Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    1198s
  • max time network
    1206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 12:37

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 8 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2064
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3292
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:368
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Users\Admin\AppData\Local\Temp\~tl798E.tmp
        C:\Users\Admin\AppData\Local\Temp\~tl798E.tmp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2432
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:436
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1164
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:4780
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:804
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:740
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:4728
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:4352
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1264
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:4188
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:1436
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:4936
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3744
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3404
                • C:\Users\Admin\AppData\Local\Temp\~tl50F3.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tl50F3.tmp
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4604
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:3708
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2248
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:3268
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3552
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:856
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            PID:1076
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:5048
            • C:\Windows\system32\netsh.exe
              netsh int ipv4 set dynamicport tcp start=1025 num=64511
              2⤵
                PID:2812
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                2⤵
                • Modifies Windows Firewall
                PID:1192
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                2⤵
                • Modifies Windows Firewall
                PID:2280
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1308
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:532
              • C:\Windows\TEMP\~tl8EA4.tmp
                C:\Windows\TEMP\~tl8EA4.tmp
                2⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:3980
                • C:\Windows\system32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  3⤵
                    PID:1472
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    3⤵
                    • Modifies Windows Firewall
                    PID:2620
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    3⤵
                    • Modifies Windows Firewall
                    PID:5036
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4828
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2684

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                d85ba6ff808d9e5444a4b369f5bc2730

                SHA1

                31aa9d96590fff6981b315e0b391b575e4c0804a

                SHA256

                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                SHA512

                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                98baf5117c4fcec1692067d200c58ab3

                SHA1

                5b33a57b72141e7508b615e17fb621612cb8e390

                SHA256

                30bf8496e9a08f4fdfe4767abcd565f92b6da06ca1c7823a70cb7cab16262e51

                SHA512

                344a70bfc037d54176f12db91f05bf4295bb587a5062fd1febe6f52853571170bd8ef6042cb87b893185bbae1937cf77b679d7970f8cc1c2666b0b7c1b32987d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                9bc110200117a3752313ca2acaf8a9e1

                SHA1

                fda6b7da2e7b0175b391475ca78d1b4cf2147cd3

                SHA256

                c88e4bbb64f7fa31429ebe82c1cf07785c44486f37576f783a26ac856e02a4eb

                SHA512

                1f1af32aa18a8cbfcc65b0d4fb7e6ca2705f125eaa85789e981ee68b90c64522e954825abf460d4b4f97567715dfae8d9b0a25a4d54d10bc4c257c472f2e80fb

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                d28a889fd956d5cb3accfbaf1143eb6f

                SHA1

                157ba54b365341f8ff06707d996b3635da8446f7

                SHA256

                21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                SHA512

                0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                944B

                MD5

                04114c0529b116bf66d764ff6a5a8fe3

                SHA1

                0caeff17d1b2190f76c9bf539105f6c40c92bd14

                SHA256

                fd7092b4e273314186bad6ce71aa4cd69450736b6ec6cc746868997ff82a7532

                SHA512

                6a718c330824346606ef24f71cca6be0bfafc626b1d2b060b36e919ab07f3d6a345f56cace8a5a84ffbe2183976eb197842c9fd2f3e3b8c8dd307057d59d6f26

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gqwjxdte.qd2.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\~tl50F3.tmp

                Filesize

                393KB

                MD5

                9dbdd43a2e0b032604943c252eaf634a

                SHA1

                9584dc66f3c1cce4210fdf827a1b4e2bb22263af

                SHA256

                33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

                SHA512

                b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

              • C:\Users\Admin\AppData\Local\Temp\~tl798E.tmp

                Filesize

                385KB

                MD5

                e802c96760e48c5139995ffb2d891f90

                SHA1

                bba3d278c0eb1094a26e5d2f4c099ad685371578

                SHA256

                cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

                SHA512

                97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

              • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

                Filesize

                2.6MB

                MD5

                e7634067c1219da664e2c13a622988bf

                SHA1

                b354b3912ec59fefecdaa660af50c679b136b6ca

                SHA256

                e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7

                SHA512

                b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944

              • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

                Filesize

                18.3MB

                MD5

                3bcb97cd9355c237e449bbd4b73089af

                SHA1

                47e52c22446ccb03ae4c5eb18170509e5e3bb408

                SHA256

                47d6b6ee6d4989074a10eb2f99be1ecf3526d6c4bb9d23f79ccc4d72d59436f8

                SHA512

                edf03bac4e3dfc30f3e90a6ca8e902da3460c797ea126829b3967e26e52b1faa2d89325bcdb5f4d5d923ad4b8b10aec5392b76e86f138ed6a8b33b206f49bf95

              • C:\Windows\System\svchost.exe

                Filesize

                5.3MB

                MD5

                63552c60caeefe5f2d0e4028b3cc65d3

                SHA1

                dbed3040d53495a6afda01bfb8399376792eb48c

                SHA256

                64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

                SHA512

                caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                4KB

                MD5

                bdb25c22d14ec917e30faf353826c5de

                SHA1

                6c2feb9cea9237bc28842ebf2fea68b3bd7ad190

                SHA256

                e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495

                SHA512

                b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c

              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                b42c70c1dbf0d1d477ec86902db9e986

