Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17-07-2024 15:09

General

  • Target

    WPS办公软件 v76.23.66.msi

  • Size

    9.5MB

  • MD5

    8b1b9af08bc62e4608d21b5568c0a581

  • SHA1

    acc808accbb6897da328a1def679b42e198bf9e0

  • SHA256

    4bf33d5531fe319bed3d1550608ded652ef6b52437b6cc94d47a0d388f5bb03b

  • SHA512

    9c03511ccc5c4f1ee386a61e91f9afadc7310d1798a2ba7d233a308fa73dfa260a868c4e30efd92b3259406f645fc50e0449b89aeab8827d32c4c725dd2f971f

  • SSDEEP

    196608:nWxLkNZONFiVDfWpugrukEa3bwQLWnhLQusRQR7p+2+E:nELkNZONFMUFruxoNazsRO7pJt

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Fatal Rat payload 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 24 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\WPS办公软件 v76.23.66.msi"
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2408
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 57B20351C076F424DC5EC915FC54B247
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3004
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C129122231DF9CDC3C177DA4B118F3A0 M Global\MSI0000
      2⤵
      • Loads dropped DLL
      PID:2772
    • C:\Windows\Installer\MSICA5C.tmp
      "C:\Windows\Installer\MSICA5C.tmp" /DontWait "C:\Users\Admin\AppData\Roaming\WPS.exe"
      2⤵
      • Executes dropped EXE
      PID:2060
    • C:\Windows\Installer\MSICA6D.tmp
      "C:\Windows\Installer\MSICA6D.tmp" /DontWait "C:\ProgramData\Microsoft\MF\thelper.exe"
      2⤵
      • Executes dropped EXE
      PID:2136
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2704
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003C4" "00000000000003E0"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2812
  • C:\ProgramData\Microsoft\MF\thelper.exe
    "C:\ProgramData\Microsoft\MF\thelper.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\thelper.exe
      "C:\Users\Admin\AppData\Local\thelper.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1220
  • C:\Users\Admin\AppData\Roaming\WPS.exe
    "C:\Users\Admin\AppData\Roaming\WPS.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:2340
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4466AE47-8568-41F5-BC0F-468E75D4C279} S-1-5-21-1385883288-3042840365-2734249351-1000:RPXOCQRF\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\ProgramData\Microsoft\MF\thelper.exe
      C:\ProgramData\Microsoft\MF\thelper.exe
      2⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f76c17f.rbs

    Filesize

    377KB

    MD5

    bc81d6150f0b41831ffc9b3280dc77d3

    SHA1

    a3b388a3c3e9a1826e38ac20a9ff923016eba549

    SHA256

    670e30912eecf8927045a57d62297212519046505767268d504f38e602c9471b

    SHA512

    9b95e5ac585e4159bd241981e5fbac4b4e6aeedf34c09d85d64c70eabdf8a007cc2f353bf53c9cc952fb41575e5e8ed3c32007d3f2426f0a01faa305c4eab7a2

  • C:\ProgramData\Microsoft\MF\Mi.jpg

    Filesize

    199KB

    MD5

    75cbb4f1e63e245bd3462cab5cb5be2c

    SHA1

    2961f8579ed879cdc1bd50dde56c6441965818ed

    SHA256

    dec9df011a3ee5fb9a9544bda976eec41667f344bc0b3166392f4cfffaf3f7c6

    SHA512

    f7620741cf450da09981f8fc8449d79981490696b84b65f35354f5be7d0d3a6ed6ce8a08334e50f5b9d81ddaaebe30b4fdb6da6fd8015b0270477d761e2ee642

  • C:\ProgramData\Microsoft\MF\XLGraphic.dll

    Filesize

    730KB

    MD5

    74c75ae5b97ad708dbe6f69d3a602430

    SHA1

    a02764d99b44ce4b1d199ef0f8ce73431d094a6a

    SHA256

    89fbb6b1ca9168a452e803dbdc6343db7c661ad70860a245d76b3b08830156e2

    SHA512

    52c5f7e00dffb1c0719d18184da2cc8ec2ad178b222775f167b87320f0683a3c2846e30190bc506f12d14c07fa45896935b3d4ac396baa14d7564996e35c2ada

  • C:\ProgramData\Microsoft\MF\XLUE.dll

    Filesize

    2.4MB

    MD5

    0abbe96e1f7a254e23a80f06a1018c69

    SHA1

    0b83322fd5e18c9da8c013a0ed952cffa34381ae

    SHA256

    10f099f68741c179d5ad60b226d15233bb02d73f84ce51a5bbbbc4eb6a08e9d4

    SHA512

    2924e1e11e11bd655f27eb0243f87002a50a2d4b80e0b0e3ad6fd4c3d75c44222fab426fcaa695881b0093babf544e8aeee50a065ea92274145b0f88b1db0c58

  • C:\ProgramData\Microsoft\MF\libpng13.dll

    Filesize

    157KB

    MD5

    bb1922dfbdd99e0b89bec66c30c31b73

    SHA1

    f7a561619c101ba9b335c0b3d318f965b8fc1dfb

    SHA256

    76457f38cbbdd3dce078a40d42d9ac0dc26ae1c4bb68ab9c880eb7ffb400fd99

    SHA512

    3054574dd645feb1468cee53db2fd456e4f923eaf5fd686557a01c72c0572b19d70f3885d47fe42e97cdf7ccc2c674a6e966ff19668907cf7828e0a943cf474a

  • C:\ProgramData\Microsoft\MF\thelper.exe

    Filesize

    226KB

    MD5

    17749f66292f190ef93652eb512c5ab7

    SHA1

    e2f651aa9d37404063ffc79e920787c9d3e71fdb

    SHA256

    0aa17ee66b8dae520e82a94388b1a1d603ec2aed20c464d6cac9a521d4167f24

    SHA512

    2ef192a191dc40a16c9b8768e749175c1a57319ab896809691effcc5de61c4a38fd8a8388b8907a1985e505907a8529f4d10990e362831092c75dafb8900b13e

  • C:\ProgramData\Microsoft\MF\zlib1.dll

    Filesize

    62KB

    MD5

    37163aacc5534fbab012fb505be8d647

    SHA1

    73de6343e52180a24c74f4629e38a62ed8ad5f81

    SHA256

    0a6357a8852daaafe7aed300e2f7e69d993cac4156e882baa8a3a56b583255ba

    SHA512

    c3bed1c9bc58652ed16b162ed16a93cf7479a0492db7e6ea577001dbe859affc0b20387d93d23e06e73f49f395e4c9a5a07680f000ebb82d32269742c16a5242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    1KB

    MD5

    e94fb54871208c00df70f708ac47085b

    SHA1

    4efc31460c619ecae59c1bce2c008036d94c84b8

    SHA256

    7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

    SHA512

    2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c17ff93565f102dc8572381c68adabf

    SHA1

    b128c5792db8dd788a3b0c5bbb155b9a85daa4b4

    SHA256

    9cae19e820e27c4cc1f5115c429983fe1b058b9da9ca94c68de70a2846dda14a

    SHA512

    718625ef54b8cc10e3b885c5d88e7ac0b599dd3aefa904b48c28506243a7fddd31b6ff175ec61361d03ab807c6c5fce036621e98b1d775b703bdc922a2b7bfc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560

    Filesize

    264B

    MD5

    d28398aee75e0dec54570b1763db0fd5

    SHA1

    3e5858c6f9bfa9b765c6ec37a53c99f1f380ed14

    SHA256

    32cf731e1e40aeafd8550d5ba18aedd4d150095b99b026b65cdde3ee99e31b6c

    SHA512

    c2a87654a4f7176bcedc00b79c82e19ce3c82238d5896ee4f36f21a7ae3468e191d2c6c41710236df94dc7fa19926e68984e6248475738d729f9c8896fe629ee

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.23.66\tracking.ini

    Filesize

    84B

    MD5

    55845410a3243766bae3d8dcefbc08b6

    SHA1

    7a5b630a5923ac1ffc534acb813dfa3aaaa77f12

    SHA256

    dff1a83c64016e6714415186203e592572217617d10994c17581f43b0b09eed6

    SHA512

    d3a06c730ddc43e58b8370fb85acb2a49849aad871ad3774e46387815b589da38f480abde147ce19bcf9cb3b18f65006e7100ce6e35b073855b1198848df329c

  • C:\Users\Admin\AppData\Local\AdvinstAnalytics\6696c9562ff508bfba81ef0a\76.23.66\{CFED2839-E79D-47D1-978C-039D311853A5}.session

    Filesize

    4KB

    MD5

    319005d46410a558d19e8028bdcc5b9b

    SHA1

    3dc79c0ac859cee2066b4bbf9b8d2707159e5e5b

    SHA256

    a5341c594221d647cfbb9c77de0e4e3d22c0335ebf1fd88f3e690034912935db

    SHA512

    e74111079b282add6ee49e1717320c7edc41f64c5d6be7467ee712e6c41b4e6494440c562f311604d2245ae3b348142ce0efd1ddc85aa9f9f907a26d0cb20ac7

  • C:\Users\Admin\AppData\Local\Temp\CabA3D0.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA3E2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\WPS.exe

    Filesize

    2.9MB

    MD5

    b52ba2b99108c496389ae5bb81fa6537

    SHA1

    9073d8c4a1968be24357862015519f2afecd833a

    SHA256

    c6ac7d9add40b913112b265d4f366d9ef80bbd711049db085fc750fcad4e14d8

    SHA512

    6637506ee80d359e729e0011b97e8d827e14356393193247f502b7fcfbbca249dc045b8acfe4b31ce462468f421dc5d9a4e31183bedb66c45a9aa43c01f81397

  • C:\Windows\Installer\MSIC3C8.tmp

    Filesize

    770KB

    MD5

    356fc2c181cc37e3f8ae4d6b855ebfcb

    SHA1

    2ead1e69f14099ae33a3216a9312c88007b73cd1

    SHA256

    c92b2d9623f19f8acfeac5fd894346515631ebb590e68f22c40a35fbacbef03c

    SHA512

    74ea73d3206ba1c6f1963caa4866589fe86636f68815c74733644ad6c4913de3f1399770f6095a48c9d94a7d934072d8d8b409a393de644265f6e456455dcebd

  • C:\Windows\Installer\MSIC4E2.tmp

    Filesize

    436KB

    MD5

    475d20c0ea477a35660e3f67ecf0a1df

    SHA1

    67340739f51e1134ae8f0ffc5ae9dd710e8e3a08

    SHA256

    426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd

    SHA512

    99525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e

  • C:\Windows\Installer\MSIC59F.tmp

    Filesize

    897KB

    MD5

    6189cdcb92ab9ddbffd95facd0b631fa

    SHA1

    b74c72cefcb5808e2c9ae4ba976fa916ba57190d

    SHA256

    519f7ac72beba9d5d7dcf71fcac15546f5cfd3bcfc37a5129e63b4e0be91a783

    SHA512

    ee9ce27628e7a07849cd9717609688ca4229d47579b69e3d3b5b2e7c2433369de9557ef6a13fa59964f57fb213cd8ca205b35f5791ea126bde5a4e00f6a11caf

  • C:\Windows\Installer\MSIC8D1.tmp

    Filesize

    187KB

    MD5

    f11e8ec00dfd2d1344d8a222e65fea09

    SHA1

    235ed90cc729c50eb6b8a36ebcd2cf044a2d8b20

    SHA256

    775037d6d7de214796f2f5850440257ae7f04952b73538da2b55db45f3b26e93

    SHA512

    6163dd8fd18b4520d7fda0986a80f2e424fe55f5d65d67f5a3519a366e53049f902a08164ea5669476100b71bb2f0c085327b7c362174cb7a051d268f10872d3

  • C:\Windows\Installer\MSICA5C.tmp

    Filesize

    389KB

    MD5

    b9545ed17695a32face8c3408a6a3553

    SHA1

    f6c31c9cd832ae2aebcd88e7b2fa6803ae93fc83

    SHA256

    1e0e63b446eecf6c9781c7d1cae1f46a3bb31654a70612f71f31538fb4f4729a

    SHA512

    f6d6dc40dcba5ff091452d7cc257427dcb7ce2a21816b4fec2ee249e63246b64667f5c4095220623533243103876433ef8c12c9b612c0e95fdfffe41d1504e04

  • \ProgramData\Microsoft\MF\XLFSIO.dll

    Filesize

    900KB

    MD5

    a06090c5f2d3df2cedc51cc99e19e821

    SHA1

    701ac97c2fd140464b234f666a0453d058c9fabf

    SHA256

    64ffdffb82fc649e6847b3c4f8678d9cca0d5117fa54c9abbb746625d3feef89

    SHA512

    541804db74a25fc5f50801f23b4d9f2be788d3c95d3d23dd8098f4c8888d1fc808e6eb6959c458965c639ea28b594a87dff7f3a89c4750c109b29b573c4535cf

  • \ProgramData\Microsoft\MF\XLFSIO2.dll

    Filesize

    209KB

    MD5

    1bc7af7a8512cf79d4f0efc5cb138ce3

    SHA1

    68fd202d9380cacd2f8e0ce06d8df1c03c791c5b

    SHA256

    ef474b18f89310c067a859d55abd4e4f42fdac732e49eafe4246545e36872a62

    SHA512

    84de4d193d22a305be2ba28fc67bd1cccf83616cead721e57347f1b2e0736d351fef1abf168f7914caa1bcc7a72db43769991016673cd4646def544802ee8960

  • \ProgramData\Microsoft\MF\XLLuaRuntime.dll

    Filesize

    249KB

    MD5

    5362cb2efe55c6d6e9b51849ec0706b2

    SHA1

    d91acbe95dedc3bcac7ec0051c04ddddd5652778

    SHA256

    1d7519acca9c8a013c31af2064fbc599a0b14cfd1dfb793a345fab14045fed40

    SHA512

    dbd591c3d0b9847d9cef59277c03ec89e246db0e54b58fbbe9d492b75cdcb32d75444012cdfb1c77376d15db7fde1f74e694d2487c481ce29a2133342b91e1f5

  • \ProgramData\Microsoft\MF\ic.dll

    Filesize

    1.6MB

    MD5

    bb1197bea58b158554fa3fa25866d1ea

    SHA1

    cae7f395ed42fa2dd3362f4c816fb678072feb49

    SHA256

    20a04729fdd8e02e2fb5be79af130c364d0f3ce85e49478a6819a0a2020ae844

    SHA512

    f80b7669da861400a5b5add8148b85cc62994819e3a3a2220475d7ec2fc31f70bc3c683d5a5d6043b319b428a0ac47b9b41201aee7aba5d5cc927a8556dd7b73

  • \ProgramData\Microsoft\MF\libexpat.dll

    Filesize

    668KB

    MD5

    5ff790879aab8078884eaac71affeb4a

    SHA1

    59352663fdcf24bb01c1f219410e49c15b51d5c5

    SHA256

    cceca70f34bbcec861a02c3700de79ea17d80c0a7b9f33d7edd1357a714e0f2f

    SHA512

    34fbaffc48912e3d3fa2d224e001121e8b36f5be7284a33eb31d306b9a5c00de6e23a9fdc1a17a61fb1371768f0b0e30b9c6e899a08c735fc70482d5aa8ea824

  • \ProgramData\Microsoft\MF\mt.dll

    Filesize

    1.5MB

    MD5

    9ded3fdffb0ff7f62e6a0a7f996c0caf

    SHA1

    fcc959b28a32923ccdb1ca4e304c74a31dede929

    SHA256

    87aab1db611adb132f503c08c32dc4efc23c9216d97e918f7279f86920701c93

    SHA512

    a7e7cb96a78827b01e71c595ca0d106eaf7afe35d4a548e5beccf0b009cc02d33274822958dca4998a427d8b4027eaefe99b40b3648e24730c81df34eab32ba0

  • memory/1220-439-0x0000000072A40000-0x0000000072C57000-memory.dmp

    Filesize

    2.1MB

  • memory/1220-423-0x0000000001E20000-0x0000000001E51000-memory.dmp

    Filesize

    196KB

  • memory/1220-438-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/1220-440-0x0000000072800000-0x0000000072A34000-memory.dmp

    Filesize

    2.2MB

  • memory/1220-410-0x0000000000530000-0x0000000000638000-memory.dmp

    Filesize

    1.0MB

  • memory/1220-416-0x0000000000200000-0x0000000000235000-memory.dmp

    Filesize

    212KB

  • memory/1220-420-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/1220-421-0x0000000072A40000-0x0000000072C57000-memory.dmp

    Filesize

    2.1MB

  • memory/1220-418-0x0000000000360000-0x000000000039F000-memory.dmp

    Filesize

    252KB

  • memory/1220-427-0x0000000001E60000-0x0000000001E8A000-memory.dmp

    Filesize

    168KB

  • memory/1220-422-0x0000000072800000-0x0000000072A34000-memory.dmp

    Filesize

    2.2MB

  • memory/1800-373-0x0000000000160000-0x0000000000195000-memory.dmp

    Filesize

    212KB

  • memory/1800-387-0x0000000072800000-0x0000000072A34000-memory.dmp

    Filesize

    2.2MB

  • memory/1800-377-0x00000000001B0000-0x00000000001EF000-memory.dmp

    Filesize

    252KB

  • memory/1800-388-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/1800-434-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/1800-362-0x0000000000310000-0x0000000000418000-memory.dmp

    Filesize

    1.0MB

  • memory/1800-390-0x0000000000AE0000-0x0000000000B11000-memory.dmp

    Filesize

    196KB

  • memory/1800-386-0x0000000072A40000-0x0000000072C57000-memory.dmp

    Filesize

    2.1MB

  • memory/1800-442-0x0000000072800000-0x0000000072A34000-memory.dmp

    Filesize

    2.2MB

  • memory/1800-441-0x0000000072A40000-0x0000000072C57000-memory.dmp

    Filesize

    2.1MB

  • memory/1800-395-0x0000000000C30000-0x0000000000C5A000-memory.dmp

    Filesize

    168KB

  • memory/2060-356-0x0000000000120000-0x0000000000122000-memory.dmp

    Filesize

    8KB

  • memory/2136-355-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/2340-450-0x0000000000930000-0x0000000000ED3000-memory.dmp

    Filesize

    5.6MB

  • memory/2340-443-0x0000000000930000-0x0000000000ED3000-memory.dmp

    Filesize

    5.6MB

  • memory/2340-382-0x0000000000930000-0x0000000000ED3000-memory.dmp

    Filesize

    5.6MB

  • memory/2340-459-0x0000000000930000-0x0000000000ED3000-memory.dmp

    Filesize

    5.6MB

  • memory/2340-497-0x0000000000930000-0x0000000000ED3000-memory.dmp

    Filesize

    5.6MB

  • memory/2840-468-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/2840-466-0x00000000002C0000-0x00000000002FF000-memory.dmp

    Filesize

    252KB

  • memory/2840-464-0x0000000000270000-0x00000000002A5000-memory.dmp

    Filesize

    212KB

  • memory/2840-470-0x0000000073F50000-0x0000000074184000-memory.dmp

    Filesize

    2.2MB

  • memory/2840-469-0x0000000074790000-0x00000000749A7000-memory.dmp

    Filesize

    2.1MB

  • memory/2840-471-0x0000000000800000-0x0000000000831000-memory.dmp

    Filesize

    196KB

  • memory/2840-475-0x0000000000570000-0x000000000059A000-memory.dmp

    Filesize

    168KB

  • memory/2840-491-0x0000000021C90000-0x0000000021D7F000-memory.dmp

    Filesize

    956KB

  • memory/2840-492-0x0000000074790000-0x00000000749A7000-memory.dmp

    Filesize

    2.1MB

  • memory/2840-493-0x0000000073F50000-0x0000000074184000-memory.dmp

    Filesize

    2.2MB

  • memory/2840-462-0x0000000000150000-0x0000000000258000-memory.dmp

    Filesize

    1.0MB