Resubmissions

15-11-2023 15:28

231115-swlvbach2z 8

15-11-2023 15:23

231115-ssm8zabf47 8

Analysis

  • max time kernel
    270s
  • max time network
    245s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 15:23

General

  • Target

    cibfts.rar

  • Size

    912KB

  • MD5

    ee6ddecf17318eb513fdee1c0b831e43

  • SHA1

    cab714cbcbb90657c36cbc38523c91694fea2bd7

  • SHA256

    d87f723d17e0397593ea7560d6a0938e25cddcbc77b9128b90f8a1c871665ef8

  • SHA512

    5bdf541ea74dcb8a2d60be015ee67aa134f6be5f41ebf76c6d768aa3914e61938396371b5ffaa6e54086381e0f1937fa9299da36404e79baa15d68c275f72ab3

  • SSDEEP

    24576:+5R5BbqQPYE9vKVHLMGkBvwDgcPUu9eF3NRuLj:+5P4cYE9vKVHgGkBUdsxZNRun

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\cibfts.rar
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cibfts.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\cibfts.rar"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:2976
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2092
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\cibfts\" -spe -an -ai#7zMap19461:92:7zEvent17524
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe
      "C:\Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Windows\System32\wbem\WMIC.exe
        "C:\Windows\System32\wbem\WMIC.exe" process where name='explorer.exe' delete
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" àâæçèêëïîôœ€àâæàâæê
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2904
      • C:\Windows\System32\dfrgui.exe
        "C:\Windows\System32\dfrgui.exe"
        2⤵
          PID:1252
        • C:\Windows\System32\tabcal.exe
          "C:\Windows\System32\tabcal.exe" /4
          2⤵
            PID:2368
          • C:\Windows\System32\mstsc.exe
            "C:\Windows\System32\mstsc.exe" -v Iæêgæêd_æêîæêî_alloca
            2⤵
            • Enumerates connected drives
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious use of SetWindowsHookEx
            PID:2164
          • C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
            "C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe"
            2⤵
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1656
            • C:\Windows\SYSTEM32\WISPTIS.EXE
              "C:\Windows\SYSTEM32\WISPTIS.EXE" /ManualLaunch;
              3⤵
              • Suspicious use of SetWindowsHookEx
              PID:1908
          • C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe
            "C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe"
            2⤵
              PID:1160
            • C:\Windows\System32\msinfo32.exe
              "C:\Windows\System32\msinfo32.exe" <
              2⤵
                PID:3000
              • C:\Windows\System32\msiexec.exe
                "C:\Windows\System32\msiexec.exe" <
                2⤵
                  PID:1332
                • C:\Windows\System32\msra.exe
                  "C:\Windows\System32\msra.exe" <
                  2⤵
                    PID:1864
                  • C:\Windows\System32\mspaint.exe
                    "C:\Windows\System32\mspaint.exe" <
                    2⤵
                    • Drops file in Windows directory
                    • Suspicious use of SetWindowsHookEx
                    PID:3012
                  • C:\Windows\System32\wusa.exe
                    "C:\Windows\System32\wusa.exe" <
                    2⤵
                    • Drops file in Windows directory
                    PID:2328
                  • C:\Windows\System32\recdisc.exe
                    "C:\Windows\System32\recdisc.exe" <
                    2⤵
                    • Drops file in Windows directory
                    PID:1960
                  • C:\Windows\System32\msinfo32.exe
                    "C:\Windows\System32\msinfo32.exe" <
                    2⤵
                      PID:1868
                    • C:\Windows\System32\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" <
                      2⤵
                        PID:2536
                      • C:\Windows\System32\msra.exe
                        "C:\Windows\System32\msra.exe" <
                        2⤵
                          PID:1240
                        • C:\Windows\System32\mspaint.exe
                          "C:\Windows\System32\mspaint.exe" <
                          2⤵
                          • Drops file in Windows directory
                          • Suspicious use of SetWindowsHookEx
                          PID:1564
                        • C:\Windows\System32\wusa.exe
                          "C:\Windows\System32\wusa.exe" <
                          2⤵
                          • Drops file in Windows directory
                          PID:1604
                        • C:\Windows\System32\recdisc.exe
                          "C:\Windows\System32\recdisc.exe" <
                          2⤵
                          • Drops file in Windows directory
                          PID:1952
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                        • Modifies Installed Components in the registry
                        • Loads dropped DLL
                        • Drops file in Windows directory
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:600

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\MSVCP140D.dll

                        Filesize

                        899KB

                        MD5

                        65b580c9a8174fc67e1b1af0a2a715d3

                        SHA1

                        8cd8ea9c8da94c6dc559c7f63606fbf0fc4ea47a

                        SHA256

                        c722452e02d2ff3362c8fc948566ba9cafd7f069688ede9a47f5307b19f09d59

                        SHA512

                        e3eba5caf4c1d86b7b270d1b10ac52c68d53c8c688cb226b9b27afaf4f3685f50396a6524b9d842657e479d88af2d6f65ceb5b42eeceeffbb353a4cf840f5a75

                      • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\VCRUNTIME140D.dll

                        Filesize

                        162KB

                        MD5

                        54132dd5c5c2bb30c5118164b495529c

                        SHA1

                        b491106d246200463f58a3f2211fb51a34cb1b0e

                        SHA256

                        b7580fd2d2a607463a1f833f64c3dd599165172c921bf1e5b17927269b3e1b16

                        SHA512

                        aa701faf468b282f834fd6a0a06f5310075aabc891c3165f740a4a9ed047aa6cb3dd5c32ccd9504f52b45b06670685ec5cbd7271c46b149e18229141cf75837f

                      • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\VCRUNTIME140_1D.dll

                        Filesize

                        52KB

                        MD5

                        af2ff5d5a619fe0ad4f08641ca500b03

                        SHA1

                        37717918f9c76b7a4df16923c14a57f66a244ed6

                        SHA256

                        ad5303adfe2db81f00bbfafe76205522005976e11148c8e91cab7d6cebc84942

                        SHA512

                        0c12d0dea9c60712e5a1f866b04c5c877ac7866b7a7a5793ea18784aa84985c5c506c95fe8e2cf57d2801a926433fa0c6e3466cd77d6bb0ee69496bfc9710cf6

                      • C:\Users\Admin\AppData\Local\Temp\cibfts\equil\ucrtbased.dll

                        Filesize

                        1.8MB

                        MD5

                        7873612dddd9152d70d892427bc45ef0

                        SHA1

                        ab9079a43a784471ca31c4f0a34b698d99334dfa

                        SHA256

                        203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                        SHA512

                        d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                      • \??\c:\users\admin\appdata\local\temp\cibfts\equil\equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\Equil.exe

                        Filesize

                        315KB

                        MD5

                        1072ebb6213cc03ac9e95ba8d9e64e0d

                        SHA1

                        9f55afff7552396fb06ef40b20a0758a1696e24a

                        SHA256

                        9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

                        SHA512

                        6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\msvcp140d.dll

                        Filesize

                        899KB

                        MD5

                        65b580c9a8174fc67e1b1af0a2a715d3

                        SHA1

                        8cd8ea9c8da94c6dc559c7f63606fbf0fc4ea47a

                        SHA256

                        c722452e02d2ff3362c8fc948566ba9cafd7f069688ede9a47f5307b19f09d59

                        SHA512

                        e3eba5caf4c1d86b7b270d1b10ac52c68d53c8c688cb226b9b27afaf4f3685f50396a6524b9d842657e479d88af2d6f65ceb5b42eeceeffbb353a4cf840f5a75

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\ucrtbased.dll

                        Filesize

                        1.8MB

                        MD5

                        7873612dddd9152d70d892427bc45ef0

                        SHA1

                        ab9079a43a784471ca31c4f0a34b698d99334dfa

                        SHA256

                        203d10b0deaea87d5687d362ba925289a13e52b5df55b9de58ba534290af27bf

                        SHA512

                        d988e9ff11017465b019cf3b599ef7597d2c44fc37cbee9e846dee51990ca5dc45942cc183d9d25c1dfd84f33f922c2ceead6efc1ead19e8eecb509dfb78a083

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\vcruntime140_1d.dll

                        Filesize

                        52KB

                        MD5

                        af2ff5d5a619fe0ad4f08641ca500b03

                        SHA1

                        37717918f9c76b7a4df16923c14a57f66a244ed6

                        SHA256

                        ad5303adfe2db81f00bbfafe76205522005976e11148c8e91cab7d6cebc84942

                        SHA512

                        0c12d0dea9c60712e5a1f866b04c5c877ac7866b7a7a5793ea18784aa84985c5c506c95fe8e2cf57d2801a926433fa0c6e3466cd77d6bb0ee69496bfc9710cf6

                      • \Users\Admin\AppData\Local\Temp\cibfts\equil\vcruntime140d.dll

                        Filesize

                        162KB

                        MD5

                        54132dd5c5c2bb30c5118164b495529c

                        SHA1

                        b491106d246200463f58a3f2211fb51a34cb1b0e

                        SHA256

                        b7580fd2d2a607463a1f833f64c3dd599165172c921bf1e5b17927269b3e1b16

                        SHA512

                        aa701faf468b282f834fd6a0a06f5310075aabc891c3165f740a4a9ed047aa6cb3dd5c32ccd9504f52b45b06670685ec5cbd7271c46b149e18229141cf75837f

                      • memory/600-1744-0x0000000003F50000-0x0000000003F51000-memory.dmp

                        Filesize

                        4KB

                      • memory/600-1659-0x000000013FD90000-0x000000013FDFA000-memory.dmp

                        Filesize

                        424KB

                      • memory/600-1658-0x0000000003F50000-0x0000000003F51000-memory.dmp

                        Filesize

                        4KB

                      • memory/600-1652-0x000000013FD90000-0x000000013FDFA000-memory.dmp

                        Filesize

                        424KB

                      • memory/1240-1830-0x0000000002040000-0x0000000002041000-memory.dmp

                        Filesize

                        4KB

                      • memory/1240-1914-0x0000000002040000-0x0000000002041000-memory.dmp

                        Filesize

                        4KB

                      • memory/1564-1831-0x000007FEE4AC0000-0x000007FEE4B0C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1564-1911-0x0000000001BF0000-0x0000000001BF1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1564-1915-0x0000000001BF0000-0x0000000001BF1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1656-1748-0x0000000000180000-0x0000000000181000-memory.dmp

                        Filesize

                        4KB

                      • memory/1656-1662-0x0000000000180000-0x0000000000181000-memory.dmp

                        Filesize

                        4KB

                      • memory/1864-1749-0x0000000001C90000-0x0000000001C91000-memory.dmp

                        Filesize

                        4KB

                      • memory/1864-1743-0x0000000001C90000-0x0000000001C91000-memory.dmp

                        Filesize

                        4KB

                      • memory/1908-1742-0x0000000001AE0000-0x0000000001AE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1952-1916-0x0000000001AE0000-0x0000000001AE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1952-1912-0x0000000001AE0000-0x0000000001AE1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1960-1829-0x00000000001F0000-0x00000000001F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/1960-1747-0x00000000001F0000-0x00000000001F1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2164-1660-0x0000000001B40000-0x0000000001B41000-memory.dmp

                        Filesize

                        4KB

                      • memory/2396-1563-0x000000013FD90000-0x000000013FDFA000-memory.dmp

                        Filesize

                        424KB

                      • memory/2396-1996-0x00000000075E0000-0x00000000075E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2396-1657-0x00000000041E0000-0x00000000041E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2396-1913-0x00000000075E0000-0x00000000075E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2396-1567-0x00000000041E0000-0x00000000041E1000-memory.dmp

                        Filesize

                        4KB

                      • memory/2396-1473-0x000000013FD90000-0x000000013FDFA000-memory.dmp

                        Filesize

                        424KB

                      • memory/2904-1654-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                        Filesize

                        512KB

                      • memory/2904-1653-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                        Filesize

                        512KB

                      • memory/2904-1661-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                        Filesize

                        512KB

                      • memory/2904-1564-0x000007FEEEE00000-0x000007FEEF79D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2904-1565-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                        Filesize

                        512KB

                      • memory/2904-1656-0x0000000000DE0000-0x0000000000E60000-memory.dmp

                        Filesize

                        512KB

                      • memory/2904-1566-0x000007FEEEE00000-0x000007FEEF79D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2904-1568-0x0000000000D50000-0x0000000000D72000-memory.dmp

                        Filesize

                        136KB

                      • memory/2904-1569-0x0000000000D50000-0x0000000000D72000-memory.dmp

                        Filesize

                        136KB

                      • memory/2904-1655-0x000007FEEEE00000-0x000007FEEF79D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2976-59-0x000007FEF4550000-0x000007FEF4561000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-60-0x000007FEF4530000-0x000007FEF4542000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-86-0x000007FEF3940000-0x000007FEF3952000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-87-0x000007FEF3920000-0x000007FEF3938000-memory.dmp

                        Filesize

                        96KB

                      • memory/2976-88-0x000007FEF3900000-0x000007FEF3916000-memory.dmp

                        Filesize

                        88KB

                      • memory/2976-89-0x000007FEF38D0000-0x000007FEF38F9000-memory.dmp

                        Filesize

                        164KB

                      • memory/2976-90-0x000007FEF38B0000-0x000007FEF38C2000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-91-0x000007FEF3890000-0x000007FEF38A1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-92-0x000007FEF3870000-0x000007FEF3881000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-84-0x000007FEF3980000-0x000007FEF3991000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-83-0x000007FEF39A0000-0x000007FEF39B1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-82-0x000007FEF39C0000-0x000007FEF3AC2000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/2976-81-0x000007FEF3AD0000-0x000007FEF3AE1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-80-0x000007FEF3AF0000-0x000007FEF3B8F000-memory.dmp

                        Filesize

                        636KB

                      • memory/2976-79-0x000007FEF3B90000-0x000007FEF3BA3000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-78-0x000007FEF3BB0000-0x000007FEF3BC2000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-77-0x000007FEF3BD0000-0x000007FEF3BE1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-76-0x000007FEF3BF0000-0x000007FEF3C51000-memory.dmp

                        Filesize

                        388KB

                      • memory/2976-75-0x000007FEF3C60000-0x000007FEF3C71000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-74-0x000007FEF3C80000-0x000007FEF3CA5000-memory.dmp

                        Filesize

                        148KB

                      • memory/2976-73-0x000007FEF3CB0000-0x000007FEF3CE5000-memory.dmp

                        Filesize

                        212KB

                      • memory/2976-72-0x000007FEF3CF0000-0x000007FEF3E02000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/2976-71-0x000007FEF3E10000-0x000007FEF4041000-memory.dmp

                        Filesize

                        2.2MB

                      • memory/2976-69-0x000007FEF4070000-0x000007FEF4107000-memory.dmp

                        Filesize

                        604KB

                      • memory/2976-70-0x000007FEF4050000-0x000007FEF4062000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-68-0x000007FEF4110000-0x000007FEF4121000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-67-0x000007FEF4130000-0x000007FEF418C000-memory.dmp

                        Filesize

                        368KB

                      • memory/2976-66-0x000007FEF4190000-0x000007FEF4342000-memory.dmp

                        Filesize

                        1.7MB

                      • memory/2976-65-0x000007FEF4350000-0x000007FEF437C000-memory.dmp

                        Filesize

                        176KB

                      • memory/2976-64-0x000007FEF4380000-0x000007FEF44BB000-memory.dmp

                        Filesize

                        1.2MB

                      • memory/2976-63-0x000007FEF44C0000-0x000007FEF44D2000-memory.dmp

                        Filesize

                        72KB

                      • memory/2976-61-0x000007FEF4500000-0x000007FEF4521000-memory.dmp

                        Filesize

                        132KB

                      • memory/2976-62-0x000007FEF44E0000-0x000007FEF44F3000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-85-0x000007FEF3960000-0x000007FEF3971000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-29-0x000000013FD90000-0x000000013FE88000-memory.dmp

                        Filesize

                        992KB

                      • memory/2976-58-0x000007FEF4570000-0x000007FEF4593000-memory.dmp

                        Filesize

                        140KB

                      • memory/2976-57-0x000007FEF45A0000-0x000007FEF45B7000-memory.dmp

                        Filesize

                        92KB

                      • memory/2976-56-0x000007FEF4810000-0x000007FEF4834000-memory.dmp

                        Filesize

                        144KB

                      • memory/2976-55-0x000007FEF4840000-0x000007FEF4868000-memory.dmp

                        Filesize

                        160KB

                      • memory/2976-54-0x000007FEF4870000-0x000007FEF48C6000-memory.dmp

                        Filesize

                        344KB

                      • memory/2976-53-0x000007FEF48D0000-0x000007FEF48E1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-52-0x000007FEF48F0000-0x000007FEF495F000-memory.dmp

                        Filesize

                        444KB

                      • memory/2976-51-0x000007FEF4960000-0x000007FEF49C7000-memory.dmp

                        Filesize

                        412KB

                      • memory/2976-50-0x000007FEF4A40000-0x000007FEF4A70000-memory.dmp

                        Filesize

                        192KB

                      • memory/2976-49-0x000007FEF4A70000-0x000007FEF4A88000-memory.dmp

                        Filesize

                        96KB

                      • memory/2976-48-0x000007FEF4A90000-0x000007FEF4AA1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-47-0x000007FEF4AB0000-0x000007FEF4ACB000-memory.dmp

                        Filesize

                        108KB

                      • memory/2976-46-0x000007FEF4AD0000-0x000007FEF4AE1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-45-0x000007FEF65F0000-0x000007FEF6601000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-44-0x000007FEF6610000-0x000007FEF6621000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-43-0x000007FEF6630000-0x000007FEF6648000-memory.dmp

                        Filesize

                        96KB

                      • memory/2976-30-0x000007FEF7AB0000-0x000007FEF7AE4000-memory.dmp

                        Filesize

                        208KB

                      • memory/2976-31-0x000007FEF5FB0000-0x000007FEF6264000-memory.dmp

                        Filesize

                        2.7MB

                      • memory/2976-42-0x000007FEFAEC0000-0x000007FEFAEE1000-memory.dmp

                        Filesize

                        132KB

                      • memory/2976-41-0x000007FEF4D00000-0x000007FEF5DAB000-memory.dmp

                        Filesize

                        16.7MB

                      • memory/2976-40-0x000007FEF6670000-0x000007FEF66AF000-memory.dmp

                        Filesize

                        252KB

                      • memory/2976-39-0x000007FEF5DB0000-0x000007FEF5FB0000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2976-38-0x000007FEF66B0000-0x000007FEF66C1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-37-0x000007FEF66D0000-0x000007FEF66ED000-memory.dmp

                        Filesize

                        116KB

                      • memory/2976-36-0x000007FEF67A0000-0x000007FEF67B1000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-35-0x000007FEF6C40000-0x000007FEF6C57000-memory.dmp

                        Filesize

                        92KB

                      • memory/2976-34-0x000007FEF6C60000-0x000007FEF6C71000-memory.dmp

                        Filesize

                        68KB

                      • memory/2976-33-0x000007FEF6C80000-0x000007FEF6C97000-memory.dmp

                        Filesize

                        92KB

                      • memory/2976-32-0x000007FEFB6F0000-0x000007FEFB708000-memory.dmp

                        Filesize

                        96KB

                      • memory/3012-1746-0x0000000001ED0000-0x0000000001ED1000-memory.dmp

                        Filesize

                        4KB

                      • memory/3012-1745-0x000007FEE4AC0000-0x000007FEE4B0C000-memory.dmp

                        Filesize

                        304KB