Resubmissions

17/04/2024, 11:54

240417-n29fcafd81 8

17/04/2024, 11:54

240417-n285ksdh43 8

17/04/2024, 11:54

240417-n28h2sfd8z 8

17/04/2024, 11:54

240417-n246mafd8x 8

17/04/2024, 11:54

240417-n24j4afd8w 8

16/04/2024, 10:48

240416-mwlxesad2t 8

Analysis

  • max time kernel
    599s
  • max time network
    601s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2024, 11:54

General

  • Target

    e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe

  • Size

    5.3MB

  • MD5

    4a6096deaaaf3fe393b61d66540ce4ab

  • SHA1

    9f91f6feae419a73a3371e06206b5e459281cff0

  • SHA256

    e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5

  • SHA512

    9322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01

  • SSDEEP

    98304:GBze+DWzwgfjGmMdivlucHq81K0U4DzRtNCC6rYOALRiNKpRyE3Rb1:4ze9cidud8pUSzpXOALRi4pT91

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 10 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 10 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe
    "C:\Users\Admin\AppData\Local\Temp\e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3236
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1016
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:4640
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
      • C:\Users\Admin\AppData\Local\Temp\~tlEEA1.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlEEA1.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:1508
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2284
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4156
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4740
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2636
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:4620
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2928
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4352
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:1332
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2472
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:1648
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4128
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:408
                • C:\Users\Admin\AppData\Local\Temp\~tlC4EC.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlC4EC.tmp
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3864
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:2112
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2512
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4368
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1984
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:164
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:3496
            • C:\Windows\system32\netsh.exe
              netsh int ipv4 set dynamicport tcp start=1025 num=64511
              2⤵
              • Modifies data under HKEY_USERS
              PID:436
            • C:\Windows\System32\netsh.exe
              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
              2⤵
              • Modifies Windows Firewall
              PID:588
            • C:\Windows\System32\netsh.exe
              "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
              2⤵
              • Modifies Windows Firewall
              PID:3008
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
              2⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:4092
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
              2⤵
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:3016
            • C:\Windows\TEMP\~tlBAA8.tmp
              C:\Windows\TEMP\~tlBAA8.tmp
              2⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:3476
              • C:\Windows\system32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                3⤵
                  PID:700
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:2780
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:2472
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:304
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  3⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3832

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              cd5b15b46b9fe0d89c2b8d351c303d2a

              SHA1

              e1d30a8f98585e20c709732c013e926c7078a3c2

              SHA256

              0a8a0dcbec27e07c8dc9ef31622ac41591871416ccd9146f40d8cc9a2421da7a

              SHA512

              d7261b2ff89adcdb909b775c6a47b3cd366b7c3f5cbb4f60428e849582c93e14e76d7dcadec79003eef7c9a3059e305d5e4f6b5b912b9ebc3518e06b0d284dd7

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              085a7a3f168a8bcf7e1cb29f4560f51d

              SHA1

              4007c2c9691c5d5e656bdd0c9d0f8585d5a1b973

              SHA256

              c4d27137d5aa0f8d429fa54e0f799299349cc591b706033b586aa60f3503b898

              SHA512

              5275464f569700ffcc48dcd41201a6dad110d03ba2d097d125866e5a9452e735b1ad05d13bbd246709501ff5e1d91207455a9e77239a7307477b63198dbcf75e

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              360B

              MD5

              8195deb9f187f788091c7f280fc2c945

              SHA1

              7bf93a4c91e31dafcb4a2106a606d287f1e9a3de

              SHA256

              b5505c40bbaba11a5e19fb94fb7a4915fd14b44eed8fbe0881380f24e154dbae

              SHA512

              0e1ade66edf965f5317b7d1409ff49ea773605ccdc9dd8921de183c83a1462ce9b61933fd68bd165708de18ceb553ff2bd1ea7a27626ac5e62ac343c770bd8f3

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              fe5d38603e29ba4d9bd46ea2e0c8123e

              SHA1

              7f23d455c7cafc0d6c241d145bb82f75e257bb25

              SHA256

              f4f835135ce6018ab97f6f9dae542192e664ea698a5cb8def2fbfc5488264a81

              SHA512

              62bb041920e7d1a9a9b5517283e80ad5249ace65a2c01a600129199d655340b29f64a933f4ee5b2b306932b7f0938b9954dd6fbf7e2ce63f37a670db85ac62dc

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              09ed3973e0bdc3687abb09ae67ddd22c

              SHA1

              a66787c04ce0e47e4418fd5d8f92af65f9501aa1

              SHA256

              b8942316f788a4283a262bc9ee90ec55349245649c4be67f5de17a11243f6f9a

              SHA512

              c02b7c0003cfc190b578d10646ba8c026e445524428c40132fe324cb19e26f4c13a4b229c0d589e2057580197f90f60ab2f08fb5b71ebf461ef4edd4dbde8f0b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              c794031f08200ae70d89601065c0360c

              SHA1

              79d5b0e9aaa1e8f849f3a2fc7a635c7fdeb6ec50

              SHA256

              e9920c21cd22f9755e414f1ffe885688d8876943588054ed0f136885a26a04be

              SHA512

              658dd5dc1adbc35fb0d8138d44f6a8e5444c4d523e13bac4dfc2f6ffec793c017d9599db815fd5393b2f38dfd4edb5042889b62696a465abae6d649720820a3b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              ad6d56cc387588fb0918343816247092

              SHA1

              d352a6ef397aa6573ff451a571fef3ccecae598f

              SHA256

              e7937de0bb4ccede7e62052fec2aeedad3ea4dce928327fc1258b8efe80687e4

              SHA512

              dadc279c384b085a8242e1a611eae43caa91e4698efaf48c004265272d3889ca52417383d16ab68b30aeea72156344389479b122d25812447237efb5079d5fa8

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ezt2uks1.htw.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Local\Temp\~tlC4EC.tmp

              Filesize

              393KB

              MD5

              9dbdd43a2e0b032604943c252eaf634a

              SHA1

              9584dc66f3c1cce4210fdf827a1b4e2bb22263af

              SHA256

              33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

              SHA512

              b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

            • C:\Users\Admin\AppData\Local\Temp\~tlEEA1.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.6MB

              MD5

              c7e7df0119da2669c8d05dcf0f2cb4c5

              SHA1

              99324bd69525feb253c665023c9261b3f078818b

              SHA256

              6b92f204e74bf781bdd6e46152bf993deb86e367e749a29a47ba65f23d8846ff

              SHA512

              a9fd3259cbca5411df9791b215348d21b5ddd0cad942131ef852167737ee17f76e62c827edcd22c49868063d1af87d878663a15ec02cb53e8afbb75e19f45bab

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              9.4MB

              MD5

              1424571b3f8b6f97b24cf5aae5b96d83

              SHA1

              6b4ad47908b18e9836bd7f968f5f66f5b296fc9d

              SHA256

              d32df7ab6c633e1b9640c15bb46bd24ca23572f94dca6c4537c2942465f64921

              SHA512

              49ae6fc0e26d0e92d7478a06615790ca1f19751fcb3432e1627243c371a0e8fcaa2173d80db9ff99207db5336d182e3b8132937b675b19bd2d2a6fa3357f15c5

            • C:\Windows\System\svchost.exe

              Filesize

              5.3MB

              MD5

              4a6096deaaaf3fe393b61d66540ce4ab

              SHA1

              9f91f6feae419a73a3371e06206b5e459281cff0

              SHA256

              e9e34828dd3f60d69e3b5ea854a7a06906828cc5cfc8d5906897d2ab3b6765d5

              SHA512

              9322c12a042ef7914bedf73618b135775f99bcc352e23b606e6887f1e7843bda3fb9025a06eefb4bd1468a69565f6f8d34bacf0d0fcbd4ee7c34cd46c96e6d01

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              3KB

              MD5

              573d77d4e77a445f5db769812a0be865

              SHA1

              7473d15ef2d3c6894edefd472f411c8e3209a99c

              SHA256

              5ec3f268845a50e309ae0d80bcee4f4dd4cd1b279ab1e64b523a057c11074f1c

              SHA512

              af2422a9790a91cdcbe39e6ef6d17899c2cbd4159b1b71ac56f633015068d3afc678fcef34892575bf59bdf7d5914ec6070864940d44130263fe84e28abba2dc

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              2d3ab22b8c6f41c04913296cf2856bed

              SHA1

              6304965e54e9e11c2f3dde492994ab60448e0f4e

              SHA256

              541215a6836232733c6df6b852b27bc32ad6367e12602839ea1e886f1a4b6d1a

              SHA512

              4bdd896bfeab457fddf7f34c4ac96c4ebfe8e640d87cc967dccb5c3db138b993cfece3742901c6896f88b960f451e26c53bff3657772b100759a09713c4611d3

            • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              13ce9ceca4c790047cc87f00c68dceab

              SHA1

              773d4dbc2c028f115c9e7a15b220868fe6607b5f

              SHA256

              fb913170b3ce01e039d21928ef8a8891a2052fbd106b2d7f0a98c083e7f9a470

              SHA512

              756487c0fcf8c525570e7bf190a2085c785d03870e47c031f76922768a113b446a33c0a7bcbb0f100cd0c7e27f71423cba41efef5dd58b3fb590cb38870c5ca7

            • memory/408-397-0x000001CA2B940000-0x000001CA2B950000-memory.dmp

              Filesize

              64KB

            • memory/408-396-0x00007FFD6FA40000-0x00007FFD7042C000-memory.dmp

              Filesize

              9.9MB

            • memory/408-480-0x00007FFD6FA40000-0x00007FFD7042C000-memory.dmp

              Filesize

              9.9MB

            • memory/408-475-0x000001CA2B940000-0x000001CA2B950000-memory.dmp

              Filesize

              64KB

            • memory/408-430-0x000001CA2B940000-0x000001CA2B950000-memory.dmp

              Filesize

              64KB

            • memory/408-398-0x000001CA2B940000-0x000001CA2B950000-memory.dmp

              Filesize

              64KB

            • memory/816-231-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/816-216-0x0000000036960000-0x0000000036E5C000-memory.dmp

              Filesize

              5.0MB

            • memory/816-112-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/816-267-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/1016-98-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/1016-15-0x000001B7FAAB0000-0x000001B7FAAD2000-memory.dmp

              Filesize

              136KB

            • memory/1016-94-0x000001B7FAA00000-0x000001B7FAA10000-memory.dmp

              Filesize

              64KB

            • memory/1016-10-0x000001B7FAA00000-0x000001B7FAA10000-memory.dmp

              Filesize

              64KB

            • memory/1016-13-0x000001B7FAA00000-0x000001B7FAA10000-memory.dmp

              Filesize

              64KB

            • memory/1016-49-0x000001B7FAA00000-0x000001B7FAA10000-memory.dmp

              Filesize

              64KB

            • memory/1016-6-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/1984-503-0x00007FFD6FB20000-0x00007FFD7050C000-memory.dmp

              Filesize

              9.9MB

            • memory/1984-505-0x000001FB6E660000-0x000001FB6E670000-memory.dmp

              Filesize

              64KB

            • memory/1984-504-0x000001FB6E660000-0x000001FB6E670000-memory.dmp

              Filesize

              64KB

            • memory/2636-283-0x00007FFD6FB20000-0x00007FFD7050C000-memory.dmp

              Filesize

              9.9MB

            • memory/2636-368-0x00007FFD6FB20000-0x00007FFD7050C000-memory.dmp

              Filesize

              9.9MB

            • memory/2636-362-0x0000022AE29A0000-0x0000022AE29B0000-memory.dmp

              Filesize

              64KB

            • memory/2636-331-0x0000022AE29A0000-0x0000022AE29B0000-memory.dmp

              Filesize

              64KB

            • memory/2636-287-0x0000022AE29A0000-0x0000022AE29B0000-memory.dmp

              Filesize

              64KB

            • memory/2636-284-0x0000022AE29A0000-0x0000022AE29B0000-memory.dmp

              Filesize

              64KB

            • memory/2680-161-0x00000261EEEA0000-0x00000261EEEB0000-memory.dmp

              Filesize

              64KB

            • memory/2680-117-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/2680-125-0x00000261EEEA0000-0x00000261EEEB0000-memory.dmp

