\system32\dllhost.exe
        "C:\Windows\system32\dllhost.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • outlook_office_path
        • outlook_win_path
        PID:4808
  • C:\Users\Admin\AppData\Roaming\Dqkpcelketyaphnwomaatunx.exe
    C:\Users\Admin\AppData\Roaming\Dqkpcelketyaphnwomaatunx.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Dqkpcelketyaphnwomaatunx.exe.log

    Filesize

    2KB

    MD5

    9ae766d04145cfed0d6c1a833e92e9ff

    SHA1

    74a0223ec1d42689f618c375a4a13eb195167794

    SHA256

    ca4c25efd51cb26e86ec2b7db6b64f1a63709ac3092681035f1d61e72b4dbb99

    SHA512

    1cfbb0555a778fb79651123bbbce0aba92d21497c2630ed244892dbd6710fef8bdf8420548a85f34fae16d292c31705d68135f1907f64a0add1b67c0d85e4666

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    56efdb5a0f10b5eece165de4f8c9d799

    SHA1

    fa5de7ca343b018c3bfeab692545eb544c244e16

    SHA256

    6c4e3fefc4faa1876a72c0964373c5fa08d3ab074eec7b1313b3e8410b9cb108

    SHA512

    91e50779bbae7013c492ea48211d6b181175bfed38bf4b451925d5812e887c555528502316bbd4c4ab1f21693d77b700c44786429f88f60f7d92f21e46ea5ddc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    45KB

    MD5

    5f640bd48e2547b4c1a7421f080f815f

    SHA1

    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

    SHA256

    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

    SHA512

    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    45KB

    MD5

    68aeda392ecfd9eefcc4222a57b12195

    SHA1

    cb850f1870390946364e3c9def48314f1b10ed7b

    SHA256

    455f02d1ec404a62ae01b32496fac1b872dca65c1353aacc0dcc357007add833

    SHA512

    7c76e453de0da80526f2785337f6faab09c27af73a7f9912c2048ef9152ed640963fed58a99d213fa7250542b13a54cf119a79f97d1c84621e9559f0c8a6bb3b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    e2e4e48581cec3514ee4c8d7ec4277c0

    SHA1

    6de7ac644d535c09d7efe5749a0ede63fe87f46c

    SHA256

    0bbdd1a670be2925c2d51e46fc89631c57b39c897cd81a9e4fb7ce9b58349c81

    SHA512

    c0850fdbaa0591036edd0b829e927d6b4015a348db0f3afd18eae8050a60a79e94845b8be10c8595deaee8a8d1e75b87ecd4db990be34d864dd12cefa22ee886

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    d95093a0ad19c67939e0cd6e734fd564

    SHA1

    4bb1cbb7ba39c6a31567b6dbc71bc40a64eff2d1

    SHA256

    63eeb5d97d99ae4089da7d30b34124e5d870775c7972573f21f9ddf48421b490

    SHA512

    7820fbc2b76bf2ecd390f2d17828ceb8dc45f0807278e9710db3cc3004e031102e9e19e7ed4de35e0a551121359d957bb793bc1af95b201a19891df34f08f96c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    230f46b2540fecd6f2047fd5dc7d55ae

    SHA1

    d2a61b6288ac3e471b03c01f971d9dcbd6daa9c4

    SHA256

    b2b6b6a5e742712d84a7d649c14f024364848d489d9b32ee7120cdfe833c2995

    SHA512

    de9969ccce26fc58410e8de2a6d1e286a289f8d9440042f57afd82cf48f462b43afa2aff54309811bdebd65204bd024e013656539ba18c815617c567635bd2d1

  • C:\Users\Admin\AppData\Local\Temp\Dqkpcelketyaphnwomaatunx.exe

    Filesize

    14KB

    MD5

    fd1b04e19e69f34aa2ed18b3e8fed3fe

    SHA1

    609976c214b0c2b771a5a94da9d5dd82e4517ebe

    SHA256

    3401aaeca903e82618171626efa9dad5725196b50cd0f600b0116096f3c041d3

    SHA512

    a547a2d54437e8cbbd06f443267f02a427f3630faffa96bef2aa626f8287c2157b56a54495b7ceb615326d73a4178a0fd81e7335be27a10e74c19a8f37cd5022

