Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    300s
  • max time network
    303s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1884
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5032
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:1020
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1924
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3440
      • C:\Users\Admin\AppData\Local\Temp\~tlCE76.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlCE76.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2116
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:4976
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1176
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4300
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2332
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1204
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:4768
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:3480
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4444
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:2240
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:1720
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2756
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2656
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4952
                • C:\Users\Admin\AppData\Local\Temp\~tlA8AA.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlA8AA.tmp
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3496
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:4740
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4304
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:556
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1996
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2064

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            0256bd284691ed0fc502ef3c8a7e58dc

            SHA1

            dcdf69dc8ca8bf068f65d20ef1563bbe283e2413

            SHA256

            e2fb83098e114084f51ed7187334f861ce670051046c39f338928296ca9a49cf

            SHA512

            c5b29c1e0a15ddb68b0579848066774fa7cdc6f35087bbbf47c05a5c0dcc1eb3e61b2ddadfbded8c1ed9820e637596a9f08a97db8fb18000d168e6b159060c42

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            a2c8179aaa149c0b9791b73ce44c04d1

            SHA1

            703361b0d43ec7f669304e7c0ffbbfdeb1e484ff

            SHA256

            c1d30342a40a2b6e7553da30ceb85754d33820f6fbb3bbbed1ceb30d6390de4a

            SHA512

            2e201dd457d055baad86f68c15bcc7beb48d6dc2ffc10db7f304eb93f697e7b45991cbde857d25da2c9c60c23f3e13df8b5ed5809c1753737a23096e296cc9e3

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            e60eb305a7b2d9907488068b7065abd3

            SHA1

            1643dd7f915ac50c75bc01c53d68c5dafb9ce28d

            SHA256

            ad07460e061642c0dd4e7dfa7b821aacce873e290389e72f708e9f3504f9d135

            SHA512

            95c45afec6fa4e0b2a21edd10a6b2dc30568810c67bc9bc34d98ab111c48261f377a370583adb27e08616b0108026c119493b1b093b52ce931117e646b46cb7b

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            9c740b7699e2363ac4ecdf496520ca35

            SHA1

            aa8691a8c56500d82c5fc8c35209bc6fe50ab1d9

            SHA256

            be96c91b62ba9ba7072ab89e66543328c9e4395150f9dbe8067332d94a3ecc61

            SHA512

            8885683f96353582eb871209e766e7eba1a72a2837ce27ea298b7b5b169621d1fa3fce25346b6bfd258b52642644234da9559d4e765a2023a5a5fc1f544cc7af

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            6d3e9c29fe44e90aae6ed30ccf799ca8

            SHA1

            c7974ef72264bbdf13a2793ccf1aed11bc565dce

            SHA256

            2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

            SHA512

            60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            96e3b86880fedd5afc001d108732a3e5

            SHA1

            8fc17b39d744a9590a6d5897012da5e6757439a3

            SHA256

            c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294

            SHA512

            909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ctd0djcw.44k.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\~tlA8AA.tmp

            Filesize

            393KB

            MD5

            9dbdd43a2e0b032604943c252eaf634a

            SHA1

            9584dc66f3c1cce4210fdf827a1b4e2bb22263af

            SHA256

            33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

            SHA512

            b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

          • C:\Users\Admin\AppData\Local\Temp\~tlCE76.tmp

            Filesize

            385KB

            MD5

            e802c96760e48c5139995ffb2d891f90

            SHA1

            bba3d278c0eb1094a26e5d2f4c099ad685371578

            SHA256

            cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

            SHA512

            97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

            Filesize

            2.6MB

            MD5

            8c29dca81612f559ac2e9aa5012896e4

            SHA1

            e7b504c8be6ae987ced54380dc2a34d03c613ef7

            SHA256

            b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

            SHA512

            7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

            Filesize

            13.1MB

            MD5

            d5bef969b1f550a8227a2b55716b2d97

            SHA1

            11594b1b37f5eb739565f3b7a9c23879fbe6a43e

            SHA256

            56498a5bf00be8a973d690021a49ccf4b5d054ff83d22053b3c0b8d5b29376ca

            SHA512

            1b4a8e23e7329743fa1443ddf0be78fac0699369802a79b1586c749daccfe23f55787ab90da0d53b3523dea23da9bc53f0e1c25d1eb8ad6d2c8353784e9f2379

          • C:\Windows\System\svchost.exe

            Filesize

            5.3MB

            MD5

            63552c60caeefe5f2d0e4028b3cc65d3

            SHA1

            dbed3040d53495a6afda01bfb8399376792eb48c

            SHA256

            64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

            SHA512

            caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

          • memory/744-6-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/744-5-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/744-3-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/744-0-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/744-48-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1204-166-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/1204-152-0x0000021455EB0000-0x0000021455EC0000-memory.dmp

            Filesize

            64KB

          • memory/1204-151-0x0000021455EB0000-0x0000021455EC0000-memory.dmp

            Filesize

            64KB

          • memory/1204-150-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/1884-27-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/1884-28-0x00000247B15E0000-0x00000247B15F0000-memory.dmp

            Filesize

            64KB

          • memory/1884-36-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/1924-133-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1924-53-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1924-82-0x0000000015540000-0x0000000015A3C000-memory.dmp

            Filesize

            5.0MB

          • memory/1924-97-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1924-123-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/1996-235-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/1996-250-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/1996-237-0x0000017482580000-0x0000017482590000-memory.dmp

            Filesize

            64KB

          • memory/1996-236-0x0000017482580000-0x0000017482590000-memory.dmp

            Filesize

            64KB

          • memory/2064-253-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/2064-248-0x0000027075AA0000-0x0000027075AB0000-memory.dmp

            Filesize

            64KB

          • memory/2064-244-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/2116-132-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2116-180-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2116-137-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2116-136-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2116-135-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2332-139-0x0000022248670000-0x0000022248680000-memory.dmp

            Filesize

            64KB

          • memory/2332-138-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/2332-163-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/2656-193-0x000002585E970000-0x000002585E980000-memory.dmp

            Filesize

            64KB

          • memory/2656-192-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/2656-194-0x000002585E970000-0x000002585E980000-memory.dmp

            Filesize

            64KB

          • memory/2656-208-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/3440-80-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/3440-65-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/3496-221-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-224-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-255-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-223-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-222-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-256-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/3496-219-0x0000000140000000-0x0000000140170400-memory.dmp

            Filesize

            1.4MB

          • memory/4408-54-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/4408-81-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/4408-55-0x00000298A4130000-0x00000298A4140000-memory.dmp

            Filesize

            64KB

          • memory/4408-71-0x00000298A4130000-0x00000298A4140000-memory.dmp

            Filesize

            64KB

          • memory/4444-178-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/4444-181-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/4444-220-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/4952-195-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/4952-196-0x00000252A14E0000-0x00000252A14F0000-memory.dmp

            Filesize

            64KB

          • memory/4952-209-0x00000252A14E0000-0x00000252A14F0000-memory.dmp

            Filesize

            64KB

          • memory/4952-211-0x00007FFBFA3D0000-0x00007FFBFAE91000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-37-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-30-0x000001CE7E2D0000-0x000001CE7E2E0000-memory.dmp

            Filesize

            64KB

          • memory/5032-29-0x000001CE7E2D0000-0x000001CE7E2E0000-memory.dmp

            Filesize

            64KB

          • memory/5032-26-0x00007FFBF9DA0000-0x00007FFBFA861000-memory.dmp

            Filesize

            10.8MB

          • memory/5032-12-0x000001CE65C50000-0x000001CE65C72000-memory.dmp

            Filesize

            136KB