Resubmissions

26-03-2024 09:18

240326-k93e8afa38 10

26-03-2024 09:12

240326-k6m65aeh72 10

Analysis

  • max time kernel
    467s
  • max time network
    458s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 09:18

General

  • Target

    https://www.upload.ee/download/16172629/f1d36d49753b1e89291a/ErinevPredictorV2.exe

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Executes dropped EXE 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 61 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.upload.ee/download/16172629/f1d36d49753b1e89291a/ErinevPredictorV2.exe
    1⤵
      PID:5096
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4860 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:2956
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4824 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:2172
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5312 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:3928
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=5524 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
            1⤵
              PID:5000
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=6008 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:2396
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=6156 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                1⤵
                  PID:4944
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --mojo-platform-channel-handle=6300 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                  1⤵
                    PID:4560
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=6324 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                    1⤵
                      PID:644
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6524 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:1348
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=6680 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                        1⤵
                          PID:2644
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --mojo-platform-channel-handle=6784 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                          1⤵
                            PID:848
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=4980 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:5024
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=4424 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                              1⤵
                                PID:4748
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --mojo-platform-channel-handle=7036 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                1⤵
                                  PID:1584
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --mojo-platform-channel-handle=5812 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                  1⤵
                                    PID:4724
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6540 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                                    1⤵
                                      PID:1912
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --mojo-platform-channel-handle=4560 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                      1⤵
                                        PID:4748
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5448 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                                        1⤵
                                          PID:3316
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --mojo-platform-channel-handle=6788 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                          1⤵
                                            PID:436
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --mojo-platform-channel-handle=7136 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                            1⤵
                                              PID:3120
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --mojo-platform-channel-handle=4308 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                              1⤵
                                                PID:1860
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --mojo-platform-channel-handle=6380 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                                1⤵
                                                  PID:1556
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --mojo-platform-channel-handle=7332 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                                  1⤵
                                                    PID:3612
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --mojo-platform-channel-handle=7496 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                                                    1⤵
                                                      PID:4104
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --mojo-platform-channel-handle=2876 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                                      1⤵
                                                        PID:1032
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --mojo-platform-channel-handle=7476 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:1
                                                        1⤵
                                                          PID:1128
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7332 --field-trial-handle=2000,i,9877262470271371196,11878025205711850266,262144 --variations-seed-version /prefetch:8
                                                          1⤵
                                                            PID:4608
                                                          • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                            "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:4908
                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:1628
                                                          • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                            "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2112
                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:1028
                                                          • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                            "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:3336
                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:3340
                                                          • C:\Windows\system32\taskmgr.exe
                                                            "C:\Windows\system32\taskmgr.exe" /4
                                                            1⤵
                                                            • Checks SCSI registry key(s)
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of FindShellTrayWindow
                                                            • Suspicious use of SendNotifyMessage
                                                            PID:4968
                                                          • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                            "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:3096
                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:2412
                                                          • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                            "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                            1⤵
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:4884
                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                              2⤵
                                                              • Executes dropped EXE
                                                              PID:1304
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:3668
                                                            • C:\Users\Admin\Downloads\ErinevPredictorV2.exe
                                                              "C:\Users\Admin\Downloads\ErinevPredictorV2.exe"
                                                              1⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:4980
                                                              • C:\Users\Admin\AppData\Local\Temp\dcd.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:1480

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\dcd.exe

                                                              Filesize

                                                              227KB

                                                              MD5

                                                              b5ac46e446cead89892628f30a253a06

                                                              SHA1

                                                              f4ad1044a7f77a1b02155c3a355a1bb4177076ca

                                                              SHA256

                                                              def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

                                                              SHA512

                                                              bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

                                                            • memory/2112-31-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/2112-16-0x000000001B9D0000-0x000000001B9E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2112-15-0x000000001B9D0000-0x000000001B9E0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/2112-14-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/3096-50-0x000000001B3E0000-0x000000001B3F0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3096-64-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/3096-49-0x000000001B3E0000-0x000000001B3F0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3096-48-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/3096-47-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/3336-30-0x000000001AE90000-0x000000001AEA0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3336-33-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/3336-28-0x000000001AE90000-0x000000001AEA0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3336-29-0x000000001AE90000-0x000000001AEA0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3336-21-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4884-57-0x00000000028B0000-0x00000000028C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4884-65-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4884-55-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4884-56-0x00007FFFDA970000-0x00007FFFDB431000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4884-58-0x00000000028B0000-0x00000000028C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4884-59-0x00000000028B0000-0x00000000028C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4908-23-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-32-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-7-0x000000001AC60000-0x000000001AC9E000-memory.dmp

                                                              Filesize

                                                              248KB

                                                            • memory/4908-8-0x000000001ACF0000-0x000000001AD00000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4908-1-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-3-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-9-0x000000001ACF0000-0x000000001AD00000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4908-5-0x00000000021E0000-0x00000000021E1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4908-4-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-2-0x000000001AC10000-0x000000001AC60000-memory.dmp

                                                              Filesize

                                                              320KB

                                                            • memory/4908-22-0x00007FFFDAD10000-0x00007FFFDB7D1000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4908-0-0x0000000000050000-0x0000000000136000-memory.dmp

                                                              Filesize

                                                              920KB

                                                            • memory/4908-6-0x000000001ACF0000-0x000000001AD00000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4968-35-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-36-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-46-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-45-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-43-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-41-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-40-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-42-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-34-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4968-44-0x000001BC61970000-0x000001BC61971000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4980-66-0x00007FFFDA8C0000-0x00007FFFDB381000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4980-67-0x00007FFFDA8C0000-0x00007FFFDB381000-memory.dmp

                                                              Filesize

                                                              10.8MB

                                                            • memory/4980-68-0x0000000002450000-0x0000000002451000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4980-69-0x000000001B290000-0x000000001B2A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4980-70-0x000000001B290000-0x000000001B2A0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/4980-75-0x00007FFFDA8C0000-0x00007FFFDB381000-memory.dmp

                                                              Filesize

                                                              10.8MB