Resubmissions

23-11-2022 16:58

221123-vhcetsha73 10

23-11-2022 15:40

221123-s4g64aga7w 10

Analysis

  • max time kernel
    202s
  • max time network
    217s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:58

General

  • Target

    newResultprot.exe

  • Size

    3.3MB

  • MD5

    3ee4cc4a7fe52761e3cb486a6c2d8e3e

  • SHA1

    c96c9bcdcc57cfc497f4b831398145b307c42b73

  • SHA256

    ece849a1ae5c71db8aaac5ad98d2022e05448083120ff3f1f758c2c020d1d03e

  • SHA512

    848e1a6dde72c3e3bdecdfb9bbe8e8e9d126fed1996a95b0294f18aee19f23c61a0d8a8947294a3a01f587edf37a59df11ce249611effd54832cbad940398515

  • SSDEEP

    98304:F49p/IqTL48s8QLbr4jYgc3TZyd2H+L05kJj9878I:Fm5xzgLQjYg6NsvrGQ

Malware Config

Extracted

Family

orcus

Botnet

Isehaaa

C2

graphics-absorption.at.ply.gg:34218

Mutex

0dae1eed35bd43dc93a1d73544aa5ccf

Attributes
  • autostart_method

    Registry

  • enable_keylogger

    true

  • install_path

    C:\Program Files\Java\jdk-19\lib\javaw.exe

  • reconnect_delay

    10000

  • registry_keyname

    javaww

  • taskscheduler_taskname

    javawww

  • watchdog_path

    Temp\Runtime Broker.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus main payload 5 IoCs
  • Orcurs Rat Executable 8 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\newResultprot.exe
    "C:\Users\Admin\AppData\Local\Temp\newResultprot.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\javaw.exe
      "C:\Users\Admin\AppData\Local\Temp\javaw.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops desktop.ini file(s)
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rozspfho.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3676
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7E7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD7E6.tmp"
          4⤵
            PID:1388
        • C:\Windows\SysWOW64\WindowsInput.exe
          "C:\Windows\SysWOW64\WindowsInput.exe" --install
          3⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          PID:4328
        • C:\Program Files\Java\jdk-19\lib\javaw.exe
          "C:\Program Files\Java\jdk-19\lib\javaw.exe"
          3⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5096
          • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
            "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" /launchSelfAndExit "C:\Program Files\Java\jdk-19\lib\javaw.exe" 5096 /protectFile
            4⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4404
            • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe
              "C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe" /watchProcess "C:\Program Files\Java\jdk-19\lib\javaw.exe" 5096 "/protectFile"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3456
      • C:\Users\Admin\AppData\Local\Temp\build.exe
        "C:\Users\Admin\AppData\Local\Temp\build.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:4724
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Windows\SysWOW64\chcp.com
            chcp 65001
            4⤵
              PID:456
            • C:\Windows\SysWOW64\netsh.exe
              netsh wlan show profile
              4⤵
                PID:2536
              • C:\Windows\SysWOW64\findstr.exe
                findstr All
                4⤵
                  PID:3592
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2820
                • C:\Windows\SysWOW64\chcp.com
                  chcp 65001
                  4⤵
                    PID:428
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh wlan show networks mode=bssid
                    4⤵
                      PID:2348
              • C:\Windows\SysWOW64\WindowsInput.exe
                "C:\Windows\SysWOW64\WindowsInput.exe"
                1⤵
                • Executes dropped EXE
                PID:2540
              • C:\Program Files\Java\jdk-19\lib\javaw.exe
                "C:\Program Files\Java\jdk-19\lib\javaw.exe"
                1⤵
                • Executes dropped EXE
                PID:4196
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3892
              • C:\Windows\system32\notepad.exe
                "C:\Windows\system32\notepad.exe"
                1⤵
                  PID:5004

