Resubmissions

09/03/2024, 01:40

240309-b3w57abc62 10

09/03/2024, 01:37

240309-b14ggsbc37 10

Analysis

  • max time kernel
    63s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 01:40

General

  • Target

    b9b70b4077ca44355b4850e19c6e17d6.dll

  • Size

    2.1MB

  • MD5

    b9b70b4077ca44355b4850e19c6e17d6

  • SHA1

    01eff1a28fdfd36735a92e66ecc1b4ca7fb2c428

  • SHA256

    0a65e748685b606573e04e320955af33a9fc673b50c7dc4ca6a4d53d9235cfc1

  • SHA512

    acc2c62bc6103b766ce5df4bd207fe557e81b3490353e1f32b4b328a1c71769a056386f2497c3fa76bf22f87ccca82035aba269275ddf89e3ead1424d1d63ca6

  • SSDEEP

    12288:5VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:4fP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 25 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b9b70b4077ca44355b4850e19c6e17d6.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2176
  • C:\Windows\system32\mmc.exe
    C:\Windows\system32\mmc.exe
    1⤵
      PID:2908
    • C:\Users\Admin\AppData\Local\l2qFVh5\mmc.exe
      C:\Users\Admin\AppData\Local\l2qFVh5\mmc.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2036
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1712
      • C:\Windows\system32\Dxpserver.exe
        C:\Windows\system32\Dxpserver.exe
        1⤵
          PID:1820
        • C:\Users\Admin\AppData\Local\SlhxT8fmx\Dxpserver.exe
          C:\Users\Admin\AppData\Local\SlhxT8fmx\Dxpserver.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1864
        • C:\Windows\system32\OptionalFeatures.exe
          C:\Windows\system32\OptionalFeatures.exe
          1⤵
            PID:1352
          • C:\Users\Admin\AppData\Local\ChgXHc5\OptionalFeatures.exe
            C:\Users\Admin\AppData\Local\ChgXHc5\OptionalFeatures.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1096
          • C:\Windows\system32\SearchIndexer.exe
            C:\Windows\system32\SearchIndexer.exe /Embedding
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1224
            • C:\Windows\system32\SearchProtocolHost.exe
              "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-406356229-2805545415-1236085040-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-406356229-2805545415-1236085040-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
              2⤵
              • Suspicious use of SetWindowsHookEx
              PID:2088
            • C:\Windows\system32\SearchFilterHost.exe
              "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
              2⤵
                PID:1748
              • C:\Windows\system32\SearchProtocolHost.exe
                "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                2⤵
                • Modifies data under HKEY_USERS
                • Suspicious use of SetWindowsHookEx
                PID:2864
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe"
              1⤵
              • Enumerates system info in registry
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2168
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4d49758,0x7fef4d49768,0x7fef4d49778
                2⤵
                  PID:3052
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:2
                  2⤵
                    PID:2588
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:8
                    2⤵
                      PID:2524
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:8
                      2⤵
                        PID:2416
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2112 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:1
                        2⤵
                          PID:588
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:1
                          2⤵
                            PID:268
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:2
                            2⤵
                              PID:2828
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2264 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:2
                              2⤵
                                PID:2956
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2188 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:1
                                2⤵
                                  PID:1768
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3856 --field-trial-handle=1252,i,9529194864623722528,15657219600499382656,131072 /prefetch:8
                                  2⤵
                                    PID:2476
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:1612

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                    Filesize

                                    1024KB

                                    MD5

                                    c5d0435dfb9c35483566b872670e5889

                                    SHA1

                                    6a953801732060a197e949031be3e670ba141a32

                                    SHA256

                                    8ae38ecb80d0bb15f325b95e09be64235f7bed0e7e4d00293c7eda2c0a9390e6

                                    SHA512

                                    0d40517720271c799a790debbde357e65cf29266c220d212fc688ad043461a93cd0674bac48dfead99c211a60af6bcfcfa8d59679652c87ef380163138e72785

                                  • C:\Users\Admin\AppData\Local\ChgXHc5\OptionalFeatures.exe

                                    Filesize

                                    95KB

                                    MD5

                                    eae7af6084667c8f05412ddf096167fc

                                    SHA1

                                    0dbe8aba001447030e48e8ad5466fd23481e6140

                                    SHA256

                                    01feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc

                                    SHA512

                                    172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d

                                  • C:\Users\Admin\AppData\Local\ChgXHc5\appwiz.cpl

                                    Filesize

                                    281KB

                                    MD5

                                    bd3585fd98a3204acc6bc7503c6e2aa4

                                    SHA1

                                    63fd293ecdf84a654dd263958ee83ba0e739731f

                                    SHA256

                                    27dbf39c418fc91e9336c888f9caa159586c020a1df0d69ff36e2602f696463e

                                    SHA512

                                    96adf5758fce393a6313d4a0ee489c5ee8b7f6155afd70ae7dfabb056ac17dd19aab7d91aac3c8e838ca4e051552f28aadaa737f73c11054976970b13e031e8f

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                    Filesize

                                    986B

                                    MD5

                                    da76df4e4239058f4ea707d73874f897

                                    SHA1

                                    39abcd90702a71a37d8e09fe938199103c4ffa32

                                    SHA256

                                    f9615637351792a6ca7a9572e0e3931ff1e7e0e2401ab45de12a14ba2c364c00

                                    SHA512

                                    0118c8f2b5479afe7f9b105e482b589704407f516976a4d4687f9688dfe1d000bfe8b426852860e4aa5b7114db41d57bf5d34f58d17efebd24887c00b034140a

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    fd96a0ae09dba03c8590101eb548b8af

                                    SHA1

                                    3d49fdb1bdeb8c9be55222a4287d3f1a0b8af2e4

                                    SHA256

                                    d2640d62223a1a99216c81a3f85b4f74aa694f8eff518c0f8b535b3132acc6f4

                                    SHA512

                                    174ff5ac824b826e3ea21b6aa1f706a1bf3035b6a0dc7d6e928ee4adf2a1a703b9870c2ef46a920d2bacd1f478844837c5eab80cdaf2f0f2151ab2f6bce4b2b0

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                    Filesize

                                    4KB

                                    MD5

                                    41b6fb01e94badeb699994d69346da71

                                    SHA1

                                    60b82808588520a46b6fa505b827cd21ae6e7b21

                                    SHA256

                                    d010c532f3a6834ddba704405c320618275ea3d1aed72692e71a689716fe5faf

                                    SHA512

                                    6851236451f12eaae638fa6a33ef990aafa51e6a12f26560d7a0036fbc7aca7a5279cb11917260cf2395c1d6f6ee84df7510d0377051e98d0f4ac35667078530

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    18e723571b00fb1694a3bad6c78e4054

                                    SHA1

                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                    SHA256

                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                    SHA512

                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\1033\StructuredQuerySchema.bin

                                    Filesize

                                    292KB

                                    MD5

                                    ae71383c3cbc5a7c64ee793a5779015b

                                    SHA1

                                    1cabfd5c590a76fe86af0c042b4d9a6e1546cf78

                                    SHA256

                                    29bbdf534e97add374f41c9a2e5a1a34952b8eac501f1a8828f5999e7e0d79f7

                                    SHA512

                                    f7703b0e5b67e2c3bbba42efe912eda68c90d7fe4425c7d2f20f02f2d6e659f71870286055eb87095a0861e4ba04a9fbf72bfb328bda10aadafe2880fd06e51d

                                  • C:\Users\Admin\AppData\Local\SlhxT8fmx\XmlLite.dll

                                    Filesize

                                    2.1MB

                                    MD5

                                    0d86aca4bb536f4afc80e5c38432132d

                                    SHA1

                                    b41175fb9d684b066a14d6e4d204b837f67243f9

                                    SHA256

                                    d52a7042c61df061d9bfa4c0b21db01d52fd89e7c3ba4c537e6782e9ff761ccd

                                    SHA512

                                    502f937d790c06834c04da7e67b5dbf078c1af68b82739392c8d56d527f24ab84c67f6c607b29088016ba357e75d01d782ff26ee8349ba17df4735f9e28ebda6

                                  • C:\Users\Admin\AppData\Local\l2qFVh5\DUser.dll

                                    Filesize

                                    2.1MB

                                    MD5

                                    9d58c1293f2e4456da4598fba459b3a7

                                    SHA1

                                    a9876e1230c5d7172d321575ef640d5c56a04cf7

                                    SHA256

                                    d69ace6ee04e348481add30b2be288d3b2ae8d639f7760963d46faad325c2629

                                    SHA512

                                    97721e7390e86e95767a8fdc97458abf4fcc4f993064ba4a2b7945c3f5aac6f14b204bfe9342fd1812b5b444cad6205f265cc8715640ab499e6a74008faafeb3

                                  • C:\Users\Admin\AppData\Local\l2qFVh5\mmc.exe

                                    Filesize

                                    2.0MB

                                    MD5

                                    9fea051a9585f2a303d55745b4bf63aa

                                    SHA1

                                    f5dc12d658402900a2b01af2f018d113619b96b8

                                    SHA256

                                    b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484

                                    SHA512

                                    beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76

                                  • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jsonhdwp.lnk

                                    Filesize

                                    1KB

                                    MD5

                                    6468ce01aaaf06fa1baee7f2147ddb48

                                    SHA1

                                    8f3d1faf7e7eaa55441093181bae8828292e05e1

                                    SHA256

                                    44fdd76ad65574a94dc170b93c3143c455a88b5f363dc0992850806949411129

                                    SHA512

                                    2c7d4a5e445b9ced06fa7f3e6fa2d8a22bff4932afd7d140563548015163bb41dfed2c0f5e46c2298329cf78a1368f62f4bf012a573f7b8e5135f98a7a36ddab

                                  • \Users\Admin\AppData\Local\ChgXHc5\appwiz.cpl

                                    Filesize

                                    2.1MB

                                    MD5

                                    a413a58cbc5b5f783358202654b222f9

                                    SHA1

                                    bec615b566ecb5499376c110d638d7e312697ca2

                                    SHA256

                                    0ca2b60e9f44563f477d672755496f982646fe6004d5271b243526083b423f06

                                    SHA512

                                    c7cd62c448d0cbcacddc9ec0dd156c20d3e0eefda6288fa6efaebe216d8bddb4324e74e07e8b1be8d1614b05748d75fc4611ebc669613dae45ef427aa07399ea

                                  • \Users\Admin\AppData\Local\SlhxT8fmx\Dxpserver.exe

                                    Filesize

                                    259KB

                                    MD5

                                    4d38389fb92e43c77a524fd96dbafd21

                                    SHA1

                                    08014e52f6894cad4f1d1e6fc1a703732e9acd19

                                    SHA256

                                    070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73

                                    SHA512

                                    02d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba

                                  • memory/1096-119-0x00000000000F0000-0x00000000000F7000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/1360-24-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-50-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-4-0x0000000077AF6000-0x0000000077AF7000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1360-22-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-23-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-26-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-25-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-27-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-29-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-30-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-28-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-31-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-33-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-32-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-34-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-35-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-36-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-37-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-38-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-39-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-40-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-41-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-42-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-43-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-44-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-45-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-46-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-47-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-49-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-48-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-51-0x0000000002580000-0x0000000002587000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/1360-21-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-58-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-59-0x0000000077C01000-0x0000000077C02000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1360-62-0x0000000077D60000-0x0000000077D62000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1360-65-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-71-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-20-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-19-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-5-0x00000000025C0000-0x00000000025C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1360-18-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-17-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-7-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-13-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-16-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-15-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-14-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-141-0x0000000077AF6000-0x0000000077AF7000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1360-12-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-10-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-11-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1360-9-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/1748-367-0x000007FEEED90000-0x000007FEEEED3000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1748-368-0x000007FF50810000-0x000007FF5081A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1748-401-0x000007FF50810000-0x000007FF5081A000-memory.dmp

                                    Filesize

                                    40KB

                                  • memory/1748-400-0x000007FEEED90000-0x000007FEEEED3000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1864-101-0x0000000000080000-0x0000000000087000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/2036-84-0x0000000000150000-0x0000000000157000-memory.dmp

                                    Filesize

                                    28KB

                                  • memory/2176-8-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/2176-1-0x0000000140000000-0x0000000140211000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/2176-0-0x0000000000110000-0x0000000000117000-memory.dmp

                                    Filesize

                                    28KB