Analysis

  • max time kernel
    168s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:45

General

  • Target

    newResultprot.exe

  • Size

    3.3MB

  • MD5

    3ee4cc4a7fe52761e3cb486a6c2d8e3e

  • SHA1

    c96c9bcdcc57cfc497f4b831398145b307c42b73

  • SHA256

    ece849a1ae5c71db8aaac5ad98d2022e05448083120ff3f1f758c2c020d1d03e

  • SHA512

    848e1a6dde72c3e3bdecdfb9bbe8e8e9d126fed1996a95b0294f18aee19f23c61a0d8a8947294a3a01f587edf37a59df11ce249611effd54832cbad940398515

  • SSDEEP

    98304:F49p/IqTL48s8QLbr4jYgc3TZyd2H+L05kJj9878I:Fm5xzgLQjYg6NsvrGQ

Malware Config

Extracted

Family

orcus

Botnet

Isehaaa

C2

graphics-absorption.at.ply.gg:34218

Mutex

0dae1eed35bd43dc93a1d73544aa5ccf

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    C:\Program Files\Java\jdk-19\lib\javaw.exe

  • reconnect_delay

    10000

  • registry_keyname

    javaww

  • taskscheduler_taskname

    javawww

  • watchdog_path

    Temp\Runtime Broker.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 6 IoCs
  • Orcurs Rat Executable 10 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\newResultprot.exe
    "C:\Users\Admin\AppData\Local\Temp\newResultprot.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\javaw.exe
      "C:\Users\Admin\AppData\Local\Temp\javaw.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zyoymbwy.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES50E0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC50DF.tmp"
          4⤵
            PID:1980
        • C:\Windows\SysWOW64\WindowsInput.exe
          "C:\Windows\SysWOW64\WindowsInput.exe" --install
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:1712
        • C:\Program Files\Java\jdk-19\lib\javaw.exe
          "C:\Program Files\Java\jdk-19\lib\javaw.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1284
          • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
            "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" /launchSelfAndExit "C:\Program Files\Java\jdk-19\lib\javaw.exe" 1284 /protectFile
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2044
            • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
              "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" /watchProcess "C:\Program Files\Java\jdk-19\lib\javaw.exe" 1284 "/protectFile"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1016
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:1720
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2208
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:2236
            • C:\Windows\SysWOW64\netsh.exe
              netsh wlan show profile
              4⤵
                PID:2256
              • C:\Windows\SysWOW64\findstr.exe
                findstr All
                4⤵
                  PID:2276
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2488
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  4⤵
                    PID:2520
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh wlan show networks mode=bssid
                    4⤵
                      PID:2536
              • C:\Windows\system32\taskmgr.exe
                "C:\Windows\system32\taskmgr.exe" /4
                1⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1232
                • C:\Windows\System32\perfmon.exe
                  "C:\Windows\System32\perfmon.exe" /res
                  2⤵
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1624
                • C:\Windows\System32\perfmon.exe
                  "C:\Windows\System32\perfmon.exe" /res
                  2⤵
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1748
              • C:\Windows\SysWOW64\WindowsInput.exe
                "C:\Windows\SysWOW64\WindowsInput.exe"
                1⤵
                • Executes dropped EXE
                PID:1172
              • C:\Windows\system32\taskeng.exe
                taskeng.exe {BCEEE2ED-EC5E-44E0-B1D5-CCA0D7850387} S-1-5-21-3385717845-2518323428-350143044-1000:SABDUHNY\Admin:Interactive:[1]
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:1100
                • C:\Program Files\Java\jdk-19\lib\javaw.exe
                  "C:\Program Files\Java\jdk-19\lib\javaw.exe"
                  2⤵
                  • Executes dropped EXE
                  PID:316
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2736

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files\Java\jdk-19\lib\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • C:\Program Files\Java\jdk-19\lib\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • C:\Program Files\Java\jdk-19\lib\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • C:\Program Files\Java\jdk-19\lib\javaw.exe.config

                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Users\Admin\AppData\Local\Temp\RES50E0.tmp

                Filesize

                1KB

                MD5

                c2eb2efc8a5b26b84d03544eb39bc0c5

                SHA1

                3ccabd86bdcdb421952ab747871e8abbb1fb139d

                SHA256

                f32ced46f890a9859d93c187d76471b3443ef870ebb357fb6f28fb803a749e7e

                SHA512

                d3593d16ac7c6feaef4050c1c5b47d791184656d819cf0ac288c5adce50b6fa5452d61f1fe453e4790fc7f482e30099d1188d44864e7d7faf9e7da333de4b2ea

              • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe.config

                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • C:\Users\Admin\AppData\Local\Temp\build.exe

                Filesize

                1.5MB

                MD5

                e9124859247c5c5cae6190c03fa36cb7

                SHA1

                c2d39eee48cb315cae5e3d038b1db2a6ec909bd6

                SHA256

                0106f2d291f51aabb8f97cb63bf1be337616018c7788faefc64b609dff3a5a33

                SHA512

                53fee718152c51c276ea468943eeea9b61c1f14c420b054af914b3500375998cfc556b29eec518a14556e0cc77bfd4221ef7448bbbcedacce4f8cce5949a8683

              • C:\Users\Admin\AppData\Local\Temp\build.exe

                Filesize

                1.5MB

                MD5

                e9124859247c5c5cae6190c03fa36cb7

                SHA1

                c2d39eee48cb315cae5e3d038b1db2a6ec909bd6

                SHA256

                0106f2d291f51aabb8f97cb63bf1be337616018c7788faefc64b609dff3a5a33

                SHA512

                53fee718152c51c276ea468943eeea9b61c1f14c420b054af914b3500375998cfc556b29eec518a14556e0cc77bfd4221ef7448bbbcedacce4f8cce5949a8683

              • C:\Users\Admin\AppData\Local\Temp\err_0dae1eed35bd43dc93a1d73544aa5ccf.dat

                Filesize

                1KB

                MD5

                20b2a207eabe9bdbe140f4cd71797eb8

                SHA1

                b7d2a3c736f7dddd5261ee02c4a96ea0948e8f55

                SHA256

                a10a37093360f1140ec9456ebe5222d8a78749f5760bfcc1a281a45ba7d57b05

                SHA512

                1d2b904b1149ca38225dd0be2eca5b81e2ecf92e7bd94d445b86dd3c3fa46ffd0e690c5fafaa73e35d3ebb46f0d757df3eafd1f1cc228924fc0e9cc9833176df

              • C:\Users\Admin\AppData\Local\Temp\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • C:\Users\Admin\AppData\Local\Temp\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • C:\Users\Admin\AppData\Local\Temp\zyoymbwy.dll

                Filesize

                76KB

                MD5

                56f9deb6fd18fd7a327f1da23838e59a

                SHA1

                78745d808ab74e650b754f7b0862191835b39ce0

                SHA256

                7a681238223350a393e1db15fe9b74f520c866118bf722c05eb97bd54be21305

                SHA512

                7ef999370f5fb1754b6440256934b940c4b7b19c85cecc91201c97d1dfff77d6c6219adcd4dbbd0e21821ffeaf86a7251c8510defd9b80f35a04a9b1103a9a06

              • C:\Windows\SysWOW64\WindowsInput.exe

                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe

                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe

                Filesize

                21KB

                MD5

                e6fcf516d8ed8d0d4427f86e08d0d435

                SHA1

                c7691731583ab7890086635cb7f3e4c22ca5e409

                SHA256

                8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                SHA512

                c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

              • C:\Windows\SysWOW64\WindowsInput.exe.config

                Filesize

                357B

                MD5

                a2b76cea3a59fa9af5ea21ff68139c98

                SHA1

                35d76475e6a54c168f536e30206578babff58274

                SHA256

                f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                SHA512

                b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

              • \??\c:\Users\Admin\AppData\Local\Temp\CSC50DF.tmp

                Filesize

                676B

                MD5

                3999c6db04f2973deccb4dc672825489

                SHA1

                42d3f9fd1697ab2a8635a432307c6b772e9ef31f

                SHA256

                307bf45d028288519cc8d7f270a1fa74fb76abf29cc727470da91f869e134448

                SHA512

                f105df9257c0031502e840c28dab4539c214c5c133fa8ddbb1fdb60972750b65ff6e6ae9c61e6cc376223eefd1a4e5958a21d195daf2575d66c5c32d07e453ef

              • \??\c:\Users\Admin\AppData\Local\Temp\zyoymbwy.0.cs

                Filesize

                208KB

                MD5

                2b14ae8b54d216abf4d228493ceca44a

                SHA1

                d134351498e4273e9d6391153e35416bc743adef

                SHA256

                4e1cc3da1f7bf92773aae6cffa6d61bfc3e25aead3ad947f6215f93a053f346c

                SHA512

                5761b605add10ae3ef80f3b8706c8241b4e8abe4ac3ce36b7be8a97d08b08da5a72fedd5e976b3c9e1c463613a943ebb5d323e6a075ef6c7c3b1abdc0d53ac05

              • \??\c:\Users\Admin\AppData\Local\Temp\zyoymbwy.cmdline

                Filesize

                349B

                MD5

                3766367e2db9aff43d024b36a15e5967

                SHA1

                1462181a95fec1b6b53aa1dbfccdecc9ec2d6184

                SHA256

                a235f3530a150c98003bbe4c1c131ed50c36ea18a2531c28e057d77917461175

                SHA512

                07e612500992153b56d86b2158a3171b58605ad572ae9ace23d44d999c5af8f6b16db4eaab6ed1161b80881486dfef778ed0032c8ad9ff2eb49e7a68406a6023

              • \Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                Filesize

                9KB

                MD5

                913967b216326e36a08010fb70f9dba3

                SHA1

                7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                SHA256

                8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                SHA512

                c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

              • \Users\Admin\AppData\Local\Temp\build.exe

                Filesize

                1.5MB

                MD5

                e9124859247c5c5cae6190c03fa36cb7

                SHA1

                c2d39eee48cb315cae5e3d038b1db2a6ec909bd6

                SHA256

                0106f2d291f51aabb8f97cb63bf1be337616018c7788faefc64b609dff3a5a33

                SHA512

                53fee718152c51c276ea468943eeea9b61c1f14c420b054af914b3500375998cfc556b29eec518a14556e0cc77bfd4221ef7448bbbcedacce4f8cce5949a8683

              • \Users\Admin\AppData\Local\Temp\javaw.exe

                Filesize

                938KB

                MD5

                63e784f82ebd4a7daa66c3478970f36b

                SHA1

                f319bcf48e9f647fc79aa084de027228444966e6

                SHA256

                282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                SHA512

                d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

              • memory/316-110-0x0000000000000000-mapping.dmp

              • memory/1016-120-0x0000000000000000-mapping.dmp

              • memory/1232-65-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1232-71-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1232-70-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1232-67-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1232-55-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmp

                Filesize

                8KB

              • memory/1284-96-0x0000000000000000-mapping.dmp

              • memory/1284-101-0x0000000000490000-0x00000000004EC000-memory.dmp

                Filesize

                368KB

              • memory/1284-109-0x0000000000B00000-0x0000000000B10000-memory.dmp

                Filesize

                64KB

              • memory/1284-108-0x0000000000AE0000-0x0000000000AF8000-memory.dmp

                Filesize

                96KB

              • memory/1284-107-0x00000000009D0000-0x0000000000A1E000-memory.dmp

                Filesize

                312KB

              • memory/1284-132-0x000000001B0D6000-0x000000001B0F5000-memory.dmp

                Filesize

                124KB

              • memory/1284-105-0x0000000000390000-0x0000000000398000-memory.dmp

                Filesize

                32KB

              • memory/1284-104-0x0000000000370000-0x0000000000378000-memory.dmp

                Filesize

                32KB

              • memory/1284-103-0x0000000000380000-0x0000000000392000-memory.dmp

                Filesize

                72KB

              • memory/1284-102-0x0000000000140000-0x000000000014E000-memory.dmp

                Filesize

                56KB

              • memory/1284-100-0x0000000001350000-0x0000000001440000-memory.dmp

                Filesize

                960KB

              • memory/1284-112-0x000000001B0D6000-0x000000001B0F5000-memory.dmp

                Filesize

                124KB

              • memory/1452-78-0x0000000000000000-mapping.dmp

              • memory/1624-68-0x0000000000000000-mapping.dmp

              • memory/1624-86-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1624-93-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1624-87-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1628-63-0x0000000000400000-0x0000000000A04000-memory.dmp

                Filesize

                6.0MB

              • memory/1628-54-0x0000000075F01000-0x0000000075F03000-memory.dmp

                Filesize

                8KB

              • memory/1628-69-0x0000000000400000-0x0000000000A04000-memory.dmp

                Filesize

                6.0MB

              • memory/1712-92-0x0000000001130000-0x000000000113C000-memory.dmp

                Filesize

                48KB

              • memory/1712-88-0x0000000000000000-mapping.dmp

              • memory/1720-76-0x0000000000C30000-0x0000000000DB4000-memory.dmp

                Filesize

                1.5MB

              • memory/1720-136-0x00000000057E0000-0x0000000005862000-memory.dmp

                Filesize

                520KB

              • memory/1720-131-0x0000000004BC5000-0x0000000004BD6000-memory.dmp

                Filesize

                68KB

              • memory/1720-134-0x0000000005E60000-0x0000000005EDA000-memory.dmp

                Filesize

                488KB

              • memory/1720-62-0x0000000000000000-mapping.dmp

              • memory/1720-135-0x0000000006290000-0x0000000006340000-memory.dmp

                Filesize

                704KB

              • memory/1732-75-0x000007FEF2A40000-0x000007FEF3AD6000-memory.dmp

                Filesize

                16.6MB

              • memory/1732-60-0x000007FEF3AE0000-0x000007FEF4503000-memory.dmp

                Filesize

                10.1MB

              • memory/1732-85-0x000007FEED790000-0x000007FEEEE63000-memory.dmp

                Filesize

                22.8MB

              • memory/1732-57-0x0000000000000000-mapping.dmp

              • memory/1748-94-0x0000000140000000-0x00000001405E8000-memory.dmp

                Filesize

                5.9MB

              • memory/1748-72-0x0000000000000000-mapping.dmp

              • memory/1980-81-0x0000000000000000-mapping.dmp

              • memory/2044-117-0x0000000000CB0000-0x0000000000CB8000-memory.dmp

                Filesize

                32KB

              • memory/2044-113-0x0000000000000000-mapping.dmp

              • memory/2208-122-0x0000000000000000-mapping.dmp

              • memory/2236-123-0x0000000000000000-mapping.dmp

              • memory/2256-124-0x0000000000000000-mapping.dmp

              • memory/2276-125-0x0000000000000000-mapping.dmp

              • memory/2488-127-0x0000000000000000-mapping.dmp

              • memory/2520-128-0x0000000000000000-mapping.dmp

              • memory/2536-129-0x0000000000000000-mapping.dmp