Resubmissions

05-03-2024 23:31

240305-3hsqtace5s 10

05-03-2024 18:08

240305-wq4dysdc2y 10

Analysis

  • max time kernel
    1802s
  • max time network
    1608s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-03-2024 23:31

General

  • Target

    StatesFenceStatutesTennessee.exe

  • Size

    327.7MB

  • MD5

    7e25fdb1932480e3e6ec31b22d08c19e

  • SHA1

    0dfca2e6c1c89b1e85fdbb9da31a93964db7b826

  • SHA256

    fbef401c6a7ad24640f6b6583aa0d0fa02aa895c47ab08e68b0e6e312d1b42a5

  • SHA512

    2bb81a8ddda7ef4bbc9508c7c80f56b5a00215674ad38e442937c42a2ecdf4e827b906b97bf63c67c36dd0a7ef78d2c6b5b6202d96516ece8b5d2dbd355f8326

  • SSDEEP

    196608:99GeDVI5DKBWZlkgJedYs6LtYdEhqTgKDf:9kYVI5DK2NNs6LtYdEhSpz

Malware Config

Signatures

  • Jupyter, SolarMarker

    Jupyter is a backdoor and infostealer first seen in mid 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe
    "C:\Users\Admin\AppData\Local\Temp\StatesFenceStatutesTennessee.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zveqezem\zveqezem.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9078.tmp" "c:\Users\Admin\AppData\Local\Temp\zveqezem\CSC7EA61CDDD1484F28A143F3775EB51931.TMP"
        3⤵
          PID:4584
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf"
        2⤵
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:784
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:824
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3F1FB7F04E234935D7250CFC6D5BBD77 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
            4⤵
              PID:804
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B030EB9ABC56CD13DA40CFD839093692 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B030EB9ABC56CD13DA40CFD839093692 --renderer-client-id=2 --mojo-platform-channel-handle=1648 --allow-no-sandbox-job /prefetch:1
              4⤵
                PID:4708
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=807BDA21482EBB738F22F32C293E7BBC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=807BDA21482EBB738F22F32C293E7BBC --renderer-client-id=4 --mojo-platform-channel-handle=2232 --allow-no-sandbox-job /prefetch:1
                4⤵
                  PID:4108
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E54DA8AA48DF2882B5E793DA2F461B46 --mojo-platform-channel-handle=2624 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  4⤵
                    PID:2644
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7D8FA554BFFEF2256729883BCAAE9128 --mojo-platform-channel-handle=2600 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                    4⤵
                      PID:2704
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F8C8FC952DC0CE5CD19E0D5B272CC3A4 --mojo-platform-channel-handle=2804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                      4⤵
                        PID:1252

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  64KB

                  MD5

                  f8b6e0a7f323185d328369a684ec27fa

                  SHA1

                  2404ba107ad4f20f103ea0e2b8e22047c3e447d7

                  SHA256

                  902efa9379370cb64d6f28c795aa81f958bf8064431853ed56fed847319b39dc

                  SHA512

                  7605c645cb6cda35639347f06491ce504f636d2def17392234939e148117afffc72b6c27e7e0be36620e7d25538ca04ec516c18a605d8700d47c2b59c1074921

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  36KB

                  MD5

                  b30d3becc8731792523d599d949e63f5

                  SHA1

                  19350257e42d7aee17fb3bf139a9d3adb330fad4

                  SHA256

                  b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3

                  SHA512

                  523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e

                • C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages

                  Filesize

                  56KB

                  MD5

                  752a1f26b18748311b691c7d8fc20633

                  SHA1

                  c1f8e83eebc1cc1e9b88c773338eb09ff82ab862

                  SHA256

                  111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131

                  SHA512

                  a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5

                • C:\Users\Admin\AppData\Local\Temp\RES9078.tmp

                  Filesize

                  1KB

                  MD5

                  af1dd0e8ba20ae82f0e7d517ed345cbf

                  SHA1

                  692a66d054de6a6cbe450b843e9c0b66f98360b0

                  SHA256

                  be2128312a996c0c3c01159268fdba62340b344a6b556b54b957c7b8ae56a001

                  SHA512

                  bc4ef44ab66a996be078408e5b01c72a06dc0a505bea95884c32f443c358ef43af263b3213a37489ef62253e0aa411fb551c3f90d74dfd75ba6ffcd719f22601

                • C:\Users\Admin\AppData\Local\Temp\zveqezem\zveqezem.dll

                  Filesize

                  3KB

                  MD5

                  77b5a6fed95d1173c9b511194a80996e

                  SHA1

                  aa5b0ac1e7af43c94f79f1a74bb0d93a59fa53de

                  SHA256

                  dfc4b350f1ea7c6d023c63267db4eb21bed106fd642af9aafccc1dd11c5141e0

                  SHA512

                  40ce57f7c71a012109ba04fbd28557f5e3c94f52578682e73a0d586293a08f7518e78e10f16b19bb779d690c18db4abdb286d6617b4a0f08459945225ff611ca

                • C:\Users\Admin\AppData\Local\Temp\~P9341841.pdf

                  Filesize

                  8.8MB

                  MD5

                  aa81bdaeac18676979c6c846ce2f43aa

                  SHA1

                  bda40a47ba5c5d0154c698961926fee1cb40554c

                  SHA256

                  013f4de04da240f2cf2dd3960a2c77d1cc305bafe1e05812d9e4218a56acc03b

                  SHA512

                  da549bbd27aa0ab8311dcbef0e1fb94ed1f2ecc17dc2d046e2230e43f23bb3aeed594087ed9b206af3b2540437aa293ffb47b4d9d43470e205429121a0b18254

                • \??\c:\Users\Admin\AppData\Local\Temp\zveqezem\CSC7EA61CDDD1484F28A143F3775EB51931.TMP

                  Filesize

                  652B

                  MD5

                  5bf2c6f8bfd0cb4a6f354946839e2063

                  SHA1

                  e94b18b5be6448341a28c01b733b55a6ab54f571

                  SHA256

                  c5575c001caf2b55158815223964e0bba02527a5de75d3f03150d2f2beb73f33

                  SHA512

                  431caba34db9ec9d05d9fa3752463731117556dfb4695a63a236e976238615cd1fe1d6867040b839c1a09e1c6a97fecca8955c8ab2b75c20724e4e4c9b42da75

                • \??\c:\Users\Admin\AppData\Local\Temp\zveqezem\zveqezem.0.cs

                  Filesize

                  244B

                  MD5

                  b999975748af32dd007ff48814430b26

                  SHA1

                  46b54a3e3be2d3497127d67b96b3f6a55d26447d

                  SHA256

                  ed13935d6ac43e5ce0419aa7d162dbc70562c02dedacb81d5efdfc609a035c69

                  SHA512

                  f8e48caaac395db45ac4c8a899dbd64305dd6f57fcd22919a6d880b035455286d3504b097dca250d4ea283004cb64d47e376901b8fae65f4fa792234dee9f81e

                • \??\c:\Users\Admin\AppData\Local\Temp\zveqezem\zveqezem.cmdline

                  Filesize

                  369B

                  MD5

                  1dd491d3a35de79170aa8b814c7c888a

                  SHA1

                  0922f20ca82c1f712d1c3153d5f79859fc1a6656

                  SHA256

                  906708f0e2786e22fc61f7bbb3d9cf6118d2d0e032c7e080a4532c53ab15dd75

                  SHA512

                  04c815bdeb32de630dda9439075ce54481c85de2fab69d1f3dce978b4a63922c174d236b3b64ff2d7ca5e59d5b6623ea69ccd50f478d7f450f51dcdff01c69cc

                • \Users\Admin\AppData\Local\Temp\0b881921-3d0c-4e45-bfb6-1e275b7d6fb1\AgileDotNetRT64.dll

                  Filesize

                  2.9MB

                  MD5

                  9bb6ed08af544d3738e60200d2804180

                  SHA1

                  5a40b484ca56b1ce59add4ec283e21d60070be02

                  SHA256

                  86d49f3894cc3de038abcde03803de8b6f239c237f34930ce5c41ab725c26cb7

                  SHA512

                  63e6b90457c3e3e6e419e30fe57e35c66e08059611fbe4ffb60d28acd6ee8d9f0ccfa31d7b27e9af44ab13512490f3b7b7f5130df947c5de50a937dcee0a91a5

                • memory/220-29-0x0000000031800000-0x0000000031808000-memory.dmp

                  Filesize

                  32KB

                • memory/220-2-0x000000002F6B0000-0x000000002F6C0000-memory.dmp

                  Filesize

                  64KB

                • memory/220-0-0x00007FF8D75C0000-0x00007FF8D7FAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/220-15-0x000000002F6C0000-0x000000002F6E2000-memory.dmp

                  Filesize

                  136KB

                • memory/220-9-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-33-0x0000000031810000-0x00000000318E6000-memory.dmp

                  Filesize

                  856KB

                • memory/220-14-0x00007FF8E6530000-0x00007FF8E665C000-memory.dmp

                  Filesize

                  1.2MB

                • memory/220-49-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-11-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-16-0x000000002FD70000-0x000000002FDE6000-memory.dmp

                  Filesize

                  472KB

                • memory/220-1-0x00000000002A0000-0x00000000012A0000-memory.dmp

                  Filesize

                  16.0MB

                • memory/220-163-0x00007FF8D75C0000-0x00007FF8D7FAC000-memory.dmp

                  Filesize

                  9.9MB

                • memory/220-164-0x000000002F6B0000-0x000000002F6C0000-memory.dmp

                  Filesize

                  64KB

                • memory/220-171-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-179-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-333-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB

                • memory/220-410-0x00007FF8D12C0000-0x00007FF8D1A72000-memory.dmp

                  Filesize

                  7.7MB