Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    299s
  • max time network
    305s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/04/2024, 13:44

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3632
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4828
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:2144
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3420
      • C:\Users\Admin\AppData\Local\Temp\~tl27BD.tmp
        C:\Users\Admin\AppData\Local\Temp\~tl27BD.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4576
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2640
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2632
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4704
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
              PID:4732
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1912
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /delete /TN "Timer"
              4⤵
                PID:4712
              • C:\Windows\SYSTEM32\schtasks.exe
                schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                4⤵
                • Creates scheduled task(s)
                PID:916
              • C:\Windows\System\svchost.exe
                "C:\Windows\System\svchost.exe" formal
                4⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2736
                • C:\Windows\SYSTEM32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  5⤵
                    PID:3404
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    5⤵
                    • Modifies Windows Firewall
                    PID:4132
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    5⤵
                    • Modifies Windows Firewall
                    PID:4992
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1356
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1240
                  • C:\Users\Admin\AppData\Local\Temp\~tlFDF9.tmp
                    C:\Users\Admin\AppData\Local\Temp\~tlFDF9.tmp
                    5⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:5112
                    • C:\Windows\SYSTEM32\netsh.exe
                      netsh int ipv4 set dynamicport tcp start=1025 num=64511
                      6⤵
                        PID:4484
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:636
                      • C:\Windows\System32\netsh.exe
                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                        6⤵
                        • Modifies Windows Firewall
                        PID:2128
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:164
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                        6⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2852

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              268b890dae39e430e8b127909067ed96

              SHA1

              35939515965c0693ef46e021254c3e73ea8c4a2b

              SHA256

              7643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c

              SHA512

              abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              5a942582c6b7fc56eceaf72343e96df4

              SHA1

              61bc8f028bb86823f99cfc244c14bb13d11a0c33

              SHA256

              e73549a36b5d6bda561183bc8665af9ab5683eebfb2f1353e4986c1d308752c3

              SHA512

              a6fe755f6624b68b2a8412f979a2112cbcfb744fffd3ab689657caa9e4c644c6159612fce54c90942e1afd84766d5565c1977dd44741a1555a3f1a73721fc4d5

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              4c44a2abedef79986a23dfa4ec702f75

              SHA1

              e61f8168a871e6f9fac776defd5a90f54948fffc

              SHA256

              ca4d6583eb6fe5f982cd94a8b3f7a608485048fac18236f6dd5b7a9038cd6586

              SHA512

              069a6bb835da57686f8aad0c9e8e3c8f0d602d3e4d27ddbe6a84b32eaacb88c3951e1c9c05fbb1a571b28ba512b65be79757a9aed0982c203c3c3a3d1a79c739

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              81492100716cd0cf6a1f634a1e7e5f8a

              SHA1

              65311f460ffdc3830aa3235626ba899f3ce785b8

              SHA256

              76e1b9529e206e44e391a5b6bc3c51ab455cb6e0b8fff1e01d55c47ecbf22cbe

              SHA512

              8a32c942a44eb86392431d6a5e66f14dd716fa0377c5e3ca170ee448f2457f0172c6be2da2daeb5f0008f024f28a397a2ef5c0f58b00188a15f3c77a906050ec

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              104B

              MD5

              3cd7ab3995cb49e7bcfedaa8d62c0d51

              SHA1

              426cc9899c867885ee06c03236b74096a44d4497

              SHA256

              57bffe381a9d86a1f2a2a124eb475954a31dd46d4f8e8d0a48f37a30b1477d70

              SHA512

              243aa992aae783bf60916344cfd34a7f5baaf4e4dabe1b40fdb24460d67e7eaa736a0b88b3bf22fc16b76d4104b01ef2786af8823d75420248e060941dfb1d68

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              b7a38453548a009adeb52d35d5e7733c

              SHA1

              32edcf3f7a4725a666ad10c881d1d1c8828eb1e9

              SHA256

              f8f61b6d9ebbebc2a4475e9d7bd76d5fdb51382c262d40a4bc30f5bda5d6b09f

              SHA512

              0c051ef028e66d0526eda2cb089ff31f67556a77cbb1c383b574dfc0ce2a00b76f837d264c172eee022abb4dc7b6225b66423d69c81875558a059089d66dadc3

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              b7ed971e92af8a34b5ca8a8807fbf85b

