Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    302s
  • max time network
    308s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:36

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2888
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4132
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:4604
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3312
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3992
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2396
      • C:\Users\Admin\AppData\Local\Temp\~tlA317.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlA317.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5112
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2096
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1008
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1348
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3372
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1144
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:848
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2356
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3000
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:1308
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:404
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:5092
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1076
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:640
                • C:\Users\Admin\AppData\Local\Temp\~tl7B37.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tl7B37.tmp
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4432
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:3284
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:1468
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2496
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1844
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1404
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:4724

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              d85ba6ff808d9e5444a4b369f5bc2730

              SHA1

              31aa9d96590fff6981b315e0b391b575e4c0804a

              SHA256

              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

              SHA512

              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              f0a41fc9c1123bb127e55ecc66c8f052

              SHA1

              57152411758fa3df2623cc8a4df6d9fea73652f8

              SHA256

              a4fe2be2c449e841f6a12d32114672b097fc1058b6f2971a03521220a0228745

              SHA512

              e3e967adac361ddcf8240cf641f3e77eacfefc61dec725b8ae12e6a94f7d2ebd937fb9eb3cd068a0b3d4306e163dc87773b322bc2dd8b7df93b8103d0e99a900

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              65a68df1062af34622552c4f644a5708

              SHA1

              6f6ecf7b4b635abb0b132d95dac2759dc14b50af

              SHA256

              718dc2f5f4a6dbb7fab7f3db05bd7f602fb16526caae7084ab46c3ab4e7bad35

              SHA512

              4e460eb566032942547b58411222dd26ae300a95f83cf5ae6df58ebd28594341123611b348bd4031a33bc7f38307d5cb8fb677bba8c896919e3eee677a104d4d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              98baf5117c4fcec1692067d200c58ab3

              SHA1

              5b33a57b72141e7508b615e17fb621612cb8e390

              SHA256

              30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

              SHA512

              344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              3a6bad9528f8e23fb5c77fbd81fa28e8

              SHA1

              f127317c3bc6407f536c0f0600dcbcf1aabfba36

              SHA256

              986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

              SHA512

              846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              944B

              MD5

              110b59ca4d00786d0bde151d21865049

              SHA1

              557e730d93fdf944a0cad874022df1895fb5b2e2

              SHA256

              77f69011c214ea5a01fd2035d781914c4893aee66d784deadc22179eadfdf77f

              SHA512

              cb55ac6eca50f4427718bace861679c88b2fdfea94d30209e8d61ca73a6ce9f8c4b5334922d2660a829b0636d20cbdf3bae1497c920e604efe6c636019feb10e

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_2udeoglr.req.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\~tl7B37.tmp

              Filesize

              393KB

              MD5

              9dbdd43a2e0b032604943c252eaf634a

              SHA1

              9584dc66f3c1cce4210fdf827a1b4e2bb22263af

              SHA256

              33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

              SHA512

              b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

            • C:\Users\Admin\AppData\Local\Temp\~tlA317.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.6MB

              MD5

              8c29dca81612f559ac2e9aa5012896e4

              SHA1

              e7b504c8be6ae987ced54380dc2a34d03c613ef7

              SHA256

              b8ac5707fb24e123ee2bb53e97cfb166b3e86f1ee46b36bef7c41cf0f58047fd

              SHA512

              7c910b5c97dc3f556d35c9b48dd5ea4c4b55827bb66b508347c63650ad744f3992280df808a187f06daede1895347c46787fd110ba2015f92a927ab1f650a98c

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              19.0MB

              MD5

              830a43e874e0354f535b96092bb6d651

              SHA1

              b0329bbb70bde6f122194ea1a40502cb696ea857

              SHA256

              466c19e9ca79dfbf77dade257513d854532eea9ece9d35289849abf20da90e70

              SHA512

              3d99dec32b96e8a18ab5cc096c4ac4ff403ed759984bbc01a811bf6297ba039ed5ff2ebf5b1a62dc9a8c71142e6f3ef9b39ee54d2621f49aff75b71b6b1b5dd7

            • C:\Windows\System\svchost.exe

              Filesize

              5.3MB

              MD5

              63552c60caeefe5f2d0e4028b3cc65d3

              SHA1

              dbed3040d53495a6afda01bfb8399376792eb48c

              SHA256

              64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

              SHA512

              caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

            • memory/640-202-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/640-222-0x000001CE50600000-0x000001CE50610000-memory.dmp

              Filesize

              64KB

            • memory/640-228-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1076-201-0x000001EC451B0000-0x000001EC451C0000-memory.dmp