  • C:\Users\Admin\AppData\Local\Temp\Dqkpcelketyaphnwomaatunx.exe

    Filesize

    14KB

    MD5

    fd1b04e19e69f34aa2ed18b3e8fed3fe

    SHA1

    609976c214b0c2b771a5a94da9d5dd82e4517ebe

    SHA256

    3401aaeca903e82618171626efa9dad5725196b50cd0f600b0116096f3c041d3

    SHA512

    a547a2d54437e8cbbd06f443267f02a427f3630faffa96bef2aa626f8287c2157b56a54495b7ceb615326d73a4178a0fd81e7335be27a10e74c19a8f37cd5022

  • C:\Users\Admin\AppData\Local\Temp\Mhdpncimdnevuhvhfnxvqkgnhuvifts.exe

    Filesize

    14KB

    MD5

    330bc6363b58d1438c398ead88a441cc

    SHA1

    46907539e7b16e49d33a75d81309341644198966

    SHA256

    e94c4516fa81dd0d00012d3d12598cf9693a279c6bd0f37e4856036b9e312573

    SHA512

    19242f10d32a15d117831aa1f014d4e7fa15e80e453e9c287118a9e80c26ad37e502bd5b41fdc44d06b79b5b229cc18d08c6f6686c7952cc705879e398ff17ee

  • C:\Users\Admin\AppData\Local\Temp\Mhdpncimdnevuhvhfnxvqkgnhuvifts.exe

    Filesize

    14KB

    MD5

    330bc6363b58d1438c398ead88a441cc

    SHA1

    46907539e7b16e49d33a75d81309341644198966

    SHA256

    e94c4516fa81dd0d00012d3d12598cf9693a279c6bd0f37e4856036b9e312573

    SHA512

    19242f10d32a15d117831aa1f014d4e7fa15e80e453e9c287118a9e80c26ad37e502bd5b41fdc44d06b79b5b229cc18d08c6f6686c7952cc705879e398ff17ee

  • C:\Users\Admin\AppData\Local\Temp\Ykffhlrbjhzxqnklzrbkjdn.exe

    Filesize

    14KB

    MD5

    00da2853640ff299de72e017e90469fc

    SHA1

    e7b7282b8ff81bfb61abf1933186119e7ecf595d

    SHA256

    b2bb077157619d28d66e5c4b9f5165b486e01d7eae58d2c3b8b370245bcec552

    SHA512

    96abff111820a8591ec08d495ba525bdb2a469739f8160d6c6d689c990e0cdda4f7e7d93e6ecc89034eb460ca7a946c4bf890a79f4539966884f16f36aeec851

  • C:\Users\Admin\AppData\Local\Temp\Ykffhlrbjhzxqnklzrbkjdn.exe

    Filesize

    14KB

    MD5

    00da2853640ff299de72e017e90469fc

    SHA1

    e7b7282b8ff81bfb61abf1933186119e7ecf595d

    SHA256

    b2bb077157619d28d66e5c4b9f5165b486e01d7eae58d2c3b8b370245bcec552

    SHA512

    96abff111820a8591ec08d495ba525bdb2a469739f8160d6c6d689c990e0cdda4f7e7d93e6ecc89034eb460ca7a946c4bf890a79f4539966884f16f36aeec851

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_twyeaput.vsf.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Roaming\Dqkpcelketyaphnwomaatunx.exe

    Filesize

    14KB

    MD5

    fd1b04e19e69f34aa2ed18b3e8fed3fe

    SHA1

    609976c214b0c2b771a5a94da9d5dd82e4517ebe

    SHA256

    3401aaeca903e82618171626efa9dad5725196b50cd0f600b0116096f3c041d3

    SHA512

    a547a2d54437e8cbbd06f443267f02a427f3630faffa96bef2aa626f8287c2157b56a54495b7ceb615326d73a4178a0fd81e7335be27a10e74c19a8f37cd5022