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Java\jdk-19\lib\javaw.exe

                  Filesize

                  938KB

                  MD5

                  63e784f82ebd4a7daa66c3478970f36b

                  SHA1

                  f319bcf48e9f647fc79aa084de027228444966e6

                  SHA256

                  282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                  SHA512

                  d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

                • C:\Program Files\Java\jdk-19\lib\javaw.exe

                  Filesize

                  938KB

                  MD5

                  63e784f82ebd4a7daa66c3478970f36b

                  SHA1

                  f319bcf48e9f647fc79aa084de027228444966e6

                  SHA256

                  282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                  SHA512

                  d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

                • C:\Program Files\Java\jdk-19\lib\javaw.exe

                  Filesize

                  938KB

                  MD5

                  63e784f82ebd4a7daa66c3478970f36b

                  SHA1

                  f319bcf48e9f647fc79aa084de027228444966e6

                  SHA256

                  282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                  SHA512

                  d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

                • C:\Program Files\Java\jdk-19\lib\javaw.exe.config

                  Filesize

                  357B

                  MD5

                  a2b76cea3a59fa9af5ea21ff68139c98

                  SHA1

                  35d76475e6a54c168f536e30206578babff58274

                  SHA256

                  f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                  SHA512

                  b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\javaw.exe.log

                  Filesize

                  1KB

                  MD5

                  9be3069b2cf9222dde6c28dd9180a35a

                  SHA1

                  14b76614ed5c94c513b10ada5bd642e888fc1231

                  SHA256

                  5e4c38466764be178ea21ba3149d0580d25d035b57e081b3abb9c06a19cfd67a

                  SHA512

                  043256f38c20d8765ddf2f1d5912249bfbb017c0b630d24d9e4894f4a759dec66bf0ffaf878ac69e9dfd6db7ec5e090dd69de2333d83299ef43888c394398885

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Runtime Broker.exe.log

                  Filesize

                  425B

                  MD5

                  4eaca4566b22b01cd3bc115b9b0b2196

                  SHA1

                  e743e0792c19f71740416e7b3c061d9f1336bf94

                  SHA256

                  34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                  SHA512

                  bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                • C:\Users\Admin\AppData\Local\Temp\RESD7E7.tmp

                  Filesize

                  1KB

                  MD5

                  f2164ed2a4dba569f412352415c3b9db

                  SHA1

                  22493bf9bd1e7e42893907124caa5f125f70212c

                  SHA256

                  0f4570bc58761a90fc003bc782c3d61021bcf230632ddfb56b389af1bce4d08a

                  SHA512

                  e292d26a9a726fb58950e5b9c9cc65cae651da83631cd621967ce51a93b025dabe0a08d6f1c815c33055e07a9859cc6ec4007564548d349198871a1a5eee0e47

                • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                  Filesize

                  9KB

                  MD5

                  913967b216326e36a08010fb70f9dba3

                  SHA1

                  7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                  SHA256

                  8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                  SHA512

                  c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

                • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                  Filesize

                  9KB

                  MD5

                  913967b216326e36a08010fb70f9dba3

                  SHA1

                  7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                  SHA256

                  8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                  SHA512

                  c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

                • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe

                  Filesize

                  9KB

                  MD5

                  913967b216326e36a08010fb70f9dba3

                  SHA1

                  7b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf

                  SHA256

                  8d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a

                  SHA512

                  c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33

                • C:\Users\Admin\AppData\Local\Temp\Runtime Broker.exe.config

                  Filesize

                  357B

                  MD5

                  a2b76cea3a59fa9af5ea21ff68139c98

                  SHA1

                  35d76475e6a54c168f536e30206578babff58274

                  SHA256

                  f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                  SHA512

                  b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

                • C:\Users\Admin\AppData\Local\Temp\build.exe

                  Filesize

                  1.5MB

                  MD5

                  e9124859247c5c5cae6190c03fa36cb7

                  SHA1

                  c2d39eee48cb315cae5e3d038b1db2a6ec909bd6

                  SHA256

                  0106f2d291f51aabb8f97cb63bf1be337616018c7788faefc64b609dff3a5a33

                  SHA512

                  53fee718152c51c276ea468943eeea9b61c1f14c420b054af914b3500375998cfc556b29eec518a14556e0cc77bfd4221ef7448bbbcedacce4f8cce5949a8683

                • C:\Users\Admin\AppData\Local\Temp\build.exe

                  Filesize

                  1.5MB

                  MD5

                  e9124859247c5c5cae6190c03fa36cb7

                  SHA1

                  c2d39eee48cb315cae5e3d038b1db2a6ec909bd6

                  SHA256

                  0106f2d291f51aabb8f97cb63bf1be337616018c7788faefc64b609dff3a5a33

                  SHA512

                  53fee718152c51c276ea468943eeea9b61c1f14c420b054af914b3500375998cfc556b29eec518a14556e0cc77bfd4221ef7448bbbcedacce4f8cce5949a8683

                • C:\Users\Admin\AppData\Local\Temp\err_0dae1eed35bd43dc93a1d73544aa5ccf.dat

                  Filesize

                  1KB

                  MD5

                  dd5ce330866120c9faf6490c75a93605

                  SHA1

                  169f54bf257b4fdf8c436498587084d189f384b7

                  SHA256

                  fa0e970f6a2793d0a1faf24b633eb9df2f42be79e87846c02b7427be1bf57625

                  SHA512

                  59390174c93f7b0dcf41be7c226c59f10f5bd957aa4f187194c0c6ed837dacaa10a0334be6e87d9a4c3071c5f7485db87d8bd587c70bdaee4a21fc40c81eb6d7

                • C:\Users\Admin\AppData\Local\Temp\javaw.exe

                  Filesize

                  938KB

                  MD5

                  63e784f82ebd4a7daa66c3478970f36b

                  SHA1

                  f319bcf48e9f647fc79aa084de027228444966e6

                  SHA256

                  282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                  SHA512

                  d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

                • C:\Users\Admin\AppData\Local\Temp\javaw.exe

                  Filesize

                  938KB

                  MD5

                  63e784f82ebd4a7daa66c3478970f36b

                  SHA1

                  f319bcf48e9f647fc79aa084de027228444966e6

                  SHA256

                  282679b3e43b8c5be4671268eb8808c72f987e1977ef685a21ff7b230dab9b51

                  SHA512

                  d3ab5b2699c2fb955bda21de2e7715478ea5498c650c3219585ab623bec957da7e5398cb0d9a52a8fe021053e157a615e1d5e575ce514a140e10b565bb72a9df

                • C:\Users\Admin\AppData\Local\Temp\rozspfho.dll

                  Filesize

                  76KB

                  MD5

                  36a57165ddfe7107285d6682c368f6b5

                  SHA1

                  1b6fe653dfbf934568315750b6736310a1a97a8c

                  SHA256

                  6f0330c16b4fd61f947762038da05e9e9e0f3434539bbeca26903a83788fe769

                  SHA512

                  c46b27c51a2c974139b9f757ed0efcaaa77fc0e843613a3672d436736d8bfa45e594eb4186d67e70c7a1a9cbb5031064b79be95285cd377c78df2f1b554bef39

                • C:\Windows\SysWOW64\WindowsInput.exe

                  Filesize

                  21KB

                  MD5

                  e6fcf516d8ed8d0d4427f86e08d0d435

                  SHA1

                  c7691731583ab7890086635cb7f3e4c22ca5e409

                  SHA256

                  8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                  SHA512

                  c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

                • C:\Windows\SysWOW64\WindowsInput.exe

                  Filesize

                  21KB

                  MD5

                  e6fcf516d8ed8d0d4427f86e08d0d435

                  SHA1

                  c7691731583ab7890086635cb7f3e4c22ca5e409

                  SHA256

                  8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                  SHA512

                  c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

                • C:\Windows\SysWOW64\WindowsInput.exe

                  Filesize

                  21KB

                  MD5

                  e6fcf516d8ed8d0d4427f86e08d0d435

                  SHA1

                  c7691731583ab7890086635cb7f3e4c22ca5e409

                  SHA256

                  8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337

                  SHA512

                  c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

                • C:\Windows\SysWOW64\WindowsInput.exe.config

                  Filesize

                  357B

                  MD5

                  a2b76cea3a59fa9af5ea21ff68139c98

                  SHA1

                  35d76475e6a54c168f536e30206578babff58274

                  SHA256

                  f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                  SHA512

                  b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

                • \??\c:\Users\Admin\AppData\Local\Temp\CSCD7E6.tmp

                  Filesize

                  676B

                  MD5

                  20cd202a07ec6f99e2532b7b3e35c901

                  SHA1

                  7404009b0643897fe311ee90316725e65e5d9be5

                  SHA256

                  fa7690eff4cc23f0eca6a29540bbe6b32fd023e811919f6a725592946bd54287

                  SHA512

                  723b3a8a18bac72d30303c942d06f7306c3f11f8b6080bbadb82a1fa58c39dd32e5f4b529b57e16643fbda807c6af468e746f916dea2f87879feb0d48121449f

                • \??\c:\Users\Admin\AppData\Local\Temp\rozspfho.0.cs

                  Filesize

                  208KB

                  MD5

                  1ba1d75b916f4b9cd633127cff7ca641

                  SHA1

                  854e5414b5b0bb5377309bd57ae97767d738825a

                  SHA256

                  a61de52eb290e3ca249e32dd96527c9d4f660709262eb508c3f73e8d54368e5f

                  SHA512

                  d689cfd94d1f9d4a0054bf40f400751364596db6ba065b253037d9e6a48fd71a3d873706b506ac00ffabb4afb2ae3200e6e302d51d246eec31ae4d7af4cf861d

                • \??\c:\Users\Admin\AppData\Local\Temp\rozspfho.cmdline

                  Filesize

                  349B

                  MD5

                  2a44493aa8fbd4978f8336856be62d99

                  SHA1

                  b6943460e4c07da87864662c47b470cfb1879b01

                  SHA256

                  99505c1ffa77ac4a7be0ad8aef23e8e542e3ec9ba8bc5f57ec6519d31ff774d2

                  SHA512

                  8c375dca6992f474983320b8626c8b09c76137ba7f1775793d3b2b301f7edd984ee5349ca89e61f61af557d5ab7f4948e56ee49c5e506faee334aa2597f75373

                • memory/428-191-0x0000000000000000-mapping.dmp

                • memory/456-186-0x0000000000000000-mapping.dmp

                • memory/1388-146-0x0000000000000000-mapping.dmp

                • memory/2308-185-0x0000000000000000-mapping.dmp

                • memory/2348-192-0x0000000000000000-mapping.dmp

                • memory/2536-188-0x0000000000000000-mapping.dmp

                • memory/2540-181-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2540-160-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2540-161-0x000000001A910000-0x000000001AA1A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/2820-190-0x0000000000000000-mapping.dmp

                • memory/3272-132-0x0000000000400000-0x0000000000A04000-memory.dmp

                  Filesize

                  6.0MB

                • memory/3272-139-0x0000000000400000-0x0000000000A04000-memory.dmp

                  Filesize

                  6.0MB

                • memory/3456-178-0x0000000000000000-mapping.dmp

                • memory/3592-189-0x0000000000000000-mapping.dmp

                • memory/3676-143-0x0000000000000000-mapping.dmp

                • memory/4136-150-0x0000000000C6A000-0x0000000000C6F000-memory.dmp

                  Filesize

                  20KB

                • memory/4136-166-0x0000000000C6A000-0x0000000000C6F000-memory.dmp

                  Filesize

                  20KB

                • memory/4136-133-0x0000000000000000-mapping.dmp

                • memory/4136-141-0x00007FFBD9AD0000-0x00007FFBDA506000-memory.dmp

                  Filesize

                  10.2MB

                • memory/4196-171-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4196-183-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4328-151-0x0000000000000000-mapping.dmp

                • memory/4328-156-0x0000000002080000-0x0000000002092000-memory.dmp

                  Filesize

                  72KB

                • memory/4328-158-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/4328-157-0x0000000002220000-0x000000000225C000-memory.dmp

                  Filesize

                  240KB

                • memory/4328-155-0x0000000000080000-0x000000000008C000-memory.dmp

                  Filesize

                  48KB

                • memory/4404-173-0x0000000000000000-mapping.dmp

                • memory/4404-177-0x00000000006A0000-0x00000000006A8000-memory.dmp

                  Filesize

                  32KB

                • memory/4724-142-0x0000000004D20000-0x0000000004D86000-memory.dmp

                  Filesize

                  408KB

                • memory/4724-140-0x0000000000210000-0x0000000000394000-memory.dmp

                  Filesize

                  1.5MB

                • memory/4724-199-0x0000000006690000-0x000000000669A000-memory.dmp

                  Filesize

                  40KB

                • memory/4724-187-0x0000000007A20000-0x0000000007FC4000-memory.dmp

                  Filesize

                  5.6MB

                • memory/4724-184-0x0000000006910000-0x00000000069A2000-memory.dmp

                  Filesize

                  584KB

                • memory/4724-193-0x0000000006560000-0x0000000006582000-memory.dmp

                  Filesize

                  136KB

                • memory/4724-136-0x0000000000000000-mapping.dmp

                • memory/5096-195-0x000000001CBF0000-0x000000001CC3A000-memory.dmp

                  Filesize

                  296KB

                • memory/5096-198-0x000000001D9D0000-0x000000001DB24000-memory.dmp

                  Filesize

                  1.3MB

                • memory/5096-168-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/5096-194-0x000000001C530000-0x000000001C574000-memory.dmp

                  Filesize

                  272KB

                • memory/5096-172-0x000000001C760000-0x000000001C922000-memory.dmp

                  Filesize

                  1.8MB

                • memory/5096-196-0x000000001D390000-0x000000001D3EA000-memory.dmp

                  Filesize

                  360KB

                • memory/5096-197-0x000000001CC40000-0x000000001CC66000-memory.dmp

                  Filesize

                  152KB

                • memory/5096-182-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB

                • memory/5096-167-0x0000000000CF0000-0x0000000000DE0000-memory.dmp

                  Filesize

                  960KB

                • memory/5096-200-0x00000000205C0000-0x0000000020744000-memory.dmp

                  Filesize

                  1.5MB

                • memory/5096-201-0x000000001D050000-0x000000001D05C000-memory.dmp

                  Filesize

                  48KB

                • memory/5096-202-0x0000000020520000-0x0000000020610000-memory.dmp

                  Filesize

                  960KB

                • memory/5096-162-0x0000000000000000-mapping.dmp

                • memory/5096-204-0x00007FFBD8CD0000-0x00007FFBD9791000-memory.dmp

                  Filesize

                  10.8MB