              Filesize

              64KB

            • memory/1076-200-0x000001EC451B0000-0x000001EC451C0000-memory.dmp

              Filesize

              64KB

            • memory/1076-199-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1076-223-0x000001EC451B0000-0x000001EC451C0000-memory.dmp

              Filesize

              64KB

            • memory/1076-225-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1144-165-0x0000013ED9E90000-0x0000013ED9EA0000-memory.dmp

              Filesize

              64KB

            • memory/1144-183-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1144-178-0x0000013ED9E90000-0x0000013ED9EA0000-memory.dmp

              Filesize

              64KB

            • memory/1144-177-0x0000013ED9E90000-0x0000013ED9EA0000-memory.dmp

              Filesize

              64KB

            • memory/1144-164-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1404-254-0x000001DB33A40000-0x000001DB33A50000-memory.dmp

              Filesize

              64KB

            • memory/1404-252-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1404-266-0x000001DB33A40000-0x000001DB33A50000-memory.dmp

              Filesize

              64KB

            • memory/1404-267-0x000001DB33A40000-0x000001DB33A50000-memory.dmp

              Filesize

              64KB

            • memory/1404-253-0x000001DB33A40000-0x000001DB33A50000-memory.dmp

              Filesize

              64KB

            • memory/1404-272-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1844-271-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1844-242-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/1844-255-0x000001D9C6120000-0x000001D9C6130000-memory.dmp

              Filesize

              64KB

            • memory/2396-87-0x00007FFE899A0000-0x00007FFE8A461000-memory.dmp

              Filesize

              10.8MB

            • memory/2396-66-0x00007FFE899A0000-0x00007FFE8A461000-memory.dmp

              Filesize

              10.8MB

            • memory/2396-78-0x0000022522470000-0x0000022522480000-memory.dmp

              Filesize

              64KB

            • memory/2396-67-0x0000022522470000-0x0000022522480000-memory.dmp

              Filesize

              64KB

            • memory/2396-81-0x0000022522470000-0x0000022522480000-memory.dmp

              Filesize

              64KB

            • memory/2888-31-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/2888-29-0x000001FEB3820000-0x000001FEB3830000-memory.dmp

              Filesize

              64KB

            • memory/2888-7-0x000001FEB3930000-0x000001FEB3952000-memory.dmp

              Filesize

              136KB

            • memory/2888-28-0x000001FEB3820000-0x000001FEB3830000-memory.dmp

              Filesize

              64KB

            • memory/2888-34-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/3000-198-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3000-196-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3000-237-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/3312-55-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3312-141-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3312-54-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3312-88-0x0000000015540000-0x0000000015A3C000-memory.dmp

              Filesize

              5.0MB

            • memory/3312-104-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3312-148-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3312-140-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/3372-154-0x000002E86A600000-0x000002E86A610000-memory.dmp

              Filesize

              64KB

            • memory/3372-179-0x000002E86A600000-0x000002E86A610000-memory.dmp

              Filesize

              64KB

            • memory/3372-153-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/3372-176-0x000002E86A600000-0x000002E86A610000-memory.dmp

              Filesize

              64KB

            • memory/3372-184-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/3992-68-0x0000020F5CD00000-0x0000020F5CD10000-memory.dmp

              Filesize

              64KB

            • memory/3992-86-0x00007FFE899A0000-0x00007FFE8A461000-memory.dmp

              Filesize

              10.8MB

            • memory/3992-82-0x0000020F5CD00000-0x0000020F5CD10000-memory.dmp

              Filesize

              64KB

            • memory/3992-80-0x0000020F5CD00000-0x0000020F5CD10000-memory.dmp

              Filesize

              64KB

            • memory/3992-56-0x00007FFE899A0000-0x00007FFE8A461000-memory.dmp

              Filesize

              10.8MB

            • memory/4132-38-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/4132-26-0x00007FFE89A50000-0x00007FFE8A511000-memory.dmp

              Filesize

              10.8MB

            • memory/4132-27-0x0000013F97150000-0x0000013F97160000-memory.dmp

              Filesize

              64KB

            • memory/4132-30-0x0000013F97150000-0x0000013F97160000-memory.dmp

              Filesize

              64KB

            • memory/4432-241-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4432-240-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4432-239-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4432-274-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4432-236-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/4484-6-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4484-0-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4484-49-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4484-3-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4484-4-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/4484-5-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/5112-147-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-197-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-150-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-151-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/5112-152-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB