Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2023 11:09

General

  • Target

    tmp.exe

  • Size

    801KB

  • MD5

    49745133606dd24fec10eb0540784bfe

  • SHA1

    559feb5253e13b3779cb4f7ce7c14346144dc7aa

  • SHA256

    71f9d2b521480150670747508c2751628c5cf1a485ddf6ecca78f67f8cb9e333

  • SHA512

    379c850ef82f45a5afb616afeda8c44b63111025f0321377ac593c0a49167d8e5ddecc7f81e3b0474e4e9921ae6be51af474cafd833c275677f1cefca7339770

  • SSDEEP

    12288:GMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9zl6MM2j:GnsJ39LyjbJkQFMhmC+6GD995

Malware Config

Signatures

  • RunningRat

    RunningRat is a remote access trojan first seen in 2018.

  • RunningRat payload 12 IoCs
  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Creates a Windows Service
  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3728
    • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 1
          4⤵
          • Runs ping.exe
          PID:4440
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Sets DLL path for service in the registry
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2496
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Windows\SysWOW64\PING.EXE
            ping 127.0.0.1 -n 1
            5⤵
            • Runs ping.exe
            PID:3336
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "RstMwServices"
    1⤵
      PID:1496
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "RstMwServices"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\SysWOW64\RstMwServices.exe
        C:\Windows\system32\RstMwServices.exe "c:\users\admin\appdata\local\temp\240610343.dll",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        PID:4600
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3800
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      PID:4832
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1388
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1492

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        801KB

        MD5

        49745133606dd24fec10eb0540784bfe

        SHA1

        559feb5253e13b3779cb4f7ce7c14346144dc7aa

        SHA256

        71f9d2b521480150670747508c2751628c5cf1a485ddf6ecca78f67f8cb9e333

        SHA512

        379c850ef82f45a5afb616afeda8c44b63111025f0321377ac593c0a49167d8e5ddecc7f81e3b0474e4e9921ae6be51af474cafd833c275677f1cefca7339770

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        801KB

        MD5

        49745133606dd24fec10eb0540784bfe

        SHA1

        559feb5253e13b3779cb4f7ce7c14346144dc7aa

        SHA256

        71f9d2b521480150670747508c2751628c5cf1a485ddf6ecca78f67f8cb9e333

        SHA512

        379c850ef82f45a5afb616afeda8c44b63111025f0321377ac593c0a49167d8e5ddecc7f81e3b0474e4e9921ae6be51af474cafd833c275677f1cefca7339770

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        801KB

        MD5

        49745133606dd24fec10eb0540784bfe

        SHA1

        559feb5253e13b3779cb4f7ce7c14346144dc7aa

        SHA256

        71f9d2b521480150670747508c2751628c5cf1a485ddf6ecca78f67f8cb9e333

        SHA512

        379c850ef82f45a5afb616afeda8c44b63111025f0321377ac593c0a49167d8e5ddecc7f81e3b0474e4e9921ae6be51af474cafd833c275677f1cefca7339770

      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

        Filesize

        48KB

        MD5

        ccdbbd9d2b4600fac5bbfa58a31ac87d

        SHA1

        8a83c688311dcfe23488e2ebb7ba0407876c1e0d

        SHA256

        7126dddce38d2a948ea12c50246be7ba4434eb3153ba19a4dc9f97f1c76dcc2c

        SHA512

        3ed726ee90237c6fcc45ab1c23e690479d835e1aaca9db4ec39c0f1ede1cec0584d09b9c4ce303a88323a64fcecc40c0786dd46f886be60c39ae7e40c8b11798

      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

        Filesize

        48KB

        MD5

        ccdbbd9d2b4600fac5bbfa58a31ac87d

        SHA1

        8a83c688311dcfe23488e2ebb7ba0407876c1e0d

        SHA256

        7126dddce38d2a948ea12c50246be7ba4434eb3153ba19a4dc9f97f1c76dcc2c

        SHA512

        3ed726ee90237c6fcc45ab1c23e690479d835e1aaca9db4ec39c0f1ede1cec0584d09b9c4ce303a88323a64fcecc40c0786dd46f886be60c39ae7e40c8b11798

      • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

        Filesize

        48KB

        MD5

        ccdbbd9d2b4600fac5bbfa58a31ac87d

        SHA1

        8a83c688311dcfe23488e2ebb7ba0407876c1e0d

        SHA256

        7126dddce38d2a948ea12c50246be7ba4434eb3153ba19a4dc9f97f1c76dcc2c

        SHA512

        3ed726ee90237c6fcc45ab1c23e690479d835e1aaca9db4ec39c0f1ede1cec0584d09b9c4ce303a88323a64fcecc40c0786dd46f886be60c39ae7e40c8b11798

      • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

        Filesize

        48KB

        MD5

        ccdbbd9d2b4600fac5bbfa58a31ac87d

        SHA1

        8a83c688311dcfe23488e2ebb7ba0407876c1e0d

        SHA256

        7126dddce38d2a948ea12c50246be7ba4434eb3153ba19a4dc9f97f1c76dcc2c

        SHA512

        3ed726ee90237c6fcc45ab1c23e690479d835e1aaca9db4ec39c0f1ede1cec0584d09b9c4ce303a88323a64fcecc40c0786dd46f886be60c39ae7e40c8b11798

      • C:\Users\Admin\AppData\Local\Temp\._cache_tmp.exe

        Filesize

        48KB

        MD5

        ccdbbd9d2b4600fac5bbfa58a31ac87d

        SHA1

        8a83c688311dcfe23488e2ebb7ba0407876c1e0d

        SHA256

        7126dddce38d2a948ea12c50246be7ba4434eb3153ba19a4dc9f97f1c76dcc2c

        SHA512

        3ed726ee90237c6fcc45ab1c23e690479d835e1aaca9db4ec39c0f1ede1cec0584d09b9c4ce303a88323a64fcecc40c0786dd46f886be60c39ae7e40c8b11798

      • C:\Users\Admin\AppData\Local\Temp\240610343.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • C:\Users\Admin\AppData\Local\Temp\240610343.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • C:\Users\Admin\AppData\Local\Temp\240610343.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • C:\Users\Admin\AppData\Local\Temp\240611156.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • C:\Users\Admin\AppData\Local\Temp\240611156.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • C:\Users\Admin\AppData\Local\Temp\nNaAl847.xlsm

        Filesize

        17KB

        MD5

        e566fc53051035e1e6fd0ed1823de0f9

        SHA1

        00bc96c48b98676ecd67e81a6f1d7754e4156044

        SHA256

        8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

        SHA512

        a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

      • C:\Users\Admin\AppData\Local\Temp\wsuA6DF.tmp

        Filesize

        14KB

        MD5

        c01eaa0bdcd7c30a42bbb35a9acbf574

        SHA1

        0aee3e1b873e41d040f1991819d0027b6cc68f54

        SHA256

        32297224427103aa1834dba276bf5d49cd5dd6bda0291422e47ad0d0706c6d40

        SHA512

        d26ff775ad39425933cd3df92209faa53ec5b701e65bfbcccc64ce8dd3e79f619a9bad7cc975a98a95f2006ae89e50551877fc315a3050e48d5ab89e0802e2b7

      • C:\Windows\SysWOW64\RstMwServices.exe

        Filesize

        60KB

        MD5

        889b99c52a60dd49227c5e485a016679

        SHA1

        8fa889e456aa646a4d0a4349977430ce5fa5e2d7

        SHA256

        6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

        SHA512

        08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

      • C:\Windows\SysWOW64\RstMwServices.exe

        Filesize

        60KB

        MD5

        889b99c52a60dd49227c5e485a016679

        SHA1

        8fa889e456aa646a4d0a4349977430ce5fa5e2d7

        SHA256

        6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

        SHA512

        08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        708da594867d30804af8157d021d2520

        SHA1

        681a33170120f3e3fd094c80f5a75a1c1b37ea9e

        SHA256

        d07af94e443b67fe93d40d16504942aeefb157fc11ba54a4e4d0976e20727948

        SHA512

        9cc8ebe8f0237e4094e301282d660ce85042b269f8effd55e5c1d842d785df117e2139866de705ef93820d6cc5f0120e39978ff3a6a2b560bc4c52aadef23bb1

