Analysis

  • max time kernel
    130s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2023 21:46

General

  • Target

    81316c3ae747a814b495b00f92e8f92276cf7ddf37445975b8b95c7413bdbe94.exe

  • Size

    1.4MB

  • MD5

    462fd619602643d2a6996e63c8fea90e

  • SHA1

    9e1b24ab9977269debf12e2ec9080f79c374ac0f

  • SHA256

    81316c3ae747a814b495b00f92e8f92276cf7ddf37445975b8b95c7413bdbe94

  • SHA512

    17ca2ce5e59dff976100fd01f6cf6242660363c70c23acc2a9057f4dabdfc964cf48ebce9cc8e4078e16d197d692365fe03a57892c93d1c9fb5b7688cd9da265

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81316c3ae747a814b495b00f92e8f92276cf7ddf37445975b8b95c7413bdbe94.exe
    "C:\Users\Admin\AppData\Local\Temp\81316c3ae747a814b495b00f92e8f92276cf7ddf37445975b8b95c7413bdbe94.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1232
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:1236
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4176
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3400
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2412
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1836
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3368
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2336
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3900
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4532
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1624
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1492
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic computersystem where name="YACSFKWT" set AutomaticManagedPagefile=False
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3408
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2944
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
              5⤵
                PID:1564
            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe
              "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2604
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                5⤵
                  PID:1312
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 6
                    6⤵
                    • Runs ping.exe
                    PID:2412
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c ping 127.0.0.1 -n 20 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 20 > nul && "C:\Users\Admin\Music\rot.exe"
                  5⤵
                    PID:2212
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 20
                      6⤵
                      • Runs ping.exe
                      PID:1372
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                  4⤵
                  • Views/modifies file attributes
                  PID:3360
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F
                3⤵
                • Adds Run key to start application
                PID:3632
              • C:\Users\Admin\AppData\Local\Temp\ratt.exe
                "ratt.exe"
                3⤵
                • Executes dropped EXE
                PID:2544

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

            Filesize

            673.1MB

            MD5

            51dd75858915fc1bf1012b8341bd1dcf

            SHA1

            d9861c9aac0d7bee5ffb58da661a27cf8a61c476

            SHA256

            b74650f390d8d26085f86dedb36eabb4613d957afccdf3f7c889b175a9e619fd

            SHA512

            3071e614bc5c6f23815574259a94bc866f4e6d3951c76f3986bbeea8699482b27ca3fabdb75d935facd945bd72f115ee62c1501a56fbf6f33b66bb03dd94a650

          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

            Filesize

            175.6MB

            MD5

            0b58d7a9710e63837529bf49b8bdb470

            SHA1

            7f74454dd0ce42a84789e14ec0233aee2c71dd17

            SHA256

            32185c824c4a616f81b784dcd3500710edf345fc0df6d723622686e3655de283

            SHA512

            865cc156954d3cb3f2edef7f2a32e938a624e7e61516489aa9ae5e7557e0e044c501dc2712c118f834b2f072c9242918c16dc23315232d98e9adb40eb075cf11

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            1KB

            MD5

            33b19d75aa77114216dbc23f43b195e3

            SHA1

            36a6c3975e619e0c5232aa4f5b7dc1fec9525535

            SHA256

            b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

            SHA512

            676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            2e317d8fe6462cb53a04a05cb7bf3a60

            SHA1

            a458036019e669bdb829a8a1c0be04d3422a8bca

            SHA256

            e8cde245b05b73fef879f4aa76c4505316c53707a2b834f47c5d649c137cabd6

            SHA512

            6ba29efc00d3f83909117d92724b89081330373c17c5619a7684bdfb2367d6f23cb011cfcc7915d2cfb0e097c84028dc3c83659415cea670fa08f1fe55291b2d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            0c05bfb7e4b37e0fc955c87b48d71cd9

            SHA1

            c64ca4d8f9ff6664194832af6c542bc7377cdc06

            SHA256

            10363b1410f28fa055cc410c73185ad6f328d4648785a05ae8fb5099b1be8e79

            SHA512

            f61b63314ede4b7c5f3509e7926b7ea7e27ab9b63c25142b268ab1d925b9f64f52c3123bdd0914c133904c63108bf79643f2c325a1c6fd87848b4be9d1cb874a

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            9de133cd851ed5555048b22de953b532

            SHA1

            8baa2c1a0a8914369e62342a6378644e438c9633

            SHA256

            300be31bac5cecd869f4ec1f8968029402d52cac0218571978fd1e457e167dd0

            SHA512

            bff58bfae0d1de3472356a51a15e5af6f5863ee5ced2026e8990a29ba064ea6a4a02cc344362bb17095c8e7e81db9890a1a09971b0132d721c1ee4c08f1b3e03

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            8908a59c344ec18c6111e7dcbf0ab172

            SHA1

            96899da6ad6833ca3ad71c081cff1894ca648d0d

            SHA256

            997182c18226a979393ac591ec836699bf97cef78f7eac820b8c23163d779aa0

            SHA512

            5b2202e3a05802b8869f7af991439369dd07128d42b67ad1a8b5a101fef53551b74248034ddb7f59c6d3e21b8af85a19905d1453a92353dce3bb519c3f0ecc62

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            5c755a75ebd79e12d3f0cfb0ae9f71a0

            SHA1

            31c25e3456c13c6a5133669ba3d6c67b38b9fac3

            SHA256

            d89bb14f26f08909c65ae4bc613ff462ef92cb81f40e83c8ec47634a02bcf4a6

            SHA512

            9853c5ad473483071ed08f0f7f56f490bef295cea494128115b14ae919774508077cd5e2284f49b4773db1db74f64165bf3d24645e42c4a54eff5bf032a060ea

          • C:\Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • C:\Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\Add.ps1

            Filesize

            1KB

            MD5

            0df43097e0f0acd04d9e17fb43d618b9

            SHA1

            69b3ade12cb228393a93624e65f41604a17c83b6

            SHA256

            c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

            SHA512

            01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rl4arhyy.q51.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\ratt.7z

            Filesize

            693KB

            MD5

            7de6fdf3629c73bf0c29a96fa23ae055

            SHA1

            dcb37f6d43977601c6460b17387a89b9e4c0609a

            SHA256

            069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

            SHA512

            d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

          • C:\Users\Admin\AppData\Local\Temp\ratt.bat

            Filesize

            1KB

            MD5

            7ea1fec84d76294d9256ae3dca7676b2

            SHA1

            1e335451d1cbb6951bc77bf75430f4d983491342

            SHA256

            9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

            SHA512

            ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

          • C:\Users\Admin\AppData\Local\Temp\ratt.exe

            Filesize

            745.1MB

            MD5

            be788bb3680cf3809d9678ee6f7ba321

            SHA1

            499f01d5f654f83e172004dcc03f99abdd251734

            SHA256

            03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

            SHA512

            83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

          • C:\Users\Admin\AppData\Local\Temp\ratt.exe

            Filesize

            102.8MB

            MD5

            db2228078b9827f2189f6a959c08398f

            SHA1

            92463329c98be62d04fe150bcd09fa54b804d5ce

            SHA256

            ffa5a466515f597d51e6404bcdd048bf47b3c65ca971e8704e4fd1477dabb683

            SHA512

            8a1cc54492bc41e392cda7d6c6986e1f7b17c74800a2cdd2574974763c0ff89161ca97ed19822fc5e8af955e3f1c096522492a8cf8478eb3eefb7ac4030a60ce

          • memory/1836-185-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/1836-186-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/1836-197-0x0000000004590000-0x00000000045A0000-memory.dmp

            Filesize

            64KB

          • memory/1836-199-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/1836-184-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/2336-229-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/2336-217-0x0000000002B10000-0x0000000002B20000-memory.dmp

            Filesize

            64KB

          • memory/2336-216-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/2412-181-0x0000000004A10000-0x0000000004A20000-memory.dmp

            Filesize

            64KB

          • memory/2412-170-0x0000000004A10000-0x0000000004A20000-memory.dmp

            Filesize

            64KB

          • memory/2412-168-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/2412-169-0x0000000004A10000-0x0000000004A20000-memory.dmp

            Filesize

            64KB

          • memory/2412-183-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/2544-300-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/2544-301-0x0000000000B10000-0x0000000000CC6000-memory.dmp

            Filesize

            1.7MB

          • memory/2604-297-0x0000000005680000-0x0000000005690000-memory.dmp

            Filesize

            64KB

          • memory/2604-292-0x0000000005680000-0x0000000005690000-memory.dmp

            Filesize

            64KB

          • memory/2604-289-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/2604-303-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/2604-288-0x0000000000EA0000-0x0000000001056000-memory.dmp

            Filesize

            1.7MB

          • memory/2604-290-0x00000000056B0000-0x000000000574C000-memory.dmp

            Filesize

            624KB

          • memory/2604-298-0x0000000005680000-0x0000000005690000-memory.dmp

            Filesize

            64KB

          • memory/2604-291-0x0000000005800000-0x0000000005892000-memory.dmp

            Filesize

            584KB

          • memory/2604-296-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/2604-295-0x00000000057C0000-0x00000000057CA000-memory.dmp

            Filesize

            40KB

          • memory/3368-202-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB

          • memory/3368-200-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-201-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB

          • memory/3368-215-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/3368-214-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB

          • memory/3400-147-0x0000000002D80000-0x0000000002D90000-memory.dmp

            Filesize

            64KB

          • memory/3400-148-0x00000000028B0000-0x00000000028E6000-memory.dmp

            Filesize

            216KB

          • memory/3400-166-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/3400-163-0x0000000002D80000-0x0000000002D90000-memory.dmp

            Filesize

            64KB

          • memory/3400-146-0x0000000075250000-0x0000000075A00000-memory.dmp

            Filesize

            7.7MB

          • memory/3400-162-0x00000000061F0000-0x000000000620E000-memory.dmp

            Filesize

            120KB

          • memory/3400-152-0x0000000005BA0000-0x0000000005C06000-memory.dmp

            Filesize

            408KB

          • memory/3400-151-0x0000000005B30000-0x0000000005B96000-memory.dmp

            Filesize

            408KB

          • memory/3400-150-0x0000000005250000-0x0000000005272000-memory.dmp

            Filesize

            136KB

          • memory/3400-149-0x0000000005490000-0x0000000005AB8000-memory.dmp

            Filesize

            6.2MB

          • memory/3900-232-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/3900-236-0x0000000010000000-0x00000000100E2000-memory.dmp

            Filesize

            904KB

          • memory/3900-240-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4732-275-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-244-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/4732-281-0x0000000007720000-0x0000000007728000-memory.dmp

            Filesize

            32KB

          • memory/4732-282-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-284-0x00000000077F0000-0x0000000007812000-memory.dmp

            Filesize

            136KB

          • memory/4732-285-0x0000000008730000-0x0000000008CD4000-memory.dmp

            Filesize

            5.6MB

          • memory/4732-279-0x00000000076D0000-0x00000000076DE000-memory.dmp

            Filesize

            56KB

          • memory/4732-278-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-277-0x0000000007750000-0x00000000077E6000-memory.dmp

            Filesize

            600KB

          • memory/4732-245-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-246-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-280-0x00000000077F0000-0x000000000780A000-memory.dmp

            Filesize

            104KB

          • memory/4732-276-0x0000000007520000-0x000000000752A000-memory.dmp

            Filesize

            40KB

          • memory/4732-294-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/4732-258-0x00000000027B0000-0x00000000027C0000-memory.dmp

            Filesize

            64KB

          • memory/4732-274-0x0000000075180000-0x0000000075930000-memory.dmp

            Filesize

            7.7MB

          • memory/4732-272-0x0000000007B00000-0x000000000817A000-memory.dmp

            Filesize

            6.5MB

          • memory/4732-273-0x00000000074C0000-0x00000000074DA000-memory.dmp

            Filesize

            104KB

          • memory/4732-271-0x0000000006760000-0x000000000677E000-memory.dmp

            Filesize

            120KB

          • memory/4732-261-0x0000000070FA0000-0x0000000070FEC000-memory.dmp

            Filesize

            304KB

          • memory/4732-260-0x0000000007360000-0x0000000007392000-memory.dmp

            Filesize

            200KB

          • memory/4732-259-0x000000007F340000-0x000000007F350000-memory.dmp

            Filesize

            64KB