Resubmissions

11/04/2024, 06:38

240411-hd63esha9z 8

11/04/2024, 06:37

240411-hdp4xaha9x 8

11/04/2024, 06:37

240411-hdlrgsha9w 8

11/04/2024, 06:37

240411-hdk5ysha9t 8

11/04/2024, 06:37

240411-hdkjesha9s 8

07/04/2024, 08:23

240407-kabhfsgg71 8

07/04/2024, 08:23

240407-j97t9shc64 8

07/04/2024, 08:22

240407-j93wbagg7w 8

07/04/2024, 08:22

240407-j9yatsgg7s 7

Analysis

  • max time kernel
    431s
  • max time network
    456s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 06:37

General

  • Target

    tmp.exe

  • Size

    5.3MB

  • MD5

    5fe4ea367cee11e92ad4644d8ac3cef7

  • SHA1

    44faea4a352b7860a9eafca82bd3c9b054b6db29

  • SHA256

    1a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b

  • SHA512

    1c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f

  • SSDEEP

    98304:lgU5484Bq1qdguoOzv4I3KOn6Ka1uFof9Hn6sdw5yOc4:iU54mqL9zvH3qO

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 8 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3088
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5696
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:2772
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Users\Admin\AppData\Local\Temp\~tlDE1.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlDE1.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3640
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:5340
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4324
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1868
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1388
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4716
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:3904
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2824
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3568
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:4032
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2744
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2444
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:6004
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1768
                • C:\Users\Admin\AppData\Local\Temp\~tlE351.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlE351.tmp
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:5208
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:5280
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4224
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4608
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1268
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:944
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5396
            • C:\Windows\system32\netsh.exe
              netsh int ipv4 set dynamicport tcp start=1025 num=64511
              2⤵
                PID:1952
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                2⤵
                • Modifies Windows Firewall
                PID:2528
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                2⤵
                • Modifies Windows Firewall
                PID:720
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2200
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4452
              • C:\Windows\TEMP\~tlC6FC.tmp
                C:\Windows\TEMP\~tlC6FC.tmp
                2⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                PID:5896

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              d8cb3e9459807e35f02130fad3f9860d

              SHA1

              5af7f32cb8a30e850892b15e9164030a041f4bd6

              SHA256

              2b139c74072ccbdaa17b950f32a6dbc934dfb7af9973d97c9b0d9c498012ba68

              SHA512

              045239ba31367fbdd59e883f74eafc05724e23bd6e8f0c1e7171ea2496a497eb9e0cfcb57285bb81c4d569daadba43d6ef64c626ca48f1e2a59e8d97f0cc9184

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              3932a0d243598dd05803963ae965609d

              SHA1

              7adba2e436c2a42242674ff83ffb2a36b215e71a

              SHA256

              88a92e05626dfb389d0dde025bd18169a3e9cdbc9eea4163dd2c6ecc9d9d2285

              SHA512

              1cd428b9ee345c5bd7b271f72438679ac075b5d00f6260d040c7cff75f219c1df7f3f1835d6792e183aed5c9c1d2de248ce36010ca9e8c747b9951d07558d22d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              d28a889fd956d5cb3accfbaf1143eb6f

              SHA1

              157ba54b365341f8ff06707d996b3635da8446f7

              SHA256

              21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

              SHA512

              0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              01fff31a70e26012f37789b179059e32

              SHA1

              555b6f05cce7daf46920df1c01eb5c55dc62c9e6

              SHA256

              adf65afaf1c83572f05a99bf2ede8eb7be1aab0717d5254f501d5e09ba6f587b

              SHA512

              ac310c9bc5c1effc45e1e425972b09d1f961af216b50e1a504caa046b7f1a5f3179760e0b29591d83756ecb686d17a24770cf06fcea57e6f287ca5bbf6b6971b

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nx1s5xhy.rqc.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\~tlDE1.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • C:\Users\Admin\AppData\Local\Temp\~tlE351.tmp

              Filesize

              393KB

              MD5

              9dbdd43a2e0b032604943c252eaf634a

              SHA1

              9584dc66f3c1cce4210fdf827a1b4e2bb22263af

              SHA256

              33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

              SHA512

              b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.7MB

              MD5

              c9b1dde253446b4b2bc6a0ad4d3022c2

              SHA1

              66cf356f3717f3d07a1c568c7146f9f9f14adf9f

              SHA256

              4fcc265cafab726d5e03b652e7b3fb4681a28f0dc5349825fe28b5413c96d3f3

              SHA512

              0e8f41766a67cea5d48950d0f30b5c5e1c6b7e9a5d77515e2be72d719c11bed624991c8764c7edddb0981dffd34fbd6e6e89d9ac9bd65164a14b27f21a2ce005

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              13.9MB

              MD5

              72eb18fccb7d5e2a2d31dd35c4a1cbf7

              SHA1

              6b21b3f56658120c0c4512544479955063e3ccee

              SHA256

              19c344887e82c6a653d2b738c96c6812f949f8303282a4d420ddaeba92d33c38

              SHA512

              5c87ac878513104e2c9336a18bbbe6b7ccdec29f716045f708a423e65603135d54c5683c0761b28b0ca1f043fd1dd95bfe0a2ab37609fe78393c36927e0510d7

            • C:\Windows\System\svchost.exe

              Filesize

              5.3MB

              MD5

              5fe4ea367cee11e92ad4644d8ac3cef7

              SHA1

              44faea4a352b7860a9eafca82bd3c9b054b6db29

              SHA256

              1a69f2fcfe5b35bf44ea42a1efe89f18f6b0d522cbbea5c51bae93aff7d3188b

              SHA512

              1c4499eadaf44847a7a001c2622e558bc130c9ad608b4ec977480e002cf50c9eb36a65974b86a2db69e9bc43e7d239122389a6cf1ca2849c59bc137441fb0a4f

            • memory/436-3-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/436-45-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/436-2-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/436-0-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/436-4-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/944-246-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/944-232-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1268-243-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1268-221-0x000001AA42070000-0x000001AA42080000-memory.dmp

              Filesize

              64KB

            • memory/1268-220-0x000001AA42070000-0x000001AA42080000-memory.dmp

              Filesize

              64KB

            • memory/1268-219-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1388-156-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1388-132-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1768-205-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1768-188-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/1768-190-0x00000287BD880000-0x00000287BD890000-memory.dmp

              Filesize

              64KB

            • memory/1768-189-0x00000287BD880000-0x00000287BD890000-memory.dmp

              Filesize

              64KB

            • memory/1768-202-0x00000287BD880000-0x00000287BD890000-memory.dmp

              Filesize

              64KB

            • memory/2200-297-0x00007FF493740000-0x00007FF493750000-memory.dmp

              Filesize

              64KB

            • memory/2200-310-0x0000019447190000-0x000001944719A000-memory.dmp

              Filesize

              40KB

            • memory/2200-311-0x0000019449860000-0x000001944987C000-memory.dmp

              Filesize

              112KB

            • memory/2200-309-0x0000019449640000-0x00000194496F5000-memory.dmp

              Filesize

              724KB

            • memory/2200-308-0x00000194471A0000-0x00000194471B0000-memory.dmp

              Filesize

              64KB

            • memory/2200-307-0x0000019449620000-0x000001944963C000-memory.dmp

              Filesize

              112KB

            • memory/2200-275-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/2200-323-0x0000019449840000-0x000001944984A000-memory.dmp

              Filesize

              40KB

            • memory/2200-276-0x00000194471A0000-0x00000194471B0000-memory.dmp

              Filesize

              64KB

            • memory/2704-70-0x0000024AA7FA0000-0x0000024AA7FB0000-memory.dmp

              Filesize

              64KB

            • memory/2704-75-0x00007FFCBD4B0000-0x00007FFCBDF71000-memory.dmp

              Filesize

              10.8MB

            • memory/2704-63-0x0000024AA7FA0000-0x0000024AA7FB0000-memory.dmp

              Filesize

              64KB

            • memory/2704-62-0x00007FFCBD4B0000-0x00007FFCBDF71000-memory.dmp

              Filesize

              10.8MB

            • memory/3088-10-0x000002008F860000-0x000002008F882000-memory.dmp

              Filesize

              136KB

            • memory/3088-27-0x000002008F820000-0x000002008F830000-memory.dmp

              Filesize

              64KB

            • memory/3088-26-0x00007FFCBD600000-0x00007FFCBE0C1000-memory.dmp

              Filesize

              10.8MB

            • memory/3088-28-0x000002008F820000-0x000002008F830000-memory.dmp

              Filesize

              64KB

            • memory/3088-35-0x00007FFCBD600000-0x00007FFCBE0C1000-memory.dmp

              Filesize

              10.8MB

            • memory/3136-48-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/3136-79-0x0000000036B70000-0x000000003706C000-memory.dmp

              Filesize

              5.0MB

            • memory/3136-127-0x0000000140000000-0x0000000140645400-memory.dmp

              Filesize

              6.3MB

            • memory/3568-172-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3568-171-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3568-174-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3568-214-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-130-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-128-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-129-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-126-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-173-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3640-131-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4396-49-0x00007FFCBD4B0000-0x00007FFCBDF71000-memory.dmp

              Filesize

              10.8MB

            • memory/4396-78-0x00007FFCBD4B0000-0x00007FFCBDF71000-memory.dmp

              Filesize

              10.8MB

            • memory/4396-64-0x000001AFFC1C0000-0x000001AFFC1D0000-memory.dmp

              Filesize

              64KB

            • memory/4396-50-0x000001AFFC1C0000-0x000001AFFC1D0000-memory.dmp

              Filesize

              64KB

            • memory/4452-286-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/4452-325-0x000001FE75BB0000-0x000001FE75BB8000-memory.dmp

              Filesize

              32KB

            • memory/4452-324-0x000001FE75C00000-0x000001FE75C1A000-memory.dmp

              Filesize

              104KB

            • memory/4452-322-0x000001FE734D0000-0x000001FE734E0000-memory.dmp

              Filesize

              64KB

            • memory/4452-321-0x00007FF478570000-0x00007FF478580000-memory.dmp

              Filesize

              64KB

            • memory/4452-287-0x000001FE734D0000-0x000001FE734E0000-memory.dmp

              Filesize

              64KB

            • memory/4716-144-0x000001E5A7770000-0x000001E5A7780000-memory.dmp

              Filesize

              64KB

            • memory/4716-145-0x000001E5A7770000-0x000001E5A7780000-memory.dmp

              Filesize

              64KB

            • memory/4716-143-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/4716-159-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/5208-248-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5208-215-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5208-217-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5208-218-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5208-216-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5208-213-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5396-343-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5396-273-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5396-271-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5696-34-0x00007FFCBD600000-0x00007FFCBE0C1000-memory.dmp

              Filesize

              10.8MB

            • memory/5696-25-0x00000252D6A00000-0x00000252D6A10000-memory.dmp

              Filesize

              64KB

            • memory/5696-24-0x00007FFCBD600000-0x00007FFCBE0C1000-memory.dmp

              Filesize

              10.8MB

            • memory/6004-177-0x0000015278B10000-0x0000015278B20000-memory.dmp

              Filesize

              64KB

            • memory/6004-201-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/6004-175-0x00007FFCBD5D0000-0x00007FFCBE091000-memory.dmp

              Filesize

              10.8MB

            • memory/6004-176-0x0000015278B10000-0x0000015278B20000-memory.dmp

              Filesize

              64KB