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        8c11e170b340e739ebeaefad872e7e9e

        SHA1

        786839e000fca58540356f0bad985998268985da

        SHA256

        24a87bcadbe6d143dd567fc1928d308d8f11d431bd892289c1d631c11f5b4e62

        SHA512

        bf9c0fd0b35e14a21849c0ab9a7fa80a8ba2569362b11566f9dc6c947431638dad55a0e489c73c04fc33a037a9a3f8079c48166a149ba383bf86d4763fecc44d

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        1c94fd8eb3095526cbb08f3d829a97f9

        SHA1

        edf0edca66a5017bcc5e8c4652c035adc8dde143

        SHA256

        eb233574c26aeee8b81e6ac7f927e5ec28006e404b100248670589083e364ad9

        SHA512

        da545dec02e0ce65d7bfc7093c5166fa71c4430441ca05291ee5ae0c4296ba615e8cb5746fb70a76df14b304ec0919a0687ff4548e4d95900114c282cff104c6

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        41a5d4d7cdce61a1d099eea56cc3f564

        SHA1

        43e27879123bbb86334cb6fa6cb697f4d2d67c42

        SHA256

        32e9e4c02c532f2e85341728b28fb8b97c5ea87c1f5d650a363eff730c1bb495

        SHA512

        88ad446d8777ed87705e06a4a3a4c8786415212d83990307d2ff29f7c19ddb1f1745dd27f4adacc0241651714205b16a4da3ea677597b40c11f30c247dc6ebce

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        d852491a40c630c6a660e47323a92c99

        SHA1

        d19aaced2db3aa3f14f506194585b4c25e863602

        SHA256

        8a9b89a27d251624165ccfc01ec0df64134dce37137908312eaf2a46d2cb8719

        SHA512

        4597773a604b684497b6afb82228c626169a23748a0e6cffceeeeab4798593116d2132a268281dc286f1f25a1ca8dc8110c388e3dc5c5fcda004f4b88dd25242

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        2e8549e1220cb6c3cdddc30d9e9b6a68

        SHA1

        47a9a2552abd0362db1b6d52045b6d72403fad05

        SHA256

        5ecc987c9a0b7728bd55ebb2614ce88185e30e03c0b67f749a31929b813be2ec

        SHA512

        926cff2b8fd5a10b64b5e6c076d6c88e5e023e74dce7b08d32200b589aecb20da365708486d0c03ec5b1774c0fae184d62cfee0434538cdeb4de724f7c483fa6

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        f24affd54e02587b15054e9d68876f85

        SHA1

        bea935e464323b31a48b8d645cce8d4456a11caa

        SHA256

        0b959ee0ccbf681e5ead7f62bfab64376ce4fdf84d0b4128387dcf5ec01d455c

        SHA512

        9e146cb9c40cd7d470962866d929cf2b10b11cc6c64f67a6ff14663c6fe96ba7db933e580aab5d8c054b4f3a8c27cd1936daf4c8507b4826308b26c0f0968d0b

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        2c1be907963e4bc7449666e0efc7723d

        SHA1

        e702b62af7bae48ccd72f91a7420414a5f6c28b0

        SHA256

        748f22d0c5f116f6c3e673cf2b2359841a4294e8605f4fc992e92f21b16d3663

        SHA512

        d48c380732e05b97cbfaa30a51f89d0c75ee7d27269bd52b199195f2f10b82364851850bf274691e6626c5ee8bbbe8dab6cf6bf3b93c777f718d419f40951e50

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        8e431c290659a23bb097d553f1701d5f

        SHA1

        84b25d4028b6c692366add46d8977c9c2b594b13

        SHA256

        7305cbe8e44f373ad7d5a5f53d1d18b91d9e14497a26a9656fbd0a07c7f9cccf

        SHA512

        235ff9ddd391303454c896840326cf650c09033adcab3f03ed3537edb5507f9c600844f8bad41fb241bfc7e0d35dd20ecea5c30684edfb23927222c548d9d013

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\InstallAgent\Checkpoints\9NCBCSZSJRSB.dat

        Filesize

        29KB

        MD5

        779690ea9349e4ff7d55e5a5f59ca53f

        SHA1

        7ac25f701ab35ed1de70dbe50f4354cc1b363e13

        SHA256

        7b36d8246659cb04a4d81b95ad1547b78e3f028139cdf4bf8ab174c5f57e758a

        SHA512

        5349dd2c530eeb9e35e81b98c335af3db9967299a6a51eb36c1f3af98489c878175258e399eb6360fd04ec140980c4b9335341dbc37bd15590b2247742ebc862

      • \??\c:\users\admin\appdata\local\temp\240610343.dll

        Filesize

        25KB

        MD5

        c7cb99db62ffeab14d5516015f088de9

        SHA1

        54e58055c1f0e1a06dde51c8c2784ec99b043c55

        SHA256

        0cdb35c2554fc1a20db23c2809feb5864a1209959d7360c2d9c3dfec76628db2

        SHA512

        e973bda24dccde5cc254135a295390ea68d997884f383ba7a3fd33f98e4504d91019f4420dc73146d630bd699c563bb0b005af2df673e4d53d30f2434f5b08f3

      • memory/1492-614-0x000001F650B00000-0x000001F650B01000-memory.dmp

        Filesize

        4KB

      • memory/1492-577-0x000001F648660000-0x000001F648670000-memory.dmp

        Filesize

        64KB

      • memory/1492-593-0x000001F648760000-0x000001F648770000-memory.dmp

        Filesize

        64KB

      • memory/1492-612-0x000001F650AD0000-0x000001F650AD1000-memory.dmp

        Filesize

        4KB

      • memory/1492-616-0x000001F650C10000-0x000001F650C11000-memory.dmp

        Filesize

        4KB

      • memory/1492-615-0x000001F650B00000-0x000001F650B01000-memory.dmp

        Filesize

        4KB

      • memory/3728-133-0x0000000002360000-0x0000000002361000-memory.dmp

        Filesize

        4KB

      • memory/3728-266-0x0000000000400000-0x00000000004CE000-memory.dmp

        Filesize

        824KB

      • memory/3768-271-0x0000000002030000-0x0000000002031000-memory.dmp

        Filesize

        4KB

      • memory/3768-617-0x0000000000400000-0x00000000004CE000-memory.dmp

        Filesize

        824KB

      • memory/3768-394-0x0000000000400000-0x00000000004CE000-memory.dmp

        Filesize

        824KB

      • memory/3768-366-0x0000000002030000-0x0000000002031000-memory.dmp

        Filesize

        4KB

      • memory/3768-367-0x0000000000400000-0x00000000004CE000-memory.dmp

        Filesize

        824KB

      • memory/3800-348-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-368-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-335-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-334-0x00007FFD35CB0000-0x00007FFD35CC0000-memory.dmp

        Filesize

        64KB

      • memory/3800-338-0x00007FFD35CB0000-0x00007FFD35CC0000-memory.dmp

        Filesize

        64KB

      • memory/3800-336-0x00007FFD35CB0000-0x00007FFD35CC0000-memory.dmp

        Filesize

        64KB

      • memory/3800-351-0x00007FFD335A0000-0x00007FFD335B0000-memory.dmp

        Filesize

        64KB

      • memory/3800-350-0x00007FFD335A0000-0x00007FFD335B0000-memory.dmp

        Filesize

        64KB

      • memory/3800-349-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-337-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-347-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-346-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-345-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-344-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-343-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-341-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-342-0x00007FFD35CB0000-0x00007FFD35CC0000-memory.dmp

        Filesize

        64KB

      • memory/3800-340-0x00007FFD75C30000-0x00007FFD75E25000-memory.dmp

        Filesize

        2.0MB

      • memory/3800-339-0x00007FFD35CB0000-0x00007FFD35CC0000-memory.dmp

        Filesize

        64KB