Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-12-2023 04:17

General

  • Target

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe

  • Size

    1.2MB

  • MD5

    64944a1f7d846006e04b6101d40a28b4

  • SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

  • SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

  • SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • SSDEEP

    24576:yV4G6JWrIWNuFYRF4Bs2kpvjpqzeRVXJIcXStT:y4WrIWMietCvjtRVJCJ

Malware Config

Signatures

  • Detect PureLogs payload 13 IoCs
  • Detect ZGRat V1 34 IoCs
  • PureLogs

    PureLogs is an infostealer written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe
    "C:\Users\Admin\AppData\Local\Temp\311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:660
    • C:\Users\Admin\AppData\Local\Temp\311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe
      C:\Users\Admin\AppData\Local\Temp\311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
  • C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe
    C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe
      C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4240
  • C:\Users\Admin\AppData\Local\Temp\aoieyn.exe
    C:\Users\Admin\AppData\Local\Temp\aoieyn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\aoieyn.exe
      C:\Users\Admin\AppData\Local\Temp\aoieyn.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:708
  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4588
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr.2miners.com:2222 -u 41ro9pm28wkFbbFCnmC78AfqpdFTw3fE56kajDNhw3naU9nXJQiqSvi7Vv71yAxLG3hXtP5Jne8utHn1oHsPXo1MQBhA5D6.miners -p x --algo rx/0 --cpu-max-threads-hint=50
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:5076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Exception\htqfhvsj\Default.exe

    Filesize

    1.2MB

    MD5

    64944a1f7d846006e04b6101d40a28b4

    SHA1

    139989bce70344cee6a009cbe197e43c263aa6a5

    SHA256

    311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa

    SHA512

    da01745a7bdefaaaa698d20b8c4c3f9a223dc49886d86560b42916f9b168249c54b6360ceebe18b5400f500247eafd8513c49cdc018995f7e770b3d775939dba

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\311a3b7def97fc40fd72447b9e581401e5dcb7ecb6fc75e160035c87746452fa.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Default.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MSBuild.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\TypeId.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\aoieyn.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\aspnet_compiler.exe.log

    Filesize

    1KB

    MD5

    c59f53fdcc8060e77447ed9ebf9dc926

    SHA1

    0f1d44782f283b315a2ad6fe37727bdc188ea21c

    SHA256

    cf0159b7d6cca6fe61a234db3b0902459af8a6af8b9f3e5d5c52bbb4231cd44d

    SHA512

    1e504b99e4bc4dbf23b7545bfb2101f51ef81558eeacac41e1c9192ecf81e6017a72e89e273023df5bd806ae71ced6cef5c0f00cf91974e75a208638bfe07f20

  • C:\Users\Admin\AppData\Local\Temp\aoieyn.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Local\Temp\aoieyn.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Local\Temp\aoieyn.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • C:\Users\Admin\AppData\Roaming\NextChannelSink\TypeId.exe

    Filesize

    1.2MB

    MD5

    ba30ecbbd32cbd96717cd1c7556d8a5b

    SHA1

    c6a0abe5f547383129058c847271019d31fec8b7

    SHA256

    d88b4a9076f8711e1d7f5593e626581c2d158a6f984baa6459f4f505e8748c3e

    SHA512

    c642f11ac4128410cf25096bc97963b73d04f10dee4e0f9b0dfd78a4ed93f4260882a2315b66327c9f4e766c15593fbc79c2b82093f0874044111170047f0d45

  • memory/660-0-0x000002E1776B0000-0x000002E1777E8000-memory.dmp

    Filesize

    1.2MB

  • memory/660-12-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/660-7-0x000002E1793F0000-0x000002E17943C000-memory.dmp

    Filesize

    304KB

  • memory/660-6-0x000002E17A060000-0x000002E17A128000-memory.dmp

    Filesize

    800KB

  • memory/660-5-0x000002E179E90000-0x000002E179F58000-memory.dmp

    Filesize

    800KB

  • memory/660-3-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/660-4-0x000002E179DA0000-0x000002E179DB0000-memory.dmp

    Filesize

    64KB

  • memory/660-2-0x000002E179DB0000-0x000002E179E90000-memory.dmp

    Filesize

    896KB

  • memory/660-1-0x000002E179CC0000-0x000002E179DA2000-memory.dmp

    Filesize

    904KB

  • memory/708-6609-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/708-6610-0x00000218689D0000-0x0000021868AD0000-memory.dmp

    Filesize

    1024KB

  • memory/708-6618-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/708-6615-0x00000218682F0000-0x0000021868300000-memory.dmp

    Filesize

    64KB

  • memory/708-6614-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/708-6613-0x0000021868BD0000-0x0000021868C26000-memory.dmp

    Filesize

    344KB

  • memory/708-6612-0x0000021868120000-0x0000021868128000-memory.dmp

    Filesize

    32KB

  • memory/2008-6611-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/2008-6596-0x0000020AECCB0000-0x0000020AECDF0000-memory.dmp

    Filesize

    1.2MB

  • memory/2008-6603-0x0000020AEF3F0000-0x0000020AEF400000-memory.dmp

    Filesize

    64KB

  • memory/2008-6602-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/2008-6600-0x0000020AEF6C0000-0x0000020AEF790000-memory.dmp

    Filesize

    832KB

  • memory/2008-6599-0x0000020AEF4F0000-0x0000020AEF5C0000-memory.dmp

    Filesize

    832KB

  • memory/2008-6598-0x0000020AEF400000-0x0000020AEF4E8000-memory.dmp

    Filesize

    928KB

  • memory/2008-6597-0x0000020AEF2D0000-0x0000020AEF3BA000-memory.dmp

    Filesize

    936KB

  • memory/2316-2198-0x00000205EACF0000-0x00000205EAD46000-memory.dmp

    Filesize

    344KB

  • memory/2316-15-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-70-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-72-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-74-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-76-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-2197-0x00000205D0B90000-0x00000205D0B98000-memory.dmp

    Filesize

    32KB

  • memory/2316-38-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-2199-0x00000205EAD70000-0x00000205EADC4000-memory.dmp

    Filesize

    336KB

  • memory/2316-2201-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/2316-36-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-34-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-8-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/2316-11-0x00000205EAC10000-0x00000205EACF4000-memory.dmp

    Filesize

    912KB

  • memory/2316-13-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/2316-32-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-30-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-14-0x00000205EADD0000-0x00000205EADE0000-memory.dmp

    Filesize

    64KB

  • memory/2316-68-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-54-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-16-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-40-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-42-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-44-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-46-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-48-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-28-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-50-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-52-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-18-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-20-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-26-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-24-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-66-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-64-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-62-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-60-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-58-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-22-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/2316-56-0x00000205EAC10000-0x00000205EACF0000-memory.dmp

    Filesize

    896KB

  • memory/3320-6623-0x000001D3151C0000-0x000001D3151D0000-memory.dmp

    Filesize

    64KB

  • memory/3320-6622-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/3320-6630-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4240-6604-0x00000143B5350000-0x00000143B5360000-memory.dmp

    Filesize

    64KB

  • memory/4240-6601-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4240-6593-0x00000143B5350000-0x00000143B5360000-memory.dmp

    Filesize

    64KB

  • memory/4240-4414-0x00000143B5350000-0x00000143B5360000-memory.dmp

    Filesize

    64KB

  • memory/4240-4406-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4240-6621-0x00000143B5350000-0x00000143B5360000-memory.dmp

    Filesize

    64KB

  • memory/4404-6642-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4404-6634-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4404-6635-0x0000021A74BB0000-0x0000021A74BC0000-memory.dmp

    Filesize

    64KB

  • memory/4540-6633-0x000001AB3E1D0000-0x000001AB3E1E0000-memory.dmp

    Filesize

    64KB

  • memory/4540-6629-0x000001AB3E1D0000-0x000001AB3E1E0000-memory.dmp

    Filesize

    64KB

  • memory/4540-6632-0x000001AB3E1D0000-0x000001AB3E1E0000-memory.dmp

    Filesize

    64KB

  • memory/4540-6636-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4540-6628-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4564-2212-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4564-2204-0x00000283D1070000-0x00000283D1152000-memory.dmp

    Filesize

    904KB

  • memory/4564-2206-0x00000283D1060000-0x00000283D1070000-memory.dmp

    Filesize

    64KB

  • memory/4564-2205-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4588-6643-0x000001CE60B80000-0x000001CE60B90000-memory.dmp

    Filesize

    64KB

  • memory/4588-6640-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/4588-6641-0x000001CE60B80000-0x000001CE60B90000-memory.dmp

    Filesize

    64KB

  • memory/5012-4399-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/5012-4401-0x0000012E7C550000-0x0000012E7C560000-memory.dmp

    Filesize

    64KB

  • memory/5012-4407-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/5096-4400-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/5096-2211-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB

  • memory/5096-2217-0x000001C76AB30000-0x000001C76AB40000-memory.dmp

    Filesize

    64KB

  • memory/5096-4397-0x000001C76AB30000-0x000001C76AB40000-memory.dmp

    Filesize

    64KB

  • memory/5096-4398-0x000001C76AB30000-0x000001C76AB40000-memory.dmp

    Filesize

    64KB

  • memory/5096-4402-0x00007FFD79950000-0x00007FFD7A33C000-memory.dmp

    Filesize

    9.9MB