Analysis

  • max time kernel
    1s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 11:05

General

  • Target

    Photo.scr

  • Size

    6.0MB

  • MD5

    a20727b81b50a20483ba59ae65443dfe

  • SHA1

    7429f81064e044e981de12bde015117953b7b0e7

  • SHA256

    af94ddf7c35b9d9f016a5a4b232b43e071d59c6beb1560ba76df20df7b49ca4c

  • SHA512

    c6b857207818f1e26065ac424ee5cfdb18e5297ae8c1724a5ec8e80cf96b43bcd31b479859fa863ff508030ce52c60870152b433d548df9fbfc42a378c499856

  • SSDEEP

    98304:RLGSThOfTCiFBXmfFs+JMHpCVoR8oMEOJ6Ty3RvX+Y2naq8le+:YBfTCiUswVSLOJgyBG/aW+

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    193.239.5.25
  • Port:
    21
  • Password:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    84.234.222.47
  • Port:
    21
  • Username:
    www
  • Password:
    123456

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    198.38.82.19
  • Port:
    21
  • Username:
    www

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    84.234.222.47
  • Port:
    21
  • Username:
    www
  • Password:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    www123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    5.196.167.149
  • Port:
    21
  • Username:
    www
  • Password:
    123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    www2016

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.48.215.1
  • Port:
    21
  • Username:
    www
  • Password:
    123456

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    156.232.46.155
  • Port:
    21
  • Username:
    www
  • Password:
    root

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    198.38.82.19
  • Port:
    21
  • Password:
    123123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    149.210.222.15
  • Port:
    21
  • Username:
    www
  • Password:
    123123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.178.175.184
  • Port:
    21
  • Password:
    123456

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    123321

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    146.190.46.162
  • Port:
    21
  • Username:
    www

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    37.23.55.74
  • Port:
    21
  • Password:
    root

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    149.210.222.15
  • Port:
    21
  • Username:
    www
  • Password:
    123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    1314520

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    149.210.222.15
  • Port:
    21
  • Username:
    www
  • Password:
    www123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.178.175.184
  • Port:
    21
  • Username:
    www
  • Password:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    79.133.181.7
  • Port:
    21
  • Username:
    www
  • Password:
    root

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    38.48.215.1
  • Port:
    21
  • Password:
    admin

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    149.210.222.15
  • Port:
    21
  • Username:
    www
  • Password:
    www2016

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    103.15.235.177
  • Port:
    21
  • Username:
    www
  • Password:
    123456

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    58.76.2.227
  • Port:
    21
  • Username:
    www

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    156.232.46.155
  • Port:
    21
  • Username:
    www
  • Password:
    123123

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    216.87.186.125
  • Port:
    21
  • Username:
    www
  • Password:
    123456

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    144.76.130.2
  • Port:
    21
  • Username:
    www
  • Password:
    woaini

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    66.39.145.175
  • Port:
    21
  • Password:
    password

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    168.76.244.87
  • Port:
    21
  • Username:
    www

Signatures

  • Contacts a large (1214) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 14 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 30 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Detects Pyinstaller 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Photo.scr
    "C:\Users\Admin\AppData\Local\Temp\Photo.scr" /S
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\Photo.scr
      "C:\Users\Admin\AppData\Local\Temp\Photo.scr" /S
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3964
  • C:\Windows\SysWOW64\cmd.exe
    C:\Windows\system32\cmd.exe /c copy /y C:\Users\Admin\AppData\Local\Temp\Photo.scr C:\Users\Admin\HelpPane.exe
    1⤵
      PID:2908
    • C:\Users\Admin\HelpPane.exe
      C:\Users\Admin\HelpPane.exe --startup auto install
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\HelpPane.exe
        C:\Users\Admin\HelpPane.exe --startup auto install
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2260
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /pid 1764 /f
      1⤵
      • Kills process with taskkill
      PID:1444
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI15~1\xmrig.exe C:\Windows\TEMP\xmrig.exe
      1⤵
        PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy /y C:\Windows\TEMP\_MEI15~1\config.json C:\Windows\TEMP\config.json
        1⤵
          PID:3336
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c taskkill /pid 1764 /f
          1⤵
            PID:1452
          • C:\Users\Admin\HelpPane.exe
            "C:\Users\Admin\HelpPane.exe"
            1⤵
              PID:3652
              • C:\Windows\TEMP\xmrig.exe
                C:\Windows\TEMP\xmrig.exe
                2⤵
                  PID:2364
                • C:\Windows\SysWOW64\netsh.exe
                  netsh firewall add allowedprogram C:\Users\Admin\HelpPane.exe "MyApp" ENABLE
                  2⤵
                  • Modifies Windows Firewall
                  PID:1672
              • C:\Users\Admin\HelpPane.exe
                "C:\Users\Admin\HelpPane.exe"
                1⤵
                  PID:1572
                • C:\Users\Admin\HelpPane.exe
                  C:\Users\Admin\HelpPane.exe start
                  1⤵
                    PID:4364
                  • C:\Users\Admin\HelpPane.exe
                    C:\Users\Admin\HelpPane.exe start
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:4040
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe start
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1308
                  • C:\Windows\System32\wuapihost.exe
                    C:\Windows\System32\wuapihost.exe -Embedding
                    1⤵
                    • Executes dropped EXE
                    PID:4364
                  • C:\Windows\System32\spoolsv.exe
                    C:\Windows\System32\spoolsv.exe
                    1⤵
                      PID:3508
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\HelpPane.exe --startup auto install
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1936

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\_MEI44602\ftpcrack.exe.manifest

                      Filesize

                      1KB

                      MD5

                      b5dea49b86c5bb5d9cd8d64a09f70065

                      SHA1

                      487ef676ebd244ebc3cf197f70da7a5e393fb96e

                      SHA256

                      78b1160f6adab34d144ad19a0f4b83f83453f1e18460bbdfbe17ad354b62af7d

                      SHA512

                      1b5914f4c52f47a33c57f5f6428482e6766099bf43d4e8616ce4aabc4a917c24b2e0c98c841f0d7e7b8a202f40ff960885535539bf70cc7c7ed8687c7ece010c

                    • C:\Users\Admin\AppData\Local\Temp\_MEI44602\python27.dll

                      Filesize

                      92KB

                      MD5

                      a64534f965af64dbafebab8275327142

                      SHA1

                      60aca47a784062479fe03c1f1fc16501ed969ba9

                      SHA256

                      4fdffd590a80d4be22456590e2fe8eb4c114633404d0afddd70b982fe08afa45

                      SHA512

                      d05d842d77a8f7988f5b02aa5d81c361d159c28ba00b31ba1d592a6dffbb029cd58b5b1f55b396483861fd242ef74c31076aa83d032bd32a2092fa3eb163b607

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\_ctypes.pyd

                      Filesize

                      37KB

                      MD5

                      6cb8b560efbc381651d2045f1571d7c8

                      SHA1

                      15283a7a467adb7b6d7a7182f660dd783f90e483

                      SHA256

                      6456fea123e04bcec8a8eed26160e1df5482e69d187d3e1a0c428995472ac134

                      SHA512

                      ca2958095e8e08b5ef05ec9de15b7d1eb180923a40b90356db56a124101c96d8e745001948b89dbe9d6b9ce3c2029f7e9eaf20c73fa1d410a821d6605830bfc0

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\_hashlib.pyd

                      Filesize

                      343KB

                      MD5

                      ee134421fbabeb565e4f3ca721331c2e

                      SHA1

                      4b03bdd142c6a7bb6f74abe968c5b76b63e06059

                      SHA256

                      7863e1bedfe1ffc720b67b2eb7b3491db9d2b8e56b5574e6a40ff90336b8dafa

                      SHA512

                      d27ff65b6a8bf2e5e70d2865e72eee6930e76c2a3990428c54fc998743d3c540c5c984b5d1429e8ffbe3d160ae1f6782cd6d3ca40822f81d2052ba168595d1fa

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\_socket.pyd

                      Filesize

                      21KB

                      MD5

                      be47363992c7dd90019276d35fa8da76

                      SHA1

                      ccf7ebbe829da08efd95a53d4ba0c0d4938f6169

                      SHA256

                      be10254b111713bef20a13d561de61ca3c74a34c64ddc5b10825c64ab2c46734

                      SHA512

                      573f9111535a9a136fcaaa5c1a16c347f7327626768d849513d69c9848406b1002dcc5b8c17a291ef2e6519587533ca806018ee471a39d330f032a9e7e635ea7

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\netifaces.pyd

                      Filesize

                      11KB

                      MD5

                      c7807680a69196c3ee66c4cfb3e271ac

                      SHA1

                      d3ea74c9e3b810c6a1ee4296b97e20f2f45c9461

                      SHA256

                      1a6c57ac8031582477b1d3463a65b6eb006eea704e27c8c4b812b99ea910428d

                      SHA512

                      a5d893132ad889e98b434da7fd5ca377afb1800fd8d3230cced5e9fde576fcec943dd22fa48810ba6d93c510ebaa8ac5a94ec1b9d639fd6c533c5bbd4737cf15

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\psutil._psutil_windows.pyd

                      Filesize

                      25KB

                      MD5

                      2fc800fcc46a597921c2ed447aeb09ac

                      SHA1

                      72004227e5c60c8460f835a170798aa22861b79e

                      SHA256

                      2e4ad3d08118da77c928c4614bfecb34397cfaf53f5d46d7c7e5f1da3172c1f1

                      SHA512

                      a17022b364615b45a1873aea0de922a2988e4d75a8f4e63ecb9ca7dd46263e684b1f28b82bd77b046bbe2ad03ce65c5dacf98eaccae861a30f137e0118a87225

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\python27.dll

                      Filesize

                      877KB

                      MD5

                      8c44826a640b3cf0b32b0258c65fee07

                      SHA1

                      e3f9fe6366d0876bfa8b903b20d2acf06416f1bc

                      SHA256

                      fbad053d962bac96865ac3372958d697711800fdc46f36c87011bb5e89026614

                      SHA512

                      884e2c01c088b9ae86d4605fed1cf8e9b17f99cf887efc5644f4a91959ecd89148cca3e9fdaa6ab9e8c4dfd2d61dbdfd442a95b13dab7e5cd027b4782d473355

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\pywintypes27.dll

                      Filesize

                      52KB

                      MD5

                      07b436bfa1c7b4ffc21fb39358158060

                      SHA1

                      7f5a47cdab9a7d93bbbd204cedffca61d3f80c84

                      SHA256

                      82c2926cb03a04392fa479801d505e2a387446bca978ff930177121db2fdb461

                      SHA512

                      13ebcb83f478c859ca808003933769b84290e108648b69f33043653263c5b4bd37ed5ca8d521b46a1d9122eb232f7e5d05a25e16f250d5573cf85cd5cdefb2ef

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\servicemanager.pyd

                      Filesize

                      16KB

                      MD5

                      6a95bcf45e4be23cc2634ef5bad17660

                      SHA1

                      7d13b791588cb800c2add75ff8e74c3c493a8143

                      SHA256

                      60da4b4e628b7dc1115615128ac554aeb29b50a61629ad5aeeb5cc9d2bd86202

                      SHA512

                      d3c80b025647444f42d42e82cad50c4383728f7f8c9e16aa9d87450ca864b0b97b5f8f47e80328a4a2b67ce7d06c9a8f1dae8c5b3c798de1b2a50164161e69c8

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\win32api.pyd

                      Filesize

                      34KB

                      MD5

                      42c475231f4835bb1a5f94b0d3da4520

                      SHA1

                      fcfae296dd10c92d973a57d61bbf5c0f4a15ed6b

                      SHA256

                      87ceeb1b7586db730f48988a07018f9c8af57934ff7f173a869542207f46b0f1

                      SHA512

                      d1a699b8497e8843f990f6f719a904a7751fe2a9404cb195be2d94341728a7372cd93d379b576e6031980e1da53f2336805c6bf59e799b63565cd63d4931c02a

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48642\win32service.pyd

                      Filesize

                      18KB

                      MD5

                      f23a62491bd945c050e3e1d13909e9e7

                      SHA1

                      b8dac4e00163533157a17e3b56d05e049a2375a2

                      SHA256

                      e52b5532a6764aaae67db557412b3f77ebdc8a14a72771a1c6414a83bb3fc15c

                      SHA512

                      52200cf9687752db43bbae703192c841694d5bd976fa56c0f25e0478cfb97681bc77677c1a8907167612ddf9fe6a561945fbeb0180022670af97bf41b5b11766

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48~1\Crypto.Cipher._AES.pyd

                      Filesize

                      16KB

                      MD5

                      371397e80a55d432da47311b8ef25317

                      SHA1

                      71617777d6a2500d6464d7b394c8be5f1e4e119e

                      SHA256

                      c1a900615c9500c46b9602c30c53f299290b03632208ef1152af8830ab73ad17

                      SHA512

                      3139e2848acf02cc8475449f213873d2c2b7196f6a55c70d2d8f8b487020387740364e5ca0aa584624d1b9b01b965146a2f0e15eef34830c7c0ecbb8637dae03

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48~1\_ssl.pyd

                      Filesize

                      487KB

                      MD5

                      68c3ad86e0a8833c29ad1be10d3c025d

                      SHA1

                      04488362814b2f3ae07c4e8df8e45868d48b447f

                      SHA256

                      c236271b92a0f1d3304337f2e2444107f34d8e26272981f48c47db347133566c

                      SHA512

                      bb2819d913033cc26dcd1e5cbf015dacdbf747d29c72bfd41bfe0d74bb77e51a61cf9be4b67b6348938837125f1d0f80af0ac33531e00cea1585535952a22785

                    • C:\Users\Admin\AppData\Local\Temp\_MEI48~1\win32event.pyd

                      Filesize

                      11KB

                      MD5

                      796306be7a1abcffb8853ee9ceb5beae

                      SHA1

                      93762cf53958a3a99b674986fcf3c53c489133ed

                      SHA256

                      26e6d883e9e61bf872425526a9b8c7bb229c3b9d2f82bb3c0bf500660dbe1995

                      SHA512

                      5919a837fa1fcaea91b14d02da306928d5e523e4591dca290422c9eb9be15f2ee626a8379f5c953f2b08e7a6b2cd67618652b9efa9ace8abd47a8bd7cd8c2f64

                    • C:\Users\Admin\HelpPane.exe

                      Filesize

                      64KB

                      MD5

                      f85cf27fe8e948f85203d55c5715636d

                      SHA1

                      a86edaac0e3fc363eeeec90d057f5363b3d8b490

                      SHA256

                      71bda1db7c1c78a1350bdcb30bb6c21e1b567d04172b578ba7d236e8cbf4bd06

                      SHA512

                      ffb35eb228bc9e6daa42e5caf0bdf85f2d5ad472dd22f13e050ef8243f528090731d16f21fedd740b3726196d56913b3bb5b581b1950565853bc4d107651b1ab

                    • C:\Users\Admin\HelpPane.exe

                      Filesize

                      92KB

                      MD5

                      eba76a8b2705714196a05fb2dd7e04e3

                      SHA1

                      d241eb6088eab82ddb18396b310a7d308586a2a2

                      SHA256

                      eaa8134e2cc43029608ba3b953070fee6b2b5e138a9ab92cd04448b7d897a41b

                      SHA512

                      acfe8e7fa4c7c58ca9d803878b4b8258572897b38ef74ca4e5f853b57b1e6d400129432aa76e90bdaa085b5a68a753fa55bfe0ec2423f07d30b63033da91df01

                    • memory/2260-128-0x0000000074410000-0x0000000074421000-memory.dmp

                      Filesize

                      68KB

                    • memory/2260-163-0x0000000074410000-0x0000000074421000-memory.dmp

                      Filesize

                      68KB

                    • memory/2260-170-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/2260-161-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/2260-168-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2260-167-0x0000000002470000-0x000000000247A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2260-166-0x0000000002490000-0x00000000024A4000-memory.dmp

                      Filesize

                      80KB

                    • memory/2260-148-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2260-129-0x00000000742A0000-0x0000000074409000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2260-165-0x0000000074190000-0x0000000074297000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2260-119-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/2260-164-0x00000000742A0000-0x0000000074409000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2260-172-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/2260-153-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/2260-171-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/2260-133-0x0000000074190000-0x0000000074297000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/2260-162-0x0000000074430000-0x000000007444D000-memory.dmp

                      Filesize

                      116KB

                    • memory/2260-160-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2260-159-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/2260-157-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/2260-114-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2260-123-0x0000000074430000-0x000000007444D000-memory.dmp

                      Filesize

                      116KB

                    • memory/2260-169-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/2260-156-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/2260-150-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/2260-138-0x0000000002490000-0x00000000024A4000-memory.dmp

                      Filesize

                      80KB

                    • memory/2260-144-0x0000000002470000-0x000000000247A000-memory.dmp

                      Filesize

                      40KB

                    • memory/2364-372-0x0000000000400000-0x00000000009B6000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/3652-359-0x0000000073EC0000-0x0000000073EDD000-memory.dmp

                      Filesize

                      116KB

                    • memory/3652-271-0x0000000073EE0000-0x0000000074190000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3652-373-0x0000000073EE0000-0x0000000074190000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3652-376-0x0000000073EA0000-0x0000000073EB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/3652-364-0x0000000001950000-0x000000000195A000-memory.dmp

                      Filesize

                      40KB

                    • memory/3652-363-0x0000000001930000-0x0000000001944000-memory.dmp

                      Filesize

                      80KB

                    • memory/3652-357-0x0000000073EE0000-0x0000000074190000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3652-284-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/3652-282-0x0000000001950000-0x000000000195A000-memory.dmp

                      Filesize

                      40KB

                    • memory/3652-277-0x0000000073EA0000-0x0000000073EB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/3652-276-0x0000000073EC0000-0x0000000073EDD000-memory.dmp

                      Filesize

                      116KB

                    • memory/3652-360-0x0000000073EA0000-0x0000000073EB1000-memory.dmp

                      Filesize

                      68KB

                    • memory/3652-361-0x0000000073D30000-0x0000000073E99000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3652-283-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/3652-281-0x0000000001930000-0x0000000001944000-memory.dmp

                      Filesize

                      80KB

                    • memory/3652-280-0x0000000073C20000-0x0000000073D27000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3652-278-0x0000000073D30000-0x0000000073E99000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3652-370-0x0000000001A50000-0x0000000001A79000-memory.dmp

                      Filesize

                      164KB

                    • memory/3652-273-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/3964-326-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/3964-322-0x0000000074A00000-0x0000000074B69000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3964-40-0x0000000074B90000-0x0000000074BAD000-memory.dmp

                      Filesize

                      116KB

                    • memory/3964-46-0x0000000074A00000-0x0000000074B69000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3964-49-0x00000000748F0000-0x00000000749F7000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3964-53-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

                      Filesize

                      80KB

                    • memory/3964-65-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/3964-73-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/3964-127-0x0000000074A00000-0x0000000074B69000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3964-37-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/3964-44-0x0000000074B70000-0x0000000074B81000-memory.dmp

                      Filesize

                      68KB

                    • memory/3964-324-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

                      Filesize

                      80KB

                    • memory/3964-330-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/3964-60-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

                      Filesize

                      40KB

                    • memory/3964-329-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/3964-63-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/3964-328-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/3964-327-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/3964-34-0x0000000074C60000-0x0000000074F10000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3964-66-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/3964-71-0x0000000074C60000-0x0000000074F10000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3964-143-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/3964-72-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/3964-134-0x0000000000BB0000-0x0000000000BC4000-memory.dmp

                      Filesize

                      80KB

                    • memory/3964-325-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

                      Filesize

                      40KB

                    • memory/3964-132-0x00000000748F0000-0x00000000749F7000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3964-323-0x00000000748F0000-0x00000000749F7000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3964-318-0x0000000074C60000-0x0000000074F10000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/3964-319-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/3964-121-0x0000000074B70000-0x0000000074B81000-memory.dmp

                      Filesize

                      68KB

                    • memory/3964-117-0x0000000074B90000-0x0000000074BAD000-memory.dmp

                      Filesize

                      116KB

                    • memory/3964-320-0x0000000074B90000-0x0000000074BAD000-memory.dmp

                      Filesize

                      116KB

                    • memory/3964-321-0x0000000074B70000-0x0000000074B81000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-293-0x0000000074190000-0x0000000074297000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4364-272-0x0000000074430000-0x000000007444D000-memory.dmp

                      Filesize

                      116KB

                    • memory/4364-298-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/4364-297-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/4364-296-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-295-0x00000000028C0000-0x00000000028CA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4364-294-0x00000000028A0000-0x00000000028B4000-memory.dmp

                      Filesize

                      80KB

                    • memory/4364-231-0x00000000028A0000-0x00000000028B4000-memory.dmp

                      Filesize

                      80KB

                    • memory/4364-292-0x00000000742A0000-0x0000000074409000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/4364-291-0x0000000074410000-0x0000000074421000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-290-0x0000000074430000-0x000000007444D000-memory.dmp

                      Filesize

                      116KB

                    • memory/4364-289-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/4364-286-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4364-275-0x00000000742A0000-0x0000000074409000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/4364-300-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/4364-279-0x0000000074190000-0x0000000074297000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4364-274-0x0000000074410000-0x0000000074421000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-299-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/4364-270-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4364-238-0x000000001E7D0000-0x000000001E7DE000-memory.dmp

                      Filesize

                      56KB

                    • memory/4364-237-0x000000001E9B0000-0x000000001E9BD000-memory.dmp

                      Filesize

                      52KB

                    • memory/4364-236-0x000000001E8C0000-0x000000001E8E1000-memory.dmp

                      Filesize

                      132KB

                    • memory/4364-229-0x0000000074190000-0x0000000074297000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4364-228-0x00000000742A0000-0x0000000074409000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/4364-227-0x0000000074410000-0x0000000074421000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-224-0x0000000074450000-0x0000000074700000-memory.dmp

                      Filesize

                      2.7MB

                    • memory/4364-235-0x000000001E7A0000-0x000000001E7C7000-memory.dmp

                      Filesize

                      156KB

                    • memory/4364-234-0x000000001ECB0000-0x000000001ECC1000-memory.dmp

                      Filesize

                      68KB

                    • memory/4364-233-0x00000000028C0000-0x00000000028CA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4364-232-0x00000000028C0000-0x00000000028CA000-memory.dmp

                      Filesize

                      40KB

                    • memory/4364-230-0x00000000028A0000-0x00000000028B4000-memory.dmp

                      Filesize

                      80KB

                    • memory/4364-225-0x0000000010000000-0x000000001000E000-memory.dmp

                      Filesize

                      56KB

                    • memory/4364-226-0x0000000074430000-0x000000007444D000-memory.dmp

                      Filesize

                      116KB