              SHA1

              fbea82f16189b569c3b71270b3b73055908c9b57

              SHA256

              bcded4d60a63755bc3c4f954c58115b1bb9a00e4eeabfa8fc89073ef3d816b40

              SHA512

              eab1ebfb77b7cd731ac6f8d29b0b1b21dd586781fc2920dd1d283840eb334621fe10eeb99a15892c0aefbdf6d8e51104638d064e01538febce8de17c625736f5

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xyngsfif.uzm.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Local\Temp\~tl27BD.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • C:\Users\Admin\AppData\Local\Temp\~tlFDF9.tmp

              Filesize

              393KB

              MD5

              9dbdd43a2e0b032604943c252eaf634a

              SHA1

              9584dc66f3c1cce4210fdf827a1b4e2bb22263af

              SHA256

              33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

              SHA512

              b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.6MB

              MD5

              19a1ff4739901b80c88834cf7d4925eb

              SHA1

              75dec3747387d1a54035c9ae1ce7bc7488bec125

              SHA256

              1f23e720888ae52453dfe0df103aa9fd98e6e77f9ceba6c8798ba64339b26e61

              SHA512

              e3e0302c24bc98b07d640492a691a6d6d31a8345cf443a00d086eb91ae8a8bc26e90b3daf38288d6e2da0098097c60fb05e2e94971a4ba1c45654b357d060ac1

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              12.2MB

              MD5

              ef442817749fd81abfd6aae6a7f7ad21

              SHA1

              532bdd3f4262e967d61964e7899c12286a1d23d0

              SHA256

              4bf0b8806225c29cac482f2abb2199cd3d94779ceca679edc917e7e056080338

              SHA512

              107a3f59e432169e4ea844a9c16cbea6da23da701ea0b43533e5a9deebefcbb253027485fd87a064fb2fd82dc4c756185b7bc9a32f8a4872d711baea152c9252

            • C:\Windows\System\svchost.exe

              Filesize

              5.3MB

              MD5

              63552c60caeefe5f2d0e4028b3cc65d3

              SHA1

              dbed3040d53495a6afda01bfb8399376792eb48c

              SHA256

              64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

              SHA512

              caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

            • memory/164-474-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/164-476-0x00000234828A0000-0x00000234828B0000-memory.dmp

              Filesize

              64KB

            • memory/164-477-0x00000234828A0000-0x00000234828B0000-memory.dmp

              Filesize

              64KB

            • memory/164-514-0x00000234828A0000-0x00000234828B0000-memory.dmp

              Filesize

              64KB

            • memory/164-566-0x00000234828A0000-0x00000234828B0000-memory.dmp

              Filesize

              64KB

            • memory/880-0-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/880-6-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/880-5-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/880-3-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/880-4-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/880-119-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1240-450-0x000001BB373C0000-0x000001BB373D0000-memory.dmp

              Filesize

              64KB

            • memory/1240-371-0x000001BB373C0000-0x000001BB373D0000-memory.dmp

              Filesize

              64KB

            • memory/1240-366-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/1240-370-0x000001BB373C0000-0x000001BB373D0000-memory.dmp

              Filesize

              64KB

            • memory/1240-406-0x000001BB373C0000-0x000001BB373D0000-memory.dmp

              Filesize

              64KB

            • memory/1240-454-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/1356-451-0x0000023BB0040000-0x0000023BB0050000-memory.dmp

              Filesize

              64KB

            • memory/1356-398-0x0000023BB0040000-0x0000023BB0050000-memory.dmp

              Filesize

              64KB

            • memory/1356-363-0x0000023BB0040000-0x0000023BB0050000-memory.dmp

              Filesize

              64KB

            • memory/1356-360-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/1356-362-0x0000023BB0040000-0x0000023BB0050000-memory.dmp

              Filesize

              64KB

            • memory/1356-457-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/1912-313-0x0000020A6DAD0000-0x0000020A6DAE0000-memory.dmp

              Filesize

              64KB

            • memory/1912-340-0x0000020A6DAD0000-0x0000020A6DAE0000-memory.dmp

              Filesize

              64KB

            • memory/1912-297-0x0000020A6DAD0000-0x0000020A6DAE0000-memory.dmp

              Filesize

              64KB

            • memory/1912-296-0x0000020A6DAD0000-0x0000020A6DAE0000-memory.dmp

              Filesize

              64KB

            • memory/1912-295-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/1912-345-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/2736-356-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2736-353-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2736-466-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2736-354-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2852-565-0x0000027ADAD40000-0x0000027ADAD50000-memory.dmp

