Analysis

  • max time kernel
    118s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 18:11

General

  • Target

    c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756.dll

  • Size

    664KB

  • MD5

    72dbe7ff8cb3b1c782692f3cc9615602

  • SHA1

    7b97c3abc1e53da0d174f5f49bac65b2e005f13b

  • SHA256

    c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756

  • SHA512

    cb5f4ef030942e8136626b9a225ef2b2d243dad900b2b196289335c592c537d5289382d25491c3e89bd0546a126ebdda8b6c0eee7dacd713ae155f62e8b0ea72

  • SSDEEP

    6144:P34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:PIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 12 IoCs

    Detects Dridex x64 core DLL in memory.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 8 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 57 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c3ec167bc24e86e10581efc8f52840c6af30a72fe312924da4bc3f115ed55756.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:640
  • C:\Windows\system32\sessionmsg.exe
    C:\Windows\system32\sessionmsg.exe
    1⤵
      PID:5056
    • C:\Users\Admin\AppData\Local\kqH2\sessionmsg.exe
      C:\Users\Admin\AppData\Local\kqH2\sessionmsg.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3200
    • C:\Windows\system32\dpapimig.exe
      C:\Windows\system32\dpapimig.exe
      1⤵
        PID:2172
      • C:\Users\Admin\AppData\Local\D3CbRJudl\dpapimig.exe
        C:\Users\Admin\AppData\Local\D3CbRJudl\dpapimig.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2824
      • C:\Windows\system32\WindowsActionDialog.exe
        C:\Windows\system32\WindowsActionDialog.exe
        1⤵
          PID:1596
        • C:\Users\Admin\AppData\Local\4Jx\WindowsActionDialog.exe
          C:\Users\Admin\AppData\Local\4Jx\WindowsActionDialog.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3880
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:1768
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:2644
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1808
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2768
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:4604
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:448
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:4504
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of SendNotifyMessage
          PID:3604
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4876
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1684
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:2140
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:4204
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3452
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:3680
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1992
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:876
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:4732
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:3724
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:1384
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:752
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:3964
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:212
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:3048
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:3688
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:5060
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:1640

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                          Filesize

                                          471B

                                          MD5

                                          1d8f74e42cb1b6ddead77f382bf8cd14

                                          SHA1

                                          75a03355735430e11c16904f7244d75a00cc02a5

                                          SHA256

                                          745a553f88df0f636ae699fe410d23a841047b07175cd38315d8517ca34c4793

                                          SHA512

                                          aa3d98abc7dc7d274d25aa6ffe52b2b1397036886ff38e7a6b2caaed58e10571cd9fa6149583ae6421ca0ec0a63218ffdcfb5cb9392992a63ea66e5d79780172

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                          Filesize

                                          412B

                                          MD5

                                          f2319161ca9b60266759f267300d6e93

                                          SHA1

                                          6e2427fef2162624765f9f39f6910121f6061e92

                                          SHA256

                                          e543bac4d3a09c0046a7db1d4224a8eed4f3bab44c17c4a4231ab37dc18fcfc5

                                          SHA512

                                          cd37eb00f33d1b4ed06a7b71667ee25ba4424a0ec0dab191e5e52e61f4066d7e29fa8ce4cba90f8126449436e9d926435bbb487ce99221b5fa4fa5b320e02e90

                                        • C:\Users\Admin\AppData\Local\4Jx\DUI70.dll

                                          Filesize

                                          944KB

                                          MD5

                                          6e68872325f5d876ffc0cc7a65b54277

                                          SHA1

                                          301eb4ee256154e989a01115b1c43fda4fd7fa86

                                          SHA256

                                          6208d52b46b9cc3b2e6440656fc3168250112f7113e00fdfc26d0e4b109a89d2

                                          SHA512

                                          7d3dbeda31abef6ebde7fe9fe03c3d5dba38df85b12573f7cb606c0fda18aa6099a52365af7296aaeb3b670c7da62db4e50f33aab7a8324a15a274ceec130a57

                                        • C:\Users\Admin\AppData\Local\4Jx\WindowsActionDialog.exe

                                          Filesize

                                          61KB

                                          MD5

                                          73c523b6556f2dc7eefc662338d66f8d

                                          SHA1

                                          1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

                                          SHA256

                                          0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

                                          SHA512

                                          69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

                                        • C:\Users\Admin\AppData\Local\D3CbRJudl\DUI70.dll

                                          Filesize

                                          944KB

                                          MD5

                                          9ff1cd8a43777a7796cbcbe6830162d3

                                          SHA1

                                          6c77f2b7fc57c96051796b73b0473ebae848af62

                                          SHA256

                                          cf68710ede421ca439ec52e8f4f7c3c89b7c5a43d76b695a3ef32777131c67de

                                          SHA512

                                          10c504a83ef45250d9d24c92f8329579c195f7ffded0bf6ef83195f93e1cdb60093cfa8d4f34da637830f0cfee1b1ffb6a9005741b074308801371667860aa69

                                        • C:\Users\Admin\AppData\Local\D3CbRJudl\dpapimig.exe

                                          Filesize

                                          76KB

                                          MD5

                                          b6d6477a0c90a81624c6a8548026b4d0

                                          SHA1

                                          e6eac6941d27f76bbd306c2938c0a962dbf1ced1

                                          SHA256

                                          a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb

                                          SHA512

                                          72ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                          Filesize

                                          2KB

                                          MD5

                                          3e0f600372152eb36baa6e02a3670305

                                          SHA1

                                          cab6eb0533fc7c6eb6b802de7871aef591ec3200

                                          SHA256

                                          4268c1934b000520a483f054ab12039b45a42dfe54044d44c674a0db7034d20c

                                          SHA512

                                          276b32d7ee41ef2ca7591e2d836681579c1a6bc59cb48eb21f3f0ff09dbf14d6af3e81afa3413635ce682d3a809d7d85a813ac24fbf252741095ca732e3ea49c

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133746992321374900.txt

                                          Filesize

                                          74KB

                                          MD5

                                          7d4cedc98a2ae6ca99a9df4b9cecec13

                                          SHA1

                                          2717b3371155c15ec0dce54ea59d855e7d2f37c9

                                          SHA256

                                          072c63fa37baa7ca4fc04c6d3e44de31647b7fade4985c3f4aff06d9102379db

                                          SHA512

                                          232d6ff7af974a711884ef52e2b021307612f9c10d6f4eea03d9d6de4ad7b41d3ea2867ba10a6dfb1a96eb02ac23f038a0c5c485c27024a8c266866331c9f6ba

                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\M6JCG2RK\microsoft.windows[1].xml

                                          Filesize

                                          96B

                                          MD5

                                          732a32ad072ef786d816a4f85b1b6bea

                                          SHA1

                                          fe1945717c160ac3266f291564a003c044d409b0

                                          SHA256

                                          7dd2262373fcd6ebe2ed2c6e66242c85b1434c3fe23ca92ba41ae328ce8b941e

                                          SHA512

                                          55b57d5bf942f20a3557f20adeebb4c01cde4aec9d7a4fa8bfe6281fe0981773d8ce637fdbd1dc64f25abe72d75fad2a6538fadc86483ede9fdc5b59c0d36b79

                                        • C:\Users\Admin\AppData\Local\kqH2\DUser.dll

                                          Filesize

                                          672KB

                                          MD5

                                          d4cbf3ff8115cdbeb4170a797119f81d

                                          SHA1

                                          a49d8f150120b5a8e69fd9455e365d9b3240f294

                                          SHA256

                                          85bd417a4d12d19e6dd1e1f601b29410a7c5f1fcd869c4960dc20d1e5b8e81ea

                                          SHA512

                                          d9bf53c59218c753bc06ea72a9548b4d931c371feac4077d93d2e938434b8df315782283c2ecc70ebf4c5026defb23d41d7c2ed086808f4af97348145251ad27

