Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2023 01:18

General

  • Target

    cc20c1e11e6f7a646e19c68dc6db4d81362a5573e65fe9cf25b6f79b4afd87b9.exe

  • Size

    1.4MB

  • MD5

    c208c1d1d42cb360e33809dd47913bdd

  • SHA1

    37a3001ef7ed491b5068e7d0344cbaa9758321c6

  • SHA256

    cc20c1e11e6f7a646e19c68dc6db4d81362a5573e65fe9cf25b6f79b4afd87b9

  • SHA512

    c5a95a908597eef8ecda3da6400f45988332bf33a661ae99c6e9975cbf83d004645785719f83beb13dfa4b3bdb0a327aeb2529596151fb734d1c07667c727797

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc20c1e11e6f7a646e19c68dc6db4d81362a5573e65fe9cf25b6f79b4afd87b9.exe
    "C:\Users\Admin\AppData\Local\Temp\cc20c1e11e6f7a646e19c68dc6db4d81362a5573e65fe9cf25b6f79b4afd87b9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:3712
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3220
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4292
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2072
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2760
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4728
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1728
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:4632
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2120
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:3444
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1572
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4524
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic computersystem where name="GBSDSUCH" set AutomaticManagedPagefile=False
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3912
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
              5⤵
                PID:3796
            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe
              "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4776
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                5⤵
                  PID:380
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 8
                    6⤵
                    • Runs ping.exe
                    PID:4496
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c ping 127.0.0.1 -n 20 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 20 > nul && "C:\Users\Admin\Music\rot.exe"
                  5⤵
                    PID:1724
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 20
                      6⤵
                      • Runs ping.exe
                      PID:3764
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                  4⤵
                  • Views/modifies file attributes
                  PID:3992
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F
                3⤵
                • Adds Run key to start application
                PID:2056
              • C:\Users\Admin\AppData\Local\Temp\ratt.exe
                "ratt.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:568

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

            Filesize

            745.1MB

            MD5

            be788bb3680cf3809d9678ee6f7ba321

            SHA1

            499f01d5f654f83e172004dcc03f99abdd251734

            SHA256

            03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

            SHA512

            83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

            Filesize

            125.9MB

            MD5

            b93bdbf3196412927b13bd3771691603

            SHA1

            056812bb4fc36ca24add4a3ab02bfd3364fe09eb

            SHA256

            a849a17802e30fd94c90e70e9cc6022d3c0a148073f10f0c92bbb60c5bc8ca61

            SHA512

            f132c9e67018c29ac75c73a7e07d816670f7cf8c3cd620faef9806826fb05e7fb70133a9093a6e2536c34db08e868b295ce1ab448dacd6d3f89d0b4ea60c1542

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

            Filesize

            1KB

            MD5

            33b19d75aa77114216dbc23f43b195e3

            SHA1

            36a6c3975e619e0c5232aa4f5b7dc1fec9525535

            SHA256

            b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

            SHA512

            676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ratt.exe.log

            Filesize

            1KB

            MD5

            9a2d0ce437d2445330f2646472703087

            SHA1

            33c83e484a15f35c2caa3af62d5da6b7713a20ae

            SHA256

            30ea2f716e85f8d14a201e3fb0897d745a01b113342dfb7a9b7ac133c4ef150c

            SHA512

            a61d18d90bfad9ea8afdfa37537cfea3d5a3d0c161e323fa65840c283bdc87c3de85daaff5519beea2f2719eec1c68398eea8679b55ff733a61052f073162d5d

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            a447b12efb08dfe48b13e1f079c84c50

            SHA1

            a8c0e2fac687fd1f74e8237fb0995e3d666fe23d

            SHA256

            1cdd633101530d3a1e6ea19c963fc5aaffb14c82285f0267aa941a72a52eeb7d

            SHA512

            500f07cb67a13cafb92fd5d62cf37d553b3e86838b4a5951b96f9904dae8ce431e7df92566a475cf5bd58e3cc2cb04f1fd09ac8fe4b261c436fba26a849532a0

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            ee134439263494ec4115b86cd86ce045

            SHA1

            f3901974ad792ec30ced7ca2da86049d166b5f24

            SHA256

            f604bfc6db07501db2107aba115a9705ec165f83279535464d4d2b2c44cb6f20

            SHA512

            7e41b32b76015ed07aca18cb6fc4abedaaa2324ae16b17c5673399f7dbefb5d2184606aab66f9ad57d893ab3ed002d9cc46790f9580d7b411928bd3dfca78166

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            a430fbb17716af145d5addfcfa8f62f6

            SHA1

            5a3d10d90b3f94b057a9279459575e2cd20c74ed

            SHA256

            53aa7416afb3aaebea27b2a6f24a596888d032988603d6852dbd1c1c395d69b4

            SHA512

            d25278f9dd9836e5ee28be0a4b9f7f2f0f20cfcb518c7cd9fe161126a559190626777a465f157158feffe87e741eabcd70bf44a983a29f765ac567a3f70a7920

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            1c5cc3bd19e2fc6ecd2b2360c95de2d5

            SHA1

            12f55f180c38c69f2932c98247edd1eab229c282

            SHA256

            a36fa06f8688e793f0435e32a0ae0ebafeca046d92791ec5d46093dcf941a6c5

            SHA512

            8434561f9fd080838fc29c09a0b32411d9ed4717e3073d41f1491dadaa3e2b44a18937b2fafa95efd44fa50a339c4e844e9a1e1d7d1d0297763875806aee3b9b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            11KB

            MD5

            dee0ef18a06f682325463c9cda5769ba

            SHA1

            8ec5ca303d7c37f98b6f99737a8b5110b55ecff8

            SHA256

            2c94273a5c24d051121191b301d6000ef06388ede2c7fac48bcdd6e87d986676

            SHA512

            62ae379d463d34354b902b8de4f08d7d71e011922bb417d08e07ed30511ce89468211ee542100ac8fd6d780369549ebe82f0d3e759628703aa4d17d9cc00ee58

          • C:\Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • C:\Users\Admin\AppData\Local\Temp\7z.dll

            Filesize

            328KB

            MD5

            15bbbe562f9be3e5dcbb834e635cc231

            SHA1

            7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

            SHA256

            ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

            SHA512

            769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\7z.exe

            Filesize

            71KB

            MD5

            8ba2e41b330ae9356e62eb63514cf82e

            SHA1

            8dc266467a5a0d587ed0181d4344581ef4ff30b2

            SHA256

            ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

            SHA512

            2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

          • C:\Users\Admin\AppData\Local\Temp\Add.ps1

            Filesize

            1KB

            MD5

            0df43097e0f0acd04d9e17fb43d618b9

            SHA1

            69b3ade12cb228393a93624e65f41604a17c83b6

            SHA256

            c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

            SHA512

            01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wcfa1n45.20f.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\ratt.7z

            Filesize

            693KB

            MD5

            7de6fdf3629c73bf0c29a96fa23ae055

            SHA1

            dcb37f6d43977601c6460b17387a89b9e4c0609a

            SHA256

            069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

            SHA512

            d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

          • C:\Users\Admin\AppData\Local\Temp\ratt.bat

            Filesize

            1KB

            MD5

            7ea1fec84d76294d9256ae3dca7676b2

            SHA1

            1e335451d1cbb6951bc77bf75430f4d983491342

            SHA256

            9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

            SHA512

            ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

          • C:\Users\Admin\AppData\Local\Temp\ratt.exe

            Filesize

            745.1MB

            MD5

            be788bb3680cf3809d9678ee6f7ba321

            SHA1

            499f01d5f654f83e172004dcc03f99abdd251734

            SHA256

            03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

            SHA512

            83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

          • C:\Users\Admin\AppData\Local\Temp\ratt.exe

            Filesize

            57.2MB

            MD5

            56d9c75c6330ca16070c5155ac5b2e26

            SHA1

            bc4c44aeaac9679236dc59d8c4e6142acd396d56

            SHA256

            b86b0ef26186d76a57749ed36f0bc47390604070c491b6bc6bf857b0dc49752c

            SHA512

            80444a4033748f88995172dd1dd9cf83cd2bb77974b8888222a235807a3403dee1ed162fdefb3ce1c91199316eb321c725c0cabb45c7627006add3136c8f34fe

          • memory/568-301-0x0000000000510000-0x00000000006C6000-memory.dmp

            Filesize

            1.7MB

          • memory/568-302-0x00000000054E0000-0x00000000054F0000-memory.dmp

            Filesize

            64KB

          • memory/568-300-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/1728-214-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/1728-225-0x0000000004890000-0x00000000048A0000-memory.dmp

            Filesize

            64KB

          • memory/1728-227-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/2072-148-0x0000000002FF0000-0x0000000003026000-memory.dmp

            Filesize

            216KB

          • memory/2072-152-0x00000000062A0000-0x0000000006306000-memory.dmp

            Filesize

            408KB

          • memory/2072-146-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/2072-147-0x0000000003440000-0x0000000003450000-memory.dmp

            Filesize

            64KB

          • memory/2072-149-0x0000000005B90000-0x00000000061B8000-memory.dmp

            Filesize

            6.2MB

          • memory/2072-166-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/2072-150-0x0000000005990000-0x00000000059B2000-memory.dmp

            Filesize

            136KB

          • memory/2072-151-0x0000000006230000-0x0000000006296000-memory.dmp

            Filesize

            408KB

          • memory/2072-163-0x0000000003440000-0x0000000003450000-memory.dmp

            Filesize

            64KB

          • memory/2072-162-0x0000000006940000-0x000000000695E000-memory.dmp

            Filesize

            120KB

          • memory/2120-259-0x0000000070C40000-0x0000000070C8C000-memory.dmp

            Filesize

            304KB

          • memory/2120-272-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2120-278-0x0000000007EF0000-0x0000000007F0A000-memory.dmp

            Filesize

            104KB

          • memory/2120-291-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2120-279-0x0000000007E20000-0x0000000007E28000-memory.dmp

            Filesize

            32KB

          • memory/2120-281-0x0000000007F60000-0x0000000007F82000-memory.dmp

            Filesize

            136KB

          • memory/2120-277-0x0000000007C10000-0x0000000007C1E000-memory.dmp

            Filesize

            56KB

          • memory/2120-276-0x0000000007E50000-0x0000000007EE6000-memory.dmp

            Filesize

            600KB

          • memory/2120-275-0x0000000002FF0000-0x0000000003000000-memory.dmp

            Filesize

            64KB

          • memory/2120-244-0x0000000002FF0000-0x0000000003000000-memory.dmp

            Filesize

            64KB

          • memory/2120-242-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2120-274-0x0000000007C20000-0x0000000007C2A000-memory.dmp

            Filesize

            40KB

          • memory/2120-256-0x0000000002FF0000-0x0000000003000000-memory.dmp

            Filesize

            64KB

          • memory/2120-257-0x000000007FA10000-0x000000007FA20000-memory.dmp

            Filesize

            64KB

          • memory/2120-258-0x0000000006ED0000-0x0000000006F02000-memory.dmp

            Filesize

            200KB

          • memory/2120-243-0x0000000002FF0000-0x0000000003000000-memory.dmp

            Filesize

            64KB

          • memory/2120-269-0x0000000006EB0000-0x0000000006ECE000-memory.dmp

            Filesize

            120KB

          • memory/2120-270-0x0000000008200000-0x000000000887A000-memory.dmp

            Filesize

            6.5MB

          • memory/2120-271-0x0000000007BD0000-0x0000000007BEA000-memory.dmp

            Filesize

            104KB

          • memory/2120-282-0x0000000008E30000-0x00000000093D4000-memory.dmp

            Filesize

            5.6MB

          • memory/2120-273-0x0000000002FF0000-0x0000000003000000-memory.dmp

            Filesize

            64KB

          • memory/2760-183-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/2760-169-0x0000000004D30000-0x0000000004D40000-memory.dmp

            Filesize

            64KB

          • memory/2760-168-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/2760-170-0x0000000004D30000-0x0000000004D40000-memory.dmp

            Filesize

            64KB

          • memory/2760-182-0x0000000004D30000-0x0000000004D40000-memory.dmp

            Filesize

            64KB

          • memory/4632-230-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4632-234-0x0000000010000000-0x00000000100E2000-memory.dmp

            Filesize

            904KB

          • memory/4632-238-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/4728-198-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/4728-184-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/4728-185-0x0000000003270000-0x0000000003280000-memory.dmp

            Filesize

            64KB

          • memory/4728-197-0x0000000003270000-0x0000000003280000-memory.dmp

            Filesize

            64KB

          • memory/4776-285-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/4776-295-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

            Filesize

            64KB

          • memory/4776-289-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

            Filesize

            64KB

          • memory/4776-286-0x0000000000190000-0x0000000000346000-memory.dmp

            Filesize

            1.7MB

          • memory/4776-292-0x0000000004E20000-0x0000000004E2A000-memory.dmp

            Filesize

            40KB

          • memory/4776-293-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

            Filesize

            64KB

          • memory/4776-294-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/4776-288-0x0000000004D70000-0x0000000004E02000-memory.dmp

            Filesize

            584KB

          • memory/4776-299-0x0000000074E20000-0x00000000755D0000-memory.dmp

            Filesize

            7.7MB

          • memory/4776-287-0x0000000004C30000-0x0000000004CCC000-memory.dmp

            Filesize

            624KB

          • memory/5116-199-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB

          • memory/5116-200-0x0000000005190000-0x00000000051A0000-memory.dmp

            Filesize

            64KB

          • memory/5116-212-0x0000000005190000-0x00000000051A0000-memory.dmp

            Filesize

            64KB

          • memory/5116-213-0x0000000074EF0000-0x00000000756A0000-memory.dmp

            Filesize

            7.7MB