              Filesize

              64KB

            • memory/2680-208-0x00000261EEEA0000-0x00000261EEEB0000-memory.dmp

              Filesize

              64KB

            • memory/2680-215-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/2680-124-0x00000261EEEA0000-0x00000261EEEB0000-memory.dmp

              Filesize

              64KB

            • memory/3016-382-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3016-270-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3016-266-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3016-268-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3016-269-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3236-18-0x000001BF35E50000-0x000001BF35EC6000-memory.dmp

              Filesize

              472KB

            • memory/3236-101-0x000001BF1D5C0000-0x000001BF1D5D0000-memory.dmp

              Filesize

              64KB

            • memory/3236-7-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/3236-14-0x000001BF1D5C0000-0x000001BF1D5D0000-memory.dmp

              Filesize

              64KB

            • memory/3236-106-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/3236-45-0x000001BF1D5C0000-0x000001BF1D5D0000-memory.dmp

              Filesize

              64KB

            • memory/3236-12-0x000001BF1D5C0000-0x000001BF1D5D0000-memory.dmp

              Filesize

              64KB

            • memory/3476-963-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3476-1282-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3480-127-0x00000218A0450000-0x00000218A0460000-memory.dmp

              Filesize

              64KB

            • memory/3480-207-0x00000218A0450000-0x00000218A0460000-memory.dmp

              Filesize

              64KB

            • memory/3480-120-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/3480-157-0x00000218A0450000-0x00000218A0460000-memory.dmp

              Filesize

              64KB

            • memory/3480-126-0x00000218A0450000-0x00000218A0460000-memory.dmp

              Filesize

              64KB

            • memory/3480-211-0x00007FFD6FBC0000-0x00007FFD705AC000-memory.dmp

              Filesize

              9.9MB

            • memory/3496-957-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3496-629-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-496-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-493-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-603-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-498-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-497-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-602-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/3864-495-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4128-387-0x00007FFD6FA40000-0x00007FFD7042C000-memory.dmp

              Filesize

              9.9MB

            • memory/4128-389-0x000001B094760000-0x000001B094770000-memory.dmp

              Filesize

              64KB

            • memory/4128-485-0x00007FFD6FA40000-0x00007FFD7042C000-memory.dmp

              Filesize

              9.9MB

            • memory/4128-481-0x000001B094760000-0x000001B094770000-memory.dmp

              Filesize

              64KB

            • memory/4128-429-0x000001B094760000-0x000001B094770000-memory.dmp

              Filesize

              64KB

            • memory/4128-390-0x000001B094760000-0x000001B094770000-memory.dmp

              Filesize

              64KB

            • memory/4296-0-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/4296-113-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/4296-93-0x0000000140000000-0x0000000140647000-memory.dmp

              Filesize

              6.3MB

            • memory/4352-383-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4352-380-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4352-381-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4352-494-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/4740-372-0x00007FFD6FB20000-0x00007FFD7050C000-memory.dmp

              Filesize

              9.9MB

            • memory/4740-367-0x000002628B350000-0x000002628B360000-memory.dmp

              Filesize

              64KB

            • memory/4740-302-0x000002628B350000-0x000002628B360000-memory.dmp

              Filesize

              64KB

            • memory/4740-277-0x000002628B350000-0x000002628B360000-memory.dmp

              Filesize

              64KB

            • memory/4740-276-0x000002628B350000-0x000002628B360000-memory.dmp

              Filesize

              64KB

            • memory/4740-274-0x00007FFD6FB20000-0x00007FFD7050C000-memory.dmp

              Filesize

              9.9MB