              Filesize

              64KB

            • memory/2852-482-0x00007FFC5B550000-0x00007FFC5BF3C000-memory.dmp

              Filesize

              9.9MB

            • memory/2852-484-0x0000027ADAD40000-0x0000027ADAD50000-memory.dmp

              Filesize

              64KB

            • memory/2852-517-0x0000027ADAD40000-0x0000027ADAD50000-memory.dmp

              Filesize

              64KB

            • memory/2852-485-0x0000027ADAD40000-0x0000027ADAD50000-memory.dmp

              Filesize

              64KB

            • memory/3420-227-0x00007FFC6BDB0000-0x00007FFC6C79C000-memory.dmp

              Filesize

              9.9MB

            • memory/3420-219-0x000001A734D80000-0x000001A734D90000-memory.dmp

              Filesize

              64KB

            • memory/3420-173-0x000001A734D80000-0x000001A734D90000-memory.dmp

              Filesize

              64KB

            • memory/3420-140-0x000001A734D80000-0x000001A734D90000-memory.dmp

              Filesize

              64KB

            • memory/3420-136-0x000001A734D80000-0x000001A734D90000-memory.dmp

              Filesize

              64KB

            • memory/3420-134-0x00007FFC6BDB0000-0x00007FFC6C79C000-memory.dmp

              Filesize

              9.9MB

            • memory/3632-15-0x00007FFC6BE50000-0x00007FFC6C83C000-memory.dmp

              Filesize

              9.9MB

            • memory/3632-52-0x0000014AB2D40000-0x0000014AB2D50000-memory.dmp

              Filesize

              64KB

            • memory/3632-21-0x0000014AB2D40000-0x0000014AB2D50000-memory.dmp

              Filesize

              64KB

            • memory/3632-18-0x0000014AB2E30000-0x0000014AB2E52000-memory.dmp

              Filesize

              136KB

            • memory/3632-16-0x0000014AB2D40000-0x0000014AB2D50000-memory.dmp

              Filesize

              64KB

            • memory/3632-106-0x0000014AB2D40000-0x0000014AB2D50000-memory.dmp

              Filesize

              64KB

            • memory/3632-112-0x00007FFC6BE50000-0x00007FFC6C83C000-memory.dmp

              Filesize

              9.9MB

            • memory/3928-226-0x00007FFC6BDB0000-0x00007FFC6C79C000-memory.dmp

              Filesize

              9.9MB

            • memory/3928-220-0x0000023EFC990000-0x0000023EFC9A0000-memory.dmp

              Filesize

              64KB

            • memory/3928-169-0x0000023EFC990000-0x0000023EFC9A0000-memory.dmp

              Filesize

              64KB

            • memory/3928-138-0x0000023EFC990000-0x0000023EFC9A0000-memory.dmp

              Filesize

              64KB

            • memory/3928-137-0x0000023EFC990000-0x0000023EFC9A0000-memory.dmp

              Filesize

              64KB

            • memory/3928-131-0x00007FFC6BDB0000-0x00007FFC6C79C000-memory.dmp

              Filesize

              9.9MB

            • memory/4576-285-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4576-288-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4576-289-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4576-290-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4576-355-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4660-276-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4660-286-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4660-123-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4660-228-0x0000000015740000-0x0000000015C3C000-memory.dmp

              Filesize

              5.0MB

            • memory/4660-243-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4660-125-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4660-277-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4828-17-0x00007FFC6BE50000-0x00007FFC6C83C000-memory.dmp

              Filesize

              9.9MB

            • memory/4828-20-0x00000166DB4F0000-0x00000166DB500000-memory.dmp

              Filesize

              64KB

            • memory/4828-19-0x00000166DB4F0000-0x00000166DB500000-memory.dmp

              Filesize

              64KB

            • memory/4828-99-0x00000166DB4F0000-0x00000166DB500000-memory.dmp

              Filesize

              64KB

            • memory/4828-51-0x00000166DB4F0000-0x00000166DB500000-memory.dmp

              Filesize

              64KB

            • memory/4828-107-0x00007FFC6BE50000-0x00007FFC6C83C000-memory.dmp

              Filesize

              9.9MB

            • memory/4828-26-0x00000166DB680000-0x00000166DB6F6000-memory.dmp

              Filesize

              472KB

            • memory/5112-470-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-465-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-469-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-468-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-574-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB