Resubmissions

25-03-2023 13:21

230325-ql3nzacg96 3

25-03-2023 12:34

230325-pr8azaeg8x 10

Analysis

  • max time kernel
    599s
  • max time network
    603s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 12:34

General

  • Target

    BruteL4 DDOS Tool.exe

  • Size

    12.0MB

  • MD5

    7469696e71e96dd67ce6c5f59c2e77c7

  • SHA1

    a26de444a133d56eb51f5bac21fb2f925b5ee37a

  • SHA256

    55c2faf7a200fe2db176dd0a7c43bd8f97d4a485814d6b105855ae7adfadcb32

  • SHA512

    7702b5c08999a52816ff0176efe14f7d3c3808081337077f4fd4154cd29d3641aca5508d37c10e44d1980f835c868e9f2d3c71fda23f89c9ff80ca0f238f4c4c

  • SSDEEP

    393216:J+aZeyhEOh8pJpdEYTzuaj5DDKEeuuODGfTc:MahEe8pVEY3uaJWEhuODGw

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 55 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Detects Pyinstaller 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3212
      • C:\Users\Admin\AppData\Local\Temp\BruteL4 DDOS Tool.exe
        "C:\Users\Admin\AppData\Local\Temp\BruteL4 DDOS Tool.exe"
        2⤵
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\Desktop\crack.exe
          "C:\Users\Admin\Desktop\crack.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious behavior: AddClipboardFormatListener
          PID:4636
      • C:\Users\Admin\Desktop\BruteL4-DDOS.exe
        "C:\Users\Admin\Desktop\BruteL4-DDOS.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4764
        • C:\Users\Admin\Desktop\BruteL4DDOS.exe
          "C:\Users\Admin\Desktop\BruteL4DDOS.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1988
          • C:\Users\Admin\Desktop\BruteL4DDOS.exe
            "C:\Users\Admin\Desktop\BruteL4DDOS.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2464
      • C:\Users\Admin\Desktop\BruteL4-DDOS.exe
        "C:\Users\Admin\Desktop\BruteL4-DDOS.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4124
        • C:\ProgramData\microsoft\MpDlpCmd.exe
          "C:\ProgramData\microsoft\MpDlpCmd.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4756
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c title Brute - by billythegoat356
      1⤵
        PID:4452
      • C:\Windows\system32\mode.com
        mode 140, 40
        1⤵
          PID:2648
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c mode 140, 40
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:3068
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c
          1⤵
            PID:2564

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Defense Evasion

          Virtualization/Sandbox Evasion

          1
          T1497

          Discovery

          Query Registry

          3
          T1012

          Virtualization/Sandbox Evasion

          1
          T1497

          System Information Discovery

          4
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\MpDlpCmd.exe
            Filesize

            3.3MB

            MD5

            300668bc6b9a15cc237e63ceadfac756

            SHA1

            c8341efe0d0b8e9f7fe4e6ff28436b873c91795a

            SHA256

            f61131d97d797df46306bbd969043ceb702ac1d74b0486a4cbb5bacac1b6e43c

            SHA512

            f754d6e09cc8055122333eb0137dbfbeac7900480dc38c9e1f037962d516c59f433ed682950f1fe4889043145c4ef6ac763cbb1a6edec122ac2ea57b4f4bb69e

          • C:\ProgramData\Microsoft\MpDlpCmd.exe
            Filesize

            3.3MB

            MD5

            300668bc6b9a15cc237e63ceadfac756

            SHA1

            c8341efe0d0b8e9f7fe4e6ff28436b873c91795a

            SHA256

            f61131d97d797df46306bbd969043ceb702ac1d74b0486a4cbb5bacac1b6e43c

            SHA512

            f754d6e09cc8055122333eb0137dbfbeac7900480dc38c9e1f037962d516c59f433ed682950f1fe4889043145c4ef6ac763cbb1a6edec122ac2ea57b4f4bb69e

          • C:\ProgramData\microsoft\MpDlpCmd.exe
            Filesize

            3.3MB

            MD5

            300668bc6b9a15cc237e63ceadfac756

            SHA1

            c8341efe0d0b8e9f7fe4e6ff28436b873c91795a

            SHA256

            f61131d97d797df46306bbd969043ceb702ac1d74b0486a4cbb5bacac1b6e43c

            SHA512

            f754d6e09cc8055122333eb0137dbfbeac7900480dc38c9e1f037962d516c59f433ed682950f1fe4889043145c4ef6ac763cbb1a6edec122ac2ea57b4f4bb69e

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BruteL4-DDOS.exe.log
            Filesize

            859B

            MD5

            6e11a15fe4491ead2a94f64d3467be38

            SHA1

            9a8329fb71ddc89dae9aa174c0b44a1f646efd63

            SHA256

            087cf6355ae9fc71eea2493b30c6b10a6775f3dd68b2cb5e07fcc13461b74248

            SHA512

            6154e320e2556aef177fc5bfb4e5fe8fabe324af736b89db4db41e6dd51658f7f6a7d0f73c24dc6ccdc4edf14023f4a1ecd0908abac5b82cebd038a93b2fc106

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\VCRUNTIME140.dll
            Filesize

            94KB

            MD5

            a87575e7cf8967e481241f13940ee4f7

            SHA1

            879098b8a353a39e16c79e6479195d43ce98629e

            SHA256

            ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

            SHA512

            e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\VCRUNTIME140.dll
            Filesize

            94KB

            MD5

            a87575e7cf8967e481241f13940ee4f7

            SHA1

            879098b8a353a39e16c79e6479195d43ce98629e

            SHA256

            ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

            SHA512

            e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\_ctypes.pyd
            Filesize

            54KB

            MD5

            e28acb3e65ad0b0f56bbfa07a5524289

            SHA1

            a36cebfed6887d32fc005cd74da22648e7ec8e6c

            SHA256

            269a4c6d8deeb6cf5739573c71d1cfe1398f8d1a1508d1149efa926fd49138c9

            SHA512

            527e1ab1638090e5c5f005a319d548c9bf0a530389ab82e4fe314cc7a6ac59ba74715b6e38a90f82ad3acd32533c0285b90f8b4b3b89b55ed31a8235ee835284

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\_ctypes.pyd
            Filesize

            54KB

            MD5

            e28acb3e65ad0b0f56bbfa07a5524289

            SHA1

            a36cebfed6887d32fc005cd74da22648e7ec8e6c

            SHA256

            269a4c6d8deeb6cf5739573c71d1cfe1398f8d1a1508d1149efa926fd49138c9

            SHA512

            527e1ab1638090e5c5f005a319d548c9bf0a530389ab82e4fe314cc7a6ac59ba74715b6e38a90f82ad3acd32533c0285b90f8b4b3b89b55ed31a8235ee835284

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\_socket.pyd
            Filesize

            38KB

            MD5

            79ca909a112bf7e02eebbeb24c7fea66

            SHA1

            5c3724b1b715365b2754f91e73d044b2673f3903

            SHA256

            f5aa56e1e206c680d02f398a9eeeb9e9986246178f616c59494c09aaf24d71d3

            SHA512

            227fa2adcd9b9fd8058fe09c2918ef8e1ada50b5b58fc7898a0851086160f83a4fab8b934979a1e2d28449f30b0a689c2c096ea1c70779fb6b1daef564f9b980

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\_socket.pyd
            Filesize

            38KB

            MD5

            79ca909a112bf7e02eebbeb24c7fea66

            SHA1

            5c3724b1b715365b2754f91e73d044b2673f3903

            SHA256

            f5aa56e1e206c680d02f398a9eeeb9e9986246178f616c59494c09aaf24d71d3

            SHA512

            227fa2adcd9b9fd8058fe09c2918ef8e1ada50b5b58fc7898a0851086160f83a4fab8b934979a1e2d28449f30b0a689c2c096ea1c70779fb6b1daef564f9b980

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\base_library.zip
            Filesize

            812KB

            MD5

            eb130a9177f630bc33d7e510ed81d9d2

            SHA1

            c33dae854285d5367e8c87899e1a168abeca8d18

            SHA256

            987165c5cc33442df85d8ab8c3f66e2805070e0b526801b88434f48ed04b3a2f

            SHA512

            17feb5a3468a4883730fb17251ac7604c9ba376ce871ebbf4a034144626a63caf415bc6bed6cfca518b37c9840231cfdfccc17ca4833b3ef23b32499444b8474

