Resubmissions

11/04/2024, 06:38

240411-hd63esha9z 8

11/04/2024, 06:37

240411-hdp4xaha9x 8

11/04/2024, 06:37

240411-hdlrgsha9w 8

11/04/2024, 06:37

240411-hdk5ysha9t 8

11/04/2024, 06:37

240411-hdkjesha9s 8

07/04/2024, 08:23

240407-kabhfsgg71 8

07/04/2024, 08:23

240407-j97t9shc64 8

07/04/2024, 08:22

240407-j93wbagg7w 8

07/04/2024, 08:22

240407-j9yatsgg7s 7

Analysis

  • max time kernel
    293s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 06:37

General

  • Target

    tmp.exe

  • Size

    5.3MB

  • MD5

    5fe4ea367cee11e92ad4644d8ac3cef7

  • SHA1

    44faea4a352b7860a9eafca82bd3c9b054b6db29

  • SHA256

    1a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b

  • SHA512

    1c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f

  • SSDEEP

    98304:lgU5484Bq1qdguoOzv4I3KOn6Ka1uFof9Hn6sdw5yOc4:iU54mqL9zvH3qO

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:852
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1464
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:1448
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4132
      • C:\Users\Admin\AppData\Local\Temp\~tl3493.tmp
        C:\Users\Admin\AppData\Local\Temp\~tl3493.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2020
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1036
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:3068
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5032
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:3848
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:4432
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1136
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:4000
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:1468
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:4800
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3028
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3208
                • C:\Users\Admin\AppData\Local\Temp\~tlD40.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlD40.tmp
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2936
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:4344
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:3984
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4660
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3668
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4652

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            8846686b7f2d146c0baa27459eedbd8d

            SHA1

            c953a3d1c7870a9d7ded709301f3ae7f1ea94e61

            SHA256

            33e3dc5ccf5c09b1c26c524b284335712ef653a2b2169732d8d890f615026c65

            SHA512

            3e72136bff1772ae7934c67ead939b4783ffb9a3657a366881504c7a11e76abe6469b6a4701b031fd564e6d257f7c62f52fb69f93a67459fadf909fefbbe6154

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            e5663972c1caaba7088048911c758bf3

            SHA1

            3462dea0f9c2c16a9c3afdaef8bbb1f753c1c198

            SHA256

            9f7f29a4696876cadca3f14d7e43f9ede0c97fd64be3f5d94bda49a91b6a419e

            SHA512

            ff4e72c46cf083de62baa2ce2661555dd91b5f144294015f7b262fd4500cb67fe80e1871a82da63b607e3e9cef401f4b73c587bf1134637881ecad51aad1eddc

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            ab24765a7393bd3cef8acbf0a617fba2

            SHA1

            ef2c12a457a11f6204344afed09a39f4d3e803cb

            SHA256

            3a03c7efabe880ae9f283b1cf373d3f09d07ab619028319b3599b643ae140d47

            SHA512

            e16306674a8c89f54467d7fba3857e1e0bdf3729f5de9f4451520cfbddfa535c4d653dde6efcac38efd693e9b3e4965fcd08c559e720c372feca65050b46e355

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            f4533362306f74733b2f92301f128024

            SHA1

            4a24567043ad28161f02f4d7ef6d60846586806a

            SHA256

            a0d9521cfa2313fd45c1541ff97edddf72fe620ac13a2bff85d339681b350a8b

            SHA512

            9170198ab0bec0cdeeee15fabaf818f6fcb07007e4c6f6f3587652e0b35aa2519b3b912a9b8a52c1521d98aa3cd9ed581ffa2f325ffe56da57f4e0bb80efc06c

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            3a6bad9528f8e23fb5c77fbd81fa28e8

            SHA1

            f127317c3bc6407f536c0f0600dcbcf1aabfba36

            SHA256

            986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

            SHA512

            846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qylx0alz.wll.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\~tl3493.tmp

            Filesize

            385KB

            MD5

            e802c96760e48c5139995ffb2d891f90

            SHA1

            bba3d278c0eb1094a26e5d2f4c099ad685371578

            SHA256

            cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

            SHA512

            97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

          • C:\Users\Admin\AppData\Local\Temp\~tlD40.tmp

            Filesize

            393KB

            MD5

            9dbdd43a2e0b032604943c252eaf634a

            SHA1

            9584dc66f3c1cce4210fdf827a1b4e2bb22263af

            SHA256

            33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

            SHA512

            b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

            Filesize

            2.7MB

            MD5

            c9b1dde253446b4b2bc6a0ad4d3022c2

            SHA1

            66cf356f3717f3d07a1c568c7146f9f9f14adf9f

            SHA256

            4fcc265cafab726d5e03b652e7b3fb4681a28f0dc5349825fe28b5413c96d3f3

            SHA512

            0e8f41766a67cea5d48950d0f30b5c5e1c6b7e9a5d77515e2be72d719c11bed624991c8764c7edddb0981dffd34fbd6e6e89d9ac9bd65164a14b27f21a2ce005

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

            Filesize

            7.9MB

            MD5

            40daa84ac649a66d08e80ae5d1ddb83c

            SHA1

            372d16f2d156dfff7d747967379ec3f13665dc69

            SHA256

            b1a9e6ae140e6d602987c9ab734c556b042e6413993e0ce800d5145aa46afcb7

            SHA512

            c46119c21d71af33e04467c2a04789230568274fdef17caea666c590d77aa221470c95b948aaa99e45183fa4a95b171a2e07b2b69295ab0716136032271538b0

          • C:\Windows\System\svchost.exe

            Filesize

            5.3MB

            MD5

            5fe4ea367cee11e92ad4644d8ac3cef7

            SHA1

            44faea4a352b7860a9eafca82bd3c9b054b6db29

            SHA256

            1a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b

            SHA512

            1c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f

          • memory/852-30-0x000001CDC9BC0000-0x000001CDC9BD0000-memory.dmp

            Filesize

            64KB

          • memory/852-37-0x00007FFD54FC0000-0x00007FFD55A81000-memory.dmp

            Filesize

            10.8MB

          • memory/852-25-0x000001CDC9BC0000-0x000001CDC9BD0000-memory.dmp

            Filesize

            64KB

          • memory/852-24-0x00007FFD54FC0000-0x00007FFD55A81000-memory.dmp

            Filesize

            10.8MB

          • memory/1136-180-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1136-221-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1136-178-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1200-135-0x0000022C36B20000-0x0000022C36B30000-memory.dmp

            Filesize

            64KB

          • memory/1200-134-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/1200-160-0x0000022C36B20000-0x0000022C36B30000-memory.dmp

            Filesize

            64KB

          • memory/1200-159-0x0000022C36B20000-0x0000022C36B30000-memory.dmp

            Filesize

            64KB

          • memory/1200-162-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/1464-28-0x0000021EE73C0000-0x0000021EE73D0000-memory.dmp

            Filesize

            64KB

          • memory/1464-26-0x00007FFD54FC0000-0x00007FFD55A81000-memory.dmp

            Filesize

            10.8MB

          • memory/1464-27-0x0000021EE73C0000-0x0000021EE73D0000-memory.dmp

            Filesize

            64KB

          • memory/1464-6-0x0000021EE71B0000-0x0000021EE71D2000-memory.dmp

            Filesize

            136KB

          • memory/1464-36-0x00007FFD54FC0000-0x00007FFD55A81000-memory.dmp

            Filesize

            10.8MB

          • memory/1464-29-0x0000021EE73C0000-0x0000021EE73D0000-memory.dmp

            Filesize

            64KB

          • memory/1696-73-0x00000170C8D10000-0x00000170C8D20000-memory.dmp

            Filesize

            64KB

          • memory/1696-80-0x00007FFD54E90000-0x00007FFD55951000-memory.dmp

            Filesize

            10.8MB

          • memory/1696-77-0x00000170C8D10000-0x00000170C8D20000-memory.dmp

            Filesize

            64KB

          • memory/1696-62-0x00007FFD54E90000-0x00007FFD55951000-memory.dmp

            Filesize

            10.8MB

          • memory/1976-132-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1976-179-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1976-130-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1976-128-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1976-133-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2936-225-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/2936-220-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/2936-258-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/2936-223-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/2936-224-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3028-207-0x000001D4F6380000-0x000001D4F6390000-memory.dmp

            Filesize

            64KB

          • memory/3028-211-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3028-191-0x000001D4F6380000-0x000001D4F6390000-memory.dmp

            Filesize

            64KB

          • memory/3028-181-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3208-205-0x0000026468E80000-0x0000026468E90000-memory.dmp

            Filesize

            64KB

          • memory/3208-212-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3208-206-0x0000026468E80000-0x0000026468E90000-memory.dmp

            Filesize

            64KB

          • memory/3208-194-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3208-193-0x0000026468E80000-0x0000026468E90000-memory.dmp

            Filesize

            64KB

          • memory/3208-192-0x0000026468E80000-0x0000026468E90000-memory.dmp

            Filesize

            64KB

          • memory/3244-131-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/3244-81-0x0000000031F20000-0x000000003241C000-memory.dmp

            Filesize

            5.0MB

          • memory/3244-50-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/3244-51-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/3668-238-0x000002B6F76F0000-0x000002B6F7700000-memory.dmp

            Filesize

            64KB

          • memory/3668-226-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3668-252-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/3668-250-0x000002B6F76F0000-0x000002B6F7700000-memory.dmp

            Filesize

            64KB

          • memory/3668-227-0x000002B6F76F0000-0x000002B6F7700000-memory.dmp

            Filesize

            64KB

          • memory/4132-75-0x000001539E500000-0x000001539E510000-memory.dmp

            Filesize

            64KB

          • memory/4132-74-0x000001539E500000-0x000001539E510000-memory.dmp

            Filesize

            64KB

          • memory/4132-76-0x000001539E500000-0x000001539E510000-memory.dmp

            Filesize

            64KB

          • memory/4132-79-0x00007FFD54E90000-0x00007FFD55951000-memory.dmp

            Filesize

            10.8MB

          • memory/4132-63-0x00007FFD54E90000-0x00007FFD55951000-memory.dmp

            Filesize

            10.8MB

          • memory/4556-0-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/4556-2-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/4556-47-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/4556-3-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/4556-1-0x0000000140000000-0x0000000140645400-memory.dmp

            Filesize

            6.3MB

          • memory/4652-239-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/4652-240-0x00000230FCD00000-0x00000230FCD10000-memory.dmp

            Filesize

            64KB

          • memory/4652-253-0x00000230FCD00000-0x00000230FCD10000-memory.dmp

            Filesize

            64KB

          • memory/4652-256-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-163-0x00000200BCFF0000-0x00000200BD000000-memory.dmp

            Filesize

            64KB

          • memory/5032-145-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-158-0x00000200BCFF0000-0x00000200BD000000-memory.dmp

            Filesize

            64KB

          • memory/5032-166-0x00007FFD54FB0000-0x00007FFD55A71000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-146-0x00000200BCFF0000-0x00000200BD000000-memory.dmp

            Filesize

            64KB

          • memory/5032-147-0x00000200BCFF0000-0x00000200BD000000-memory.dmp

            Filesize

            64KB