                                        • C:\Users\Admin\AppData\Local\kqH2\sessionmsg.exe

                                          Filesize

                                          85KB

                                          MD5

                                          480f710806b68dfe478ca1ec7d7e79cc

                                          SHA1

                                          b4fc97fed2dbff9c4874cb65ede7b50699db37cd

                                          SHA256

                                          2416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc

                                          SHA512

                                          29d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db

                                        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zcgcwwxuxxxcbkn.lnk

                                          Filesize

                                          1KB

                                          MD5

                                          fe8186380aa0ec70aca66c7bdcb39056

                                          SHA1

                                          354664a203b386bd925a0b8f5e3dcfd2c522c300

                                          SHA256

                                          cf42687b3ad9409c218a67ac56e35eb4632432b322d38d1cdc291738211daec2

                                          SHA512

                                          04915e7f77bd8b78c710337c1ef246e16a1ef31706105d42fba4f4400fbd8bd7c2597d89a345320de6d9bbff2a931af5f4ebbb088575ee62c96ff80c780b97d9

                                        • memory/448-170-0x0000000004E20000-0x0000000004E21000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/640-0-0x00007FFB438F0000-0x00007FFB43996000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/640-37-0x00007FFB438F0000-0x00007FFB43996000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/640-2-0x00000215552A0000-0x00000215552A7000-memory.dmp

                                          Filesize

                                          28KB

                                        • memory/876-646-0x000001E0B6A30000-0x000001E0B6A50000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/876-633-0x000001E0B6A70000-0x000001E0B6A90000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1684-372-0x00000255058A0000-0x00000255058C0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1684-337-0x0000025504500000-0x0000025504600000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1684-335-0x0000025504500000-0x0000025504600000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1684-341-0x00000255054D0000-0x00000255054F0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/1684-336-0x0000025504500000-0x0000025504600000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/1684-352-0x0000025505490000-0x00000255054B0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2140-487-0x0000000003F60000-0x0000000003F61000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2644-207-0x0000025FB8630000-0x0000025FB8650000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2644-172-0x0000025FB7640000-0x0000025FB7740000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/2644-202-0x0000025FB8220000-0x0000025FB8240000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2644-171-0x0000025FB7640000-0x0000025FB7740000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/2644-176-0x0000025FB8260000-0x0000025FB8280000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/2824-62-0x000001F2D6D10000-0x000001F2D6D17000-memory.dmp

                                          Filesize

                                          28KB

                                        • memory/2824-60-0x00007FFB42A70000-0x00007FFB42B5C000-memory.dmp

                                          Filesize

                                          944KB

                                        • memory/2824-65-0x00007FFB42A70000-0x00007FFB42B5C000-memory.dmp

                                          Filesize

                                          944KB

                                        • memory/3200-45-0x00007FFB42DE0000-0x00007FFB42E88000-memory.dmp

                                          Filesize

                                          672KB

                                        • memory/3200-44-0x0000020B0AA50000-0x0000020B0AA57000-memory.dmp

                                          Filesize

                                          28KB

                                        • memory/3200-49-0x00007FFB42DE0000-0x00007FFB42E88000-memory.dmp

                                          Filesize

                                          672KB

                                        • memory/3408-136-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-7-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-8-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-23-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-24-0x00007FFB52600000-0x00007FFB52610000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3408-137-0x0000000000F90000-0x0000000000F91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3408-35-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-4-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3408-3-0x00007FFB5134A000-0x00007FFB5134B000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3408-25-0x00007FFB525F0000-0x00007FFB52600000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/3408-6-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-9-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-10-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-11-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-12-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-14-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-15-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3408-22-0x0000000000F40000-0x0000000000F47000-memory.dmp

                                          Filesize

                                          28KB

                                        • memory/3408-13-0x0000000140000000-0x00000001400A6000-memory.dmp

                                          Filesize

                                          664KB

                                        • memory/3452-501-0x00000238A5CD0000-0x00000238A5CF0000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3452-494-0x00000238A5D10000-0x00000238A5D30000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3452-490-0x00000238A4E00000-0x00000238A4F00000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/3452-525-0x00000238A62E0000-0x00000238A6300000-memory.dmp

                                          Filesize

                                          128KB

                                        • memory/3604-333-0x0000000004480000-0x0000000004481000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3680-625-0x0000000004590000-0x0000000004591000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/3880-76-0x00007FFB33EA0000-0x00007FFB33F8C000-memory.dmp

                                          Filesize

                                          944KB

                                        • memory/3880-78-0x00007FFB33EA0000-0x00007FFB33F8C000-memory.dmp

                                          Filesize

                                          944KB