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\libffi-7.dll
            Filesize

            23KB

            MD5

            b5150b41ca910f212a1dd236832eb472

            SHA1

            a17809732c562524b185953ffe60dfa91ba3ce7d

            SHA256

            1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a

            SHA512

            9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\libffi-7.dll
            Filesize

            23KB

            MD5

            b5150b41ca910f212a1dd236832eb472

            SHA1

            a17809732c562524b185953ffe60dfa91ba3ce7d

            SHA256

            1a106569ac0ad3152f3816ff361aa227371d0d85425b357632776ac48d92ea8a

            SHA512

            9e82b0caa3d72bb4a7ad7d66ebfb10edb778749e89280bca67c766e72dc794e99aab2bc2980d64282a384699929ce6cc996462a73584898d2df67a57bff2a9c6

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\python310.dll
            Filesize

            1.4MB

            MD5

            b607df83392febab3f5745b79dc26c57

            SHA1

            58c4b08575afbca1cf21e0995ca9048290241ebd

            SHA256

            6a21dc896a78c961eac3dad70a9addc289c6c8449fe5c09b37adf12310e06b0e

            SHA512

            a341b1b1a725a6df59d3b0f8e1afd3c8d39b63d682f297321ac59418f1f8089b3caca8374dcf453a09e77c53f0f47e889b965b9f3d0ec9dd5b8cff8839838d4d

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\python310.dll
            Filesize

            1.4MB

            MD5

            b607df83392febab3f5745b79dc26c57

            SHA1

            58c4b08575afbca1cf21e0995ca9048290241ebd

            SHA256

            6a21dc896a78c961eac3dad70a9addc289c6c8449fe5c09b37adf12310e06b0e

            SHA512

            a341b1b1a725a6df59d3b0f8e1afd3c8d39b63d682f297321ac59418f1f8089b3caca8374dcf453a09e77c53f0f47e889b965b9f3d0ec9dd5b8cff8839838d4d

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\select.pyd
            Filesize

            21KB

            MD5

            6b060423e9286414cd6529d4ae6fcda5

            SHA1

            41f0f83c395a936b313001307cbbe2f01224fa35

            SHA256

            6ee51b502c418c8a6d3e5c13f22bee6f72503043ac33b4f1ac01adf7531557ae

            SHA512

            04256d6fb99296c6b3c29fd69b0f90ac1eb8a25c2e7750b3fda4a145d5d9bc7a6e5d5b3691c0784c810f3e7cea3f080325d6cec2901ed206b57dcf1b6777e4ff

          • C:\Users\Admin\AppData\Local\Temp\_MEI19882\select.pyd
            Filesize

            21KB

            MD5

            6b060423e9286414cd6529d4ae6fcda5

            SHA1

            41f0f83c395a936b313001307cbbe2f01224fa35

            SHA256

            6ee51b502c418c8a6d3e5c13f22bee6f72503043ac33b4f1ac01adf7531557ae

            SHA512

            04256d6fb99296c6b3c29fd69b0f90ac1eb8a25c2e7750b3fda4a145d5d9bc7a6e5d5b3691c0784c810f3e7cea3f080325d6cec2901ed206b57dcf1b6777e4ff

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3f0lsh3v.bh4.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\Desktop\BruteL4-DDOS.exe
            Filesize

            11.5MB

            MD5

            cb885b1cae29af6524d341c65e486828

            SHA1

            ef35f45fd7378e8fd31cd60f72bde21e75d61ada

            SHA256

            bd95ec107878109859ff396ef71c76eb801ed4b25a167b49c8f0b8e112fbe361

            SHA512

            9086e5a01178134876311086b14798e17d57f960c280b019e8f7e33fb68cdc494eb9be32918ec10314d8b8dfe289281567c82d132f1a5cf98288b8f133df2cde

          • C:\Users\Admin\Desktop\BruteL4-DDOS.exe
            Filesize

            11.5MB

            MD5

            cb885b1cae29af6524d341c65e486828

            SHA1

            ef35f45fd7378e8fd31cd60f72bde21e75d61ada

            SHA256

            bd95ec107878109859ff396ef71c76eb801ed4b25a167b49c8f0b8e112fbe361

            SHA512

            9086e5a01178134876311086b14798e17d57f960c280b019e8f7e33fb68cdc494eb9be32918ec10314d8b8dfe289281567c82d132f1a5cf98288b8f133df2cde

          • C:\Users\Admin\Desktop\BruteL4-DDOS.exe
            Filesize

            11.5MB

            MD5

            cb885b1cae29af6524d341c65e486828

            SHA1

            ef35f45fd7378e8fd31cd60f72bde21e75d61ada

            SHA256

            bd95ec107878109859ff396ef71c76eb801ed4b25a167b49c8f0b8e112fbe361

            SHA512

            9086e5a01178134876311086b14798e17d57f960c280b019e8f7e33fb68cdc494eb9be32918ec10314d8b8dfe289281567c82d132f1a5cf98288b8f133df2cde

          • C:\Users\Admin\Desktop\BruteL4DDOS.exe
            Filesize

            5.8MB

            MD5

            a1c68c50488809ae7db16f2eaf42cf8a

            SHA1

            e82c90431a6865422d7d4a63488daffabe1082d6

            SHA256

            57dc721959bfc2125061178c9f098245ef4faa49446d19af48d0b055b1524d1e

            SHA512

            6d6e246dc8b5e545ebb5508cdb0d3ec68cb17b71b066f2cd0e80a6538e44c440a084591a726b180cace99518cfa4ad85940439b202711d1c07877cbb5cde7d9d

          • C:\Users\Admin\Desktop\BruteL4DDOS.exe
            Filesize

            5.8MB

            MD5

            a1c68c50488809ae7db16f2eaf42cf8a

            SHA1

            e82c90431a6865422d7d4a63488daffabe1082d6

            SHA256

            57dc721959bfc2125061178c9f098245ef4faa49446d19af48d0b055b1524d1e

            SHA512

            6d6e246dc8b5e545ebb5508cdb0d3ec68cb17b71b066f2cd0e80a6538e44c440a084591a726b180cace99518cfa4ad85940439b202711d1c07877cbb5cde7d9d

          • C:\Users\Admin\Desktop\BruteL4DDOS.exe
            Filesize

            5.8MB

            MD5

            a1c68c50488809ae7db16f2eaf42cf8a

            SHA1

            e82c90431a6865422d7d4a63488daffabe1082d6

            SHA256

            57dc721959bfc2125061178c9f098245ef4faa49446d19af48d0b055b1524d1e

            SHA512

            6d6e246dc8b5e545ebb5508cdb0d3ec68cb17b71b066f2cd0e80a6538e44c440a084591a726b180cace99518cfa4ad85940439b202711d1c07877cbb5cde7d9d

          • C:\Users\Admin\Desktop\BruteL4DDOS.exe
            Filesize

            5.8MB

            MD5

            a1c68c50488809ae7db16f2eaf42cf8a

            SHA1

            e82c90431a6865422d7d4a63488daffabe1082d6

            SHA256

            57dc721959bfc2125061178c9f098245ef4faa49446d19af48d0b055b1524d1e

            SHA512

            6d6e246dc8b5e545ebb5508cdb0d3ec68cb17b71b066f2cd0e80a6538e44c440a084591a726b180cace99518cfa4ad85940439b202711d1c07877cbb5cde7d9d

          • C:\Users\Admin\Desktop\crack.exe
            Filesize

            18KB

            MD5

            b441b71b1ce23257d6f40bd7555703ac

            SHA1

            961d3ae7e69b7a39edda340e93986c5a7f89c097

            SHA256

            eeaacd0b7e68cc5e5a183dc5f6e8b489cf267a73ebd772b338873f9e04e2b7a4

            SHA512

            e4f67e81e8f83b211a8c4bbaa0ff96d02341ff3fe6a83ffac0aefb62507afb0fa823fe43e3d4e3dd0b4a680393e6980adc92cea5286998109c828faf657c4a8b

          • C:\Users\Admin\Desktop\crack.exe
            Filesize

            18KB

            MD5

            b441b71b1ce23257d6f40bd7555703ac

            SHA1

            961d3ae7e69b7a39edda340e93986c5a7f89c097

            SHA256

            eeaacd0b7e68cc5e5a183dc5f6e8b489cf267a73ebd772b338873f9e04e2b7a4

            SHA512

            e4f67e81e8f83b211a8c4bbaa0ff96d02341ff3fe6a83ffac0aefb62507afb0fa823fe43e3d4e3dd0b4a680393e6980adc92cea5286998109c828faf657c4a8b

          • C:\Users\Admin\Desktop\crack.exe
            Filesize

            18KB

            MD5

            b441b71b1ce23257d6f40bd7555703ac

            SHA1

            961d3ae7e69b7a39edda340e93986c5a7f89c097

            SHA256

            eeaacd0b7e68cc5e5a183dc5f6e8b489cf267a73ebd772b338873f9e04e2b7a4

            SHA512

            e4f67e81e8f83b211a8c4bbaa0ff96d02341ff3fe6a83ffac0aefb62507afb0fa823fe43e3d4e3dd0b4a680393e6980adc92cea5286998109c828faf657c4a8b

          • memory/2464-377-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-288-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-290-0x00007FFEA8AF0000-0x00007FFEA8B14000-memory.dmp
            Filesize

            144KB

          • memory/2464-291-0x00007FFEB8100000-0x00007FFEB810F000-memory.dmp
            Filesize

            60KB

          • memory/2464-292-0x00007FFEA8AD0000-0x00007FFEA8AE9000-memory.dmp
            Filesize

            100KB

          • memory/2464-293-0x00007FFEB8000000-0x00007FFEB800D000-memory.dmp
            Filesize

            52KB

          • memory/2464-337-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-371-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-383-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-389-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-395-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-401-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/2464-407-0x00007FFEA0EB0000-0x00007FFEA1315000-memory.dmp
            Filesize

            4.4MB

          • memory/4124-222-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-294-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-241-0x00007FFEC5800000-0x00007FFEC5810000-memory.dmp
            Filesize

            64KB

          • memory/4124-240-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-319-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-237-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-231-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-234-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-223-0x00007FF48A2D0000-0x00007FF48A6A1000-memory.dmp
            Filesize

            3.8MB

          • memory/4124-287-0x0000000003B00000-0x0000000003B22000-memory.dmp
            Filesize

            136KB

          • memory/4124-220-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-343-0x00007FF48A2D0000-0x00007FF48A6A1000-memory.dmp
            Filesize

            3.8MB

          • memory/4124-218-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-219-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4124-217-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-342-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4124-295-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-296-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-168-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-163-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-370-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4124-311-0x00000000264E0000-0x0000000026C86000-memory.dmp
            Filesize

            7.6MB

          • memory/4124-366-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4124-365-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-364-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-363-0x00000000056C0000-0x00000000056D0000-memory.dmp
            Filesize

            64KB

          • memory/4124-243-0x0000000140000000-0x0000000140CB4000-memory.dmp
            Filesize

            12.7MB

          • memory/4636-151-0x0000000000920000-0x0000000000930000-memory.dmp
            Filesize

            64KB

          • memory/4636-148-0x00000000001C0000-0x00000000001CC000-memory.dmp
            Filesize

            48KB

          • memory/4636-161-0x0000000000920000-0x0000000000930000-memory.dmp
            Filesize

            64KB

          • memory/4756-317-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-376-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-362-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-316-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-315-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-313-0x00007FF45C720000-0x00007FF45CAF1000-memory.dmp
            Filesize

            3.8MB

          • memory/4756-368-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-369-0x00007FF45C720000-0x00007FF45CAF1000-memory.dmp
            Filesize

            3.8MB

          • memory/4756-312-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-406-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-400-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-318-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-394-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-382-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4756-388-0x0000000000820000-0x000000000170F000-memory.dmp
            Filesize

            14.9MB

          • memory/4764-158-0x00007FFE80030000-0x00007FFE80031000-memory.dmp
            Filesize

            4KB

          • memory/4764-157-0x00007FFE80000000-0x00007FFE80002000-memory.dmp
            Filesize

            8KB

          • memory/4764-159-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4764-154-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4764-160-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4764-221-0x00007FFE80010000-0x00007FFE80011000-memory.dmp
            Filesize

            4KB

          • memory/4764-239-0x00007FF7219A0000-0x00007FF7229AC000-memory.dmp
            Filesize

            16.0MB

          • memory/4764-162-0x00000000037A0000-0x00000000037B0000-memory.dmp
            Filesize

            64KB