  • C:\Users\Admin\AppData\Roaming\Dqkpcelketyaphnwomaatunx.exe

    Filesize

    14KB

    MD5

    fd1b04e19e69f34aa2ed18b3e8fed3fe

    SHA1

    609976c214b0c2b771a5a94da9d5dd82e4517ebe

    SHA256

    3401aaeca903e82618171626efa9dad5725196b50cd0f600b0116096f3c041d3

    SHA512

    a547a2d54437e8cbbd06f443267f02a427f3630faffa96bef2aa626f8287c2157b56a54495b7ceb615326d73a4178a0fd81e7335be27a10e74c19a8f37cd5022

  • memory/1012-225-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1012-217-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

    Filesize

    112KB

  • memory/1012-216-0x0000000001040000-0x0000000001042000-memory.dmp

    Filesize

    8KB

  • memory/1012-215-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

    Filesize

    112KB

  • memory/1012-214-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

    Filesize

    112KB

  • memory/1012-209-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1012-219-0x0000000001040000-0x0000000001043000-memory.dmp

    Filesize

    12KB

  • memory/1012-171-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1012-176-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1012-226-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

    Filesize

    112KB

  • memory/1012-173-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1012-170-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/1112-1042-0x00000228C6DC0000-0x00000228C6DD0000-memory.dmp

    Filesize

    64KB

  • memory/1624-281-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-265-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-175-0x0000029F59430000-0x0000029F59455000-memory.dmp

    Filesize

    148KB

  • memory/1624-174-0x0000029F5AD30000-0x0000029F5AD6A000-memory.dmp

    Filesize

    232KB

  • memory/1624-259-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-177-0x0000029F734C0000-0x0000029F734D0000-memory.dmp

    Filesize

    64KB

  • memory/1624-178-0x0000029F734C0000-0x0000029F734D0000-memory.dmp

    Filesize

    64KB

  • memory/1624-179-0x0000029F73720000-0x0000029F738CA000-memory.dmp

    Filesize

    1.7MB

  • memory/1624-180-0x0000029F73A10000-0x0000029F73A32000-memory.dmp

    Filesize

    136KB

  • memory/1624-263-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-256-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-1012-0x0000029F74FC0000-0x0000029F75014000-memory.dmp

    Filesize

    336KB

  • memory/1624-253-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-251-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-1011-0x0000029F74F70000-0x0000029F74FBC000-memory.dmp

    Filesize

    304KB

  • memory/1624-210-0x0000029F734C0000-0x0000029F734D0000-memory.dmp

    Filesize

    64KB

  • memory/1624-211-0x0000029F734C0000-0x0000029F734D0000-memory.dmp

    Filesize

    64KB

  • memory/1624-1006-0x0000029F74E10000-0x0000029F74E66000-memory.dmp

    Filesize

    344KB

  • memory/1624-169-0x0000029F590E0000-0x0000029F590EA000-memory.dmp

    Filesize

    40KB

  • memory/1624-297-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-295-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-293-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-291-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-289-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-287-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-285-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-283-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-279-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-277-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-275-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-273-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-271-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-269-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-267-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-261-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-241-0x0000029F74D70000-0x0000029F74E0E000-memory.dmp

    Filesize

    632KB

  • memory/1624-239-0x0000029F74CF0000-0x0000029F74D68000-memory.dmp

    Filesize

    480KB

  • memory/1624-242-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-243-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-245-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-247-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/1624-249-0x0000029F74D70000-0x0000029F74E0A000-memory.dmp

    Filesize

    616KB

  • memory/2876-208-0x0000023430D70000-0x0000023430D80000-memory.dmp

    Filesize

    64KB

  • memory/2876-207-0x0000023430D70000-0x0000023430D80000-memory.dmp

    Filesize

    64KB

  • memory/2876-191-0x0000023433000000-0x0000023433076000-memory.dmp

    Filesize

    472KB

  • memory/2936-1018-0x0000015D796B0000-0x0000015D796C0000-memory.dmp

    Filesize

    64KB

  • memory/2936-1019-0x0000015D796B0000-0x0000015D796C0000-memory.dmp

    Filesize

    64KB

  • memory/3036-132-0x0000000006C60000-0x0000000007288000-memory.dmp

    Filesize

    6.2MB

  • memory/3036-156-0x0000000006620000-0x0000000006630000-memory.dmp

    Filesize

    64KB

  • memory/3036-157-0x0000000006620000-0x0000000006630000-memory.dmp

    Filesize

    64KB

  • memory/3036-131-0x00000000043C0000-0x00000000043F6000-memory.dmp

    Filesize

    216KB

  • memory/3036-133-0x0000000006B70000-0x0000000006BD6000-memory.dmp

    Filesize

    408KB

  • memory/3036-134-0x0000000006620000-0x0000000006630000-memory.dmp

    Filesize

    64KB

  • memory/3036-154-0x0000000008990000-0x00000000089AA000-memory.dmp

    Filesize

    104KB

  • memory/3036-153-0x00000000093F0000-0x0000000009A68000-memory.dmp

    Filesize

    6.5MB

  • memory/3036-138-0x0000000007BB0000-0x0000000007C26000-memory.dmp

    Filesize

    472KB

  • memory/3036-137-0x0000000007450000-0x000000000746C000-memory.dmp

    Filesize

    112KB

  • memory/3036-135-0x0000000007470000-0x00000000074D6000-memory.dmp

    Filesize

    408KB

  • memory/3036-136-0x0000000006620000-0x0000000006630000-memory.dmp

    Filesize

    64KB

  • memory/3744-473-0x00000251DD170000-0x00000251DD180000-memory.dmp

    Filesize

    64KB

  • memory/3744-1010-0x00000251DD170000-0x00000251DD180000-memory.dmp

    Filesize

    64KB

  • memory/3744-1009-0x00000251DD170000-0x00000251DD180000-memory.dmp

    Filesize

    64KB

  • memory/3744-477-0x00000251DD170000-0x00000251DD180000-memory.dmp

    Filesize

    64KB

  • memory/4080-127-0x0000000006880000-0x0000000006912000-memory.dmp

    Filesize

    584KB

  • memory/4080-120-0x0000000000770000-0x000000000077A000-memory.dmp

    Filesize

    40KB

  • memory/4080-121-0x0000000005040000-0x000000000508B000-memory.dmp

    Filesize

    300KB

  • memory/4080-122-0x00000000050D0000-0x000000000510C000-memory.dmp

    Filesize

    240KB

  • memory/4080-123-0x0000000002AE0000-0x0000000002B00000-memory.dmp

    Filesize

    128KB

  • memory/4080-124-0x0000000005240000-0x0000000005250000-memory.dmp

    Filesize

    64KB

  • memory/4080-163-0x0000000007380000-0x000000000787E000-memory.dmp

    Filesize

    5.0MB

  • memory/4080-162-0x00000000061B0000-0x0000000006242000-memory.dmp

    Filesize

    584KB

  • memory/4080-125-0x00000000062A0000-0x00000000063FA000-memory.dmp

    Filesize

    1.4MB

  • memory/4080-128-0x0000000006940000-0x0000000006962000-memory.dmp

    Filesize

    136KB

  • memory/4080-155-0x0000000005240000-0x0000000005250000-memory.dmp

    Filesize

    64KB

  • memory/4080-126-0x0000000006400000-0x0000000006750000-memory.dmp

    Filesize

    3.3MB

  • memory/4808-227-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-230-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-224-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-228-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-229-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-223-0x00007FF7580E0000-0x00007FF7581DA000-memory.dmp

    Filesize

    1000KB

  • memory/4808-218-0x000002666A150000-0x000002666A151000-memory.dmp

    Filesize

    4KB

  • memory/4808-220-0x000002666A100000-0x000002666A107000-memory.dmp

    Filesize

    28KB

  • memory/5008-1007-0x000001DAA93C0000-0x000001DAA93D0000-memory.dmp

    Filesize

    64KB

  • memory/5008-240-0x000001DA8EE10000-0x000001DA8EE1A000-memory.dmp

    Filesize

    40KB

  • memory/5008-1008-0x000001DAA93C0000-0x000001DAA93D0000-memory.dmp

    Filesize

    64KB

  • memory/5008-347-0x000001DAA9500000-0x000001DAA96C2000-memory.dmp

    Filesize

    1.8MB

  • memory/5008-258-0x000001DAA93C0000-0x000001DAA93D0000-memory.dmp

    Filesize

    64KB

  • memory/5008-255-0x000001DAA93C0000-0x000001DAA93D0000-memory.dmp

    Filesize

    64KB