                SHA1

                1d1c0a670748b3d10bee8272e5d67a4fabefd31f

                SHA256

                8ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a

                SHA512

                57fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5

              • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                Filesize

                1KB

                MD5

                2b269f1e86920041f03ed04b5cc09497

                SHA1

                cb6a846b9d74bc05a0d916fa628a87afac8918d3

                SHA256

                9b221a6c3cc39e60f1e6adeba32342ca20f25957a14e8054eacd3e3eee9925aa

                SHA512

                5a8a5991951808c030245f843656838708a8b74ce606b8d73cecb0c6734b3a3fdec6d401a4c24c4e2c095f79342e8bb006dd9b5878cf0e384101ffd23b89e6dd

              • memory/740-211-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/740-229-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/740-224-0x0000026992A40000-0x0000026992A50000-memory.dmp

                Filesize

                64KB

              • memory/740-219-0x0000026992A40000-0x0000026992A50000-memory.dmp

                Filesize

                64KB

              • memory/740-218-0x0000026992A40000-0x0000026992A50000-memory.dmp

                Filesize

                64KB

              • memory/804-226-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/804-217-0x00000140E0960000-0x00000140E0970000-memory.dmp

                Filesize

                64KB

              • memory/804-198-0x00000140E0960000-0x00000140E0970000-memory.dmp

                Filesize

                64KB

              • memory/804-197-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/804-199-0x00000140E0960000-0x00000140E0970000-memory.dmp

                Filesize

                64KB

              • memory/856-305-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/856-307-0x000002C5F7E70000-0x000002C5F7E80000-memory.dmp

                Filesize

                64KB

              • memory/1076-175-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/1076-173-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/1264-242-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/1264-287-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/1264-241-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/1264-256-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/2064-27-0x00000203F33C0000-0x00000203F33D0000-memory.dmp

                Filesize

                64KB

              • memory/2064-26-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2064-29-0x00000203F33C0000-0x00000203F33D0000-memory.dmp

                Filesize

                64KB

              • memory/2064-38-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2112-71-0x0000027BF3740000-0x0000027BF3750000-memory.dmp

                Filesize

                64KB

              • memory/2112-85-0x0000027BF3740000-0x0000027BF3750000-memory.dmp

                Filesize

                64KB

              • memory/2112-82-0x0000027BF3740000-0x0000027BF3750000-memory.dmp

                Filesize

                64KB

              • memory/2112-88-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2112-72-0x0000027BF3740000-0x0000027BF3750000-memory.dmp

                Filesize

                64KB

              • memory/2112-70-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2336-0-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2336-3-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2336-5-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2336-4-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2336-6-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2336-49-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2432-194-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/2432-209-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/2432-195-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/2432-244-0x0000000140000000-0x000000014015E400-memory.dmp

                Filesize

                1.4MB

              • memory/2740-66-0x0000026FCCA60000-0x0000026FCCA70000-memory.dmp

                Filesize

                64KB

              • memory/2740-65-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2740-67-0x0000026FCCA60000-0x0000026FCCA70000-memory.dmp

                Filesize

                64KB

              • memory/2740-69-0x0000026FCCA60000-0x0000026FCCA70000-memory.dmp

                Filesize

                64KB

              • memory/2740-84-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/2848-53-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2848-55-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2848-192-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/2848-89-0x0000000015540000-0x0000000015A3C000-memory.dmp

                Filesize

                5.0MB

              • memory/2848-105-0x0000000140000000-0x0000000140644400-memory.dmp

                Filesize

                6.3MB

              • memory/3292-28-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/3292-32-0x0000024FF47A0000-0x0000024FF47B0000-memory.dmp

                Filesize

                64KB

              • memory/3292-31-0x0000024FF47A0000-0x0000024FF47B0000-memory.dmp

                Filesize

                64KB

              • memory/3292-30-0x0000024FF47A0000-0x0000024FF47B0000-memory.dmp

                Filesize

                64KB

              • memory/3292-33-0x0000024FF47A0000-0x0000024FF47B0000-memory.dmp

                Filesize

                64KB

              • memory/3292-37-0x00007FFECB610000-0x00007FFECC0D1000-memory.dmp

                Filesize

                10.8MB

              • memory/3292-16-0x0000024FF4720000-0x0000024FF4742000-memory.dmp

                Filesize

                136KB

              • memory/3404-274-0x000001BB424E0000-0x000001BB424F0000-memory.dmp

                Filesize

                64KB

              • memory/3404-277-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/3404-255-0x000001BB424E0000-0x000001BB424F0000-memory.dmp

                Filesize

                64KB

              • memory/3404-271-0x000001BB424E0000-0x000001BB424F0000-memory.dmp

                Filesize

                64KB

              • memory/3404-254-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/3404-257-0x000001BB424E0000-0x000001BB424F0000-memory.dmp

                Filesize

                64KB

              • memory/3552-317-0x0000021DF1700000-0x0000021DF1710000-memory.dmp

                Filesize

                64KB

              • memory/3552-293-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/3552-294-0x0000021DF1700000-0x0000021DF1710000-memory.dmp

                Filesize

                64KB

              • memory/3552-295-0x0000021DF1700000-0x0000021DF1710000-memory.dmp

                Filesize

                64KB

              • memory/3744-273-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/3744-246-0x00007FFECC410000-0x00007FFECCED1000-memory.dmp

                Filesize

                10.8MB

              • memory/3744-247-0x00000184AD580000-0x00000184AD590000-memory.dmp

                Filesize

                64KB

              • memory/4604-292-0x0000000140000000-0x0000000140170400-memory.dmp

                Filesize

                1.4MB

              • memory/4604-290-0x0000000140000000-0x0000000140170400-memory.dmp

                Filesize

                1.4MB

              • memory/4604-289-0x0000000140000000-0x0000000140170400-memory.dmp

                Filesize

                1.4MB