Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 11:13

General

  • Target

    YandexMusic Cracked.exe

  • Size

    134KB

  • MD5

    6f343370d2bc92e052ae1828346e9078

  • SHA1

    b3efaf4c1056573b072572fdbd4b97c1c8ed6a1f

  • SHA256

    61e0250d7585faa901f962413c54dcf8f3581d36b602dcabce648c3576b36b42

  • SHA512

    c559f7e319bad1342c38dc56d778171b0acd2e5a57d59721f4d8e65a3179032cba755caf81faf20c1b6c04ef1d1bfea2cf27aa542562cc5879b7faaa05d1a01e

  • SSDEEP

    1536:nnIFNFAUlDKbpIAG1x0lbRRbxEnw07Xmkgm6hDmNOt68o8X:nI5Kbp5GYlbRR1CcKNOtH/

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:23184

may-transmit.gl.at.ply.gg:23184

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    Svchost.exe

Signatures

  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\YandexMusic Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\YandexMusic Cracked.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\YandexMusic Cracked.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'YandexMusic Cracked.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1928
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2500
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Svchost.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1656
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Svchost" /tr "C:\ProgramData\Svchost.exe"
      2⤵
      • Creates scheduled task(s)
      PID:2692
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {880A94AC-9578-4127-86B6-5C384A0A84B9} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\ProgramData\Svchost.exe
      C:\ProgramData\Svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:704
    • C:\ProgramData\Svchost.exe
      C:\ProgramData\Svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\EditPing.TTS"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1968
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\MeasureResume.M2TS"
    1⤵
      PID:2208
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\MeasureResume.M2TS"
      1⤵
        PID:2104
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\UninstallConnect.xht
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1308
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1308 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2832

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Execution

      Command and Scripting Interpreter

      1
      T1059

      PowerShell

      1
      T1059.001

      Scheduled Task/Job

      1
      T1053

      Persistence

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Privilege Escalation

      Boot or Logon Autostart Execution

      1
      T1547

      Registry Run Keys / Startup Folder

      1
      T1547.001

      Scheduled Task/Job

      1
      T1053

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Svchost.exe
        Filesize

        134KB

        MD5

        6f343370d2bc92e052ae1828346e9078

        SHA1

        b3efaf4c1056573b072572fdbd4b97c1c8ed6a1f

        SHA256

        61e0250d7585faa901f962413c54dcf8f3581d36b602dcabce648c3576b36b42

        SHA512

        c559f7e319bad1342c38dc56d778171b0acd2e5a57d59721f4d8e65a3179032cba755caf81faf20c1b6c04ef1d1bfea2cf27aa542562cc5879b7faaa05d1a01e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
        Filesize

        914B

        MD5

        e4a68ac854ac5242460afd72481b2a44

        SHA1

        df3c24f9bfd666761b268073fe06d1cc8d4f82a4

        SHA256

        cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

        SHA512

        5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        1KB

        MD5

        a266bb7dcc38a562631361bbf61dd11b

        SHA1

        3b1efd3a66ea28b16697394703a72ca340a05bd5

        SHA256

        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

        SHA512

        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
        Filesize

        252B

        MD5

        614aaf2f8543bcf2c9a951f7788454f2

        SHA1

        2c7fd1c6a0c4d20addd6d5539a8c1122939b6098

        SHA256

        9aeab0ee5fd635babfa1a3a606c8f823ac4d0dfc864111cb925fe1546f02659d

        SHA512

        82ac728b916963db06f3e2f1065e21e1ccb9180804dd953a1bd9eb0fccb29601daae4ab66fc27f8c1a4fb781f944f1be9066c0de23f22ebd6d903061a977d47e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        6ef15c7f3dc9045439a4f8033c456793

        SHA1

        40859d2acbbf37bd0fc57948a5bb58b8977d00e5

        SHA256

        72630e3510bd4293f439765c5e1adf735755c852c5288201bedd5c57af55cefe

        SHA512

        a799aa0dc830e06b7afb8f8294c90e61ddf498c54c9d49efc730ddd752817041803c2048a1c58a2df90f29347a385f31bf39176f878cadf4b363f5783b3f167b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        b3c0d5c49bc4a8e25534698e6461cfe3

        SHA1

        1788a8b784f17bbf1ac3988747c10e6d130969e8

        SHA256

        5023a2f170d19de8a6c77cad63d2ab7623dcae98ecd7e05ecac7cdade73e0d9e

        SHA512

        4d660c5eff7988e28b3198da9e764941f14ebe4e8e583a44a2f6690c41b290062487fe33847287fd87b34ced61595b937e5d8fba0b540c4e7107f34f8c935720

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        7c00b9289af6c3b742a9d52beee615d7

        SHA1

        9c62f95b2fa6b95db452a702fb738fad71ccedd3

        SHA256

        bb90e9e14179225984f839b6e18bed94436af5ab5d796e1752ae96cc73621bdc

        SHA512

        6187c8e8322b80fe5531edaa43374d219fb8d6d01f8c5a17e3c2a2da3d2a3a9d363caf01db498ae76cbdac5abd1e2c7b6002a6408854015b874db210c663df1f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        44a8a15426c963ca712f847848740555

        SHA1

        f572340f788e44cd3500e429b3a6bd1fabf73896

        SHA256

        ec56537072d202ba589dec47a3bb91dbe953184a5141cb2093e0ff1e279ab6a3

        SHA512

        31774943a3f1443cfe0e52e1b530f8e2ca38755da249f9b5174fe0c64f46f1d9e3732a732c73e371f567ca20eff6e65a0560b62d0d1b308a8b26b22f3ecf9737

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        030f7fac59e737cf7dfcefc0a9e4eb33

        SHA1

        2f2341ec06bfb20ef3e4816689db800a40f6afe5

        SHA256

        232072add529de6bcff9d6d8febda98c737c1cfb57d048680d69fa7579145bd1

        SHA512

        4eb25844e9d7dc6f0a7cfeedc2698532a1e2a1b262ef8ae841073ca3faf74bda026f4d717ad9a5884d2c4416276af47387a6917afd6047c677ed8271cac840f4

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        8ea7188cd3d22b7fe34e107bf254883f

        SHA1

        e0a6cd25a74e20b095ecf7d6f79d269109a0e5ae

        SHA256

        16b9e825a1d253d9863da7e1f8b542699511e5eb14bc626705d96983937c3d49

        SHA512

        6dd871665c8ec1dd434216779daf7aa6acf0e59775b4326dfb33f8c6fd11679aefa4f9c2e8fd5107d97c84c587685fd11bb74a52dd937e6dcf700fe2383416e8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        06ffac8299abbda3f56089c8cf444324

        SHA1

        67fe02ef620b401b8f867b086082e9767873c0a5

        SHA256

        06e67e849a58b8a91a49614aabb42793188fce26ed42240abbf8d5ce120e5cf6

        SHA512

        8d97d9bd73c366b792aaed379bc7eb454f388800c7249e314d8beb4be2566553b1b07193f63fd39e35a4431ae72aaf05f296d2080832358ae5e13996aa392016

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        728a3498bcb0d1d9384b6d338b9d468c

        SHA1

        b48783b6e32659e78ad5ecfa581a13d954b8108e

        SHA256

        b8649a6fa4d2b768de485876be499b925cc52a4a3c22b9b7dede0d50e3864183

        SHA512

        39b0070cb8125020dd50c2625c774f593a0e00db43ccab1a8bb69d19af5eedf1fb9d5c700110dae818b61e8d749358e7138c7b3a358f20c9bfb3d35f66babd6a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
        Filesize

        342B

        MD5

        899ea8037f6b55f9744a87af6e4e8694

        SHA1

        154b67543f96241aeb2b0425948f3b77b64fd4a5

        SHA256

        f00e848f5fa6c052fb07f1af1935db9aa601b28a74b833a81774a2c87fc25a24

        SHA512

        24918d1ef627501ba9afb49d003f82b1e8336985a548931bf23ad75e699b7ad3d0db94885d3236bb3a933e638b4339d1b376b6020dd08386ec7261d1fda6d4eb

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
        Filesize

        242B

        MD5

        7af5cd3ed4e657ea74a44983459db26b

        SHA1

        f565c4df5e913cad62743710146a484aabfa789b

        SHA256

        1b3aacb0efe5a2e6f8c7ef3629fc43cefa8282aa404561c87431bae9748f97b8

        SHA512

        ae0adc980f1af7c97defe215922dff980a503a2161bfecd2566de55426ecd0029822f83dbbacffe19106ee364e4f43efbf7744a3b6a384c235d5938192339a80

      • C:\Users\Admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
        Filesize

        4KB

        MD5

        da597791be3b6e732f0bc8b20e38ee62

        SHA1

        1125c45d285c360542027d7554a5c442288974de

        SHA256

        5b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07

        SHA512

        d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e

      • C:\Users\Admin\AppData\Local\Temp\Tar4428.tmp
        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
        Filesize

        7KB

        MD5

        516b19fea9d42e4e975a514e908d186f

        SHA1

        574d7cbd442ea55fa4937f33eb59d74b0675a0b3

        SHA256

        6499800694f0f24eda7e59796ae05ee8ee2a1570790ea7aef55ceb9f30fb6fe8

        SHA512

        3e38797d98473691deae20059a1b84eb0eb08520fa8073affc96f4a86e4f6479e7594e27e6ae691b6a75bd6f89eb7c8ca074e327886a13d417b8337e9c4abdb6

      • memory/704-37-0x0000000000D60000-0x0000000000D88000-memory.dmp
        Filesize

        160KB

      • memory/1280-39-0x00000000010C0000-0x00000000010E8000-memory.dmp
        Filesize

        160KB

      • memory/1688-32-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp
        Filesize

        9.9MB

      • memory/1688-31-0x000007FEF50B3000-0x000007FEF50B4000-memory.dmp
        Filesize

        4KB

      • memory/1688-0-0x000007FEF50B3000-0x000007FEF50B4000-memory.dmp
        Filesize

        4KB

      • memory/1688-2-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp
        Filesize

        9.9MB

      • memory/1688-1-0x0000000000E00000-0x0000000000E28000-memory.dmp
        Filesize

        160KB

      • memory/1928-16-0x00000000027E0000-0x00000000027E8000-memory.dmp
        Filesize

        32KB

      • memory/1928-15-0x000000001B7A0000-0x000000001BA82000-memory.dmp
        Filesize

        2.9MB

      • memory/1968-597-0x000007FEE9CD0000-0x000007FEE9CE6000-memory.dmp
        Filesize

        88KB

      • memory/1968-574-0x000007FEEEBC0000-0x000007FEEEBD1000-memory.dmp
        Filesize

        68KB

      • memory/1968-564-0x000007FEEECD0000-0x000007FEEECE8000-memory.dmp
        Filesize

        96KB

      • memory/1968-568-0x000007FEEEC50000-0x000007FEEEC6B000-memory.dmp
        Filesize

        108KB

      • memory/1968-566-0x000007FEEEC90000-0x000007FEEECA1000-memory.dmp
        Filesize

        68KB

      • memory/1968-567-0x000007FEEEC70000-0x000007FEEEC81000-memory.dmp
        Filesize

        68KB

      • memory/1968-570-0x000007FEEEC10000-0x000007FEEEC28000-memory.dmp
        Filesize

        96KB

      • memory/1968-571-0x000007FEEEBE0000-0x000007FEEEC10000-memory.dmp
        Filesize

        192KB

      • memory/1968-537-0x000007FEEC230000-0x000007FEED2DB000-memory.dmp
        Filesize

        16.7MB

      • memory/1968-572-0x000007FEEEB10000-0x000007FEEEB77000-memory.dmp
        Filesize

        412KB

      • memory/1968-573-0x000007FEEEAA0000-0x000007FEEEB0F000-memory.dmp
        Filesize

        444KB

      • memory/1968-575-0x000007FEEEA40000-0x000007FEEEA96000-memory.dmp
        Filesize

        344KB

      • memory/1968-576-0x000007FEEEB90000-0x000007FEEEBB8000-memory.dmp
        Filesize

        160KB

      • memory/1968-577-0x000007FEEE9F0000-0x000007FEEEA14000-memory.dmp
        Filesize

        144KB

      • memory/1968-527-0x000007FEF1360000-0x000007FEF1377000-memory.dmp
        Filesize

        92KB

      • memory/1968-528-0x000007FEF0F90000-0x000007FEF0FA1000-memory.dmp
        Filesize

        68KB

      • memory/1968-533-0x000007FEEED80000-0x000007FEEED9D000-memory.dmp
        Filesize

        116KB

      • memory/1968-519-0x000007FEED4E0000-0x000007FEED794000-memory.dmp
        Filesize

        2.7MB

      • memory/1968-536-0x000007FEEED20000-0x000007FEEED5F000-memory.dmp
        Filesize

        252KB

      • memory/1968-535-0x000007FEED2E0000-0x000007FEED4E0000-memory.dmp
        Filesize

        2.0MB

      • memory/1968-530-0x000007FEEEDA0000-0x000007FEEEDB1000-memory.dmp
        Filesize

        68KB

      • memory/1968-526-0x000007FEF6040000-0x000007FEF6058000-memory.dmp
        Filesize

        96KB

      • memory/1968-516-0x000000013F240000-0x000000013F338000-memory.dmp
        Filesize

        992KB

      • memory/1968-518-0x000007FEF1040000-0x000007FEF1074000-memory.dmp
        Filesize

        208KB

      • memory/1968-534-0x000007FEEED60000-0x000007FEEED71000-memory.dmp
        Filesize

        68KB

      • memory/1968-529-0x000007FEEF0D0000-0x000007FEEF0E7000-memory.dmp
        Filesize

        92KB

      • memory/1968-563-0x000007FEEECF0000-0x000007FEEED11000-memory.dmp
        Filesize

        132KB

      • memory/1968-565-0x000007FEEECB0000-0x000007FEEECC1000-memory.dmp
        Filesize

        68KB

      • memory/1968-569-0x000007FEEEC30000-0x000007FEEEC41000-memory.dmp
        Filesize

        68KB

      • memory/1968-578-0x000007FEEE9D0000-0x000007FEEE9E7000-memory.dmp
        Filesize

        92KB

      • memory/1968-584-0x000007FEFAF30000-0x000007FEFAF40000-memory.dmp
        Filesize

        64KB

      • memory/1968-598-0x000007FEE9C00000-0x000007FEE9CC5000-memory.dmp
        Filesize

        788KB

      • memory/1968-616-0x000007FEE9AA0000-0x000007FEE9B0D000-memory.dmp
        Filesize

        436KB

      • memory/1968-617-0x000007FEE9920000-0x000007FEE9A98000-memory.dmp
        Filesize

        1.5MB

      • memory/1968-615-0x000007FEE9B10000-0x000007FEE9B72000-memory.dmp
        Filesize

        392KB

      • memory/1968-614-0x000007FEE9B80000-0x000007FEE9BF5000-memory.dmp
        Filesize

        468KB

      • memory/1968-579-0x000007FEEE9A0000-0x000007FEEE9C3000-memory.dmp
        Filesize

        140KB

      • memory/1968-596-0x000007FEE9CF0000-0x000007FEE9D01000-memory.dmp
        Filesize

        68KB

      • memory/1968-585-0x000007FEE9D10000-0x000007FEE9D3F000-memory.dmp
        Filesize

        188KB

      • memory/1968-583-0x000007FEE9D60000-0x000007FEE9D71000-memory.dmp
        Filesize

        68KB

      • memory/1968-582-0x000007FEE9D80000-0x000007FEE9DA1000-memory.dmp
        Filesize

        132KB

      • memory/1968-581-0x000007FEEE960000-0x000007FEEE972000-memory.dmp
        Filesize

        72KB

      • memory/1968-580-0x000007FEEE980000-0x000007FEEE991000-memory.dmp
        Filesize

        68KB

      • memory/2104-56-0x000000013F240000-0x000000013F338000-memory.dmp
        Filesize

        992KB

      • memory/2104-57-0x000007FEF1040000-0x000007FEF1074000-memory.dmp
        Filesize

        208KB

      • memory/2104-58-0x000007FEED4E0000-0x000007FEED794000-memory.dmp
        Filesize

        2.7MB

      • memory/2104-59-0x000007FEF6040000-0x000007FEF6058000-memory.dmp
        Filesize

        96KB

      • memory/2104-60-0x000007FEF1360000-0x000007FEF1377000-memory.dmp
        Filesize

        92KB

      • memory/2104-61-0x000007FEF0F90000-0x000007FEF0FA1000-memory.dmp
        Filesize

        68KB

      • memory/2208-50-0x000000013F240000-0x000000013F338000-memory.dmp
        Filesize

        992KB

      • memory/2208-53-0x000007FEF6040000-0x000007FEF6058000-memory.dmp
        Filesize

        96KB

      • memory/2208-52-0x000007FEED4E0000-0x000007FEED794000-memory.dmp
        Filesize

        2.7MB

      • memory/2208-54-0x000007FEF1360000-0x000007FEF1377000-memory.dmp
        Filesize

        92KB

      • memory/2208-55-0x000007FEF0F90000-0x000007FEF0FA1000-memory.dmp
        Filesize

        68KB

      • memory/2208-51-0x000007FEF1040000-0x000007FEF1074000-memory.dmp
        Filesize

        208KB

      • memory/2748-8-0x000000001B610000-0x000000001B8F2000-memory.dmp
        Filesize

        2.9MB

      • memory/2748-9-0x0000000002690000-0x0000000002698000-memory.dmp
        Filesize

        32KB

      • memory/2748-7-0x0000000002790000-0x0000000002810000-memory.dmp
        Filesize

        512KB