Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    1198s
  • max time network
    1204s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 12:37

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 14 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 14 IoCs
  • Drops file in System32 directory 18 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2584
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\system32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:2848
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:596
      • C:\Users\Admin\AppData\Local\Temp\~tlD1C1.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlD1C1.tmp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Windows\system32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:2136
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:760
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2732
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:584
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2736
          • C:\Windows\system32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:308
            • C:\Windows\system32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:2064
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1272
              • C:\Windows\system32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:1604
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:568
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2748
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2804
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2328
                • C:\Users\Admin\AppData\Local\Temp\~tlA380.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tlA380.tmp
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2468
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:1308
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2216
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:2504
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:948
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2744
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {F848504C-C11F-4228-B6FA-39E60A28002B} S-1-5-18:NT AUTHORITY\System:Service:
            1⤵
            • Loads dropped DLL
            PID:1664
            • \??\c:\windows\system\svchost.exe
              c:\windows\system\svchost.exe
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              PID:2000
              • C:\Windows\system32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                3⤵
                • Modifies data under HKEY_USERS
                PID:1704
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                3⤵
                • Modifies Windows Firewall
                PID:1712
              • C:\Windows\System32\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                3⤵
                • Modifies Windows Firewall
                • Modifies data under HKEY_USERS
                PID:2084
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                3⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2956
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                3⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2616
              • C:\Windows\TEMP\~tl5976.tmp
                C:\Windows\TEMP\~tl5976.tmp
                3⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2508
                • C:\Windows\system32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  4⤵
                    PID:2580
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:2876
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:1672
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    4⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1684
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    4⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:952
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {EBC720C9-B0B4-47CD-8D88-E234A82AC63F} S-1-5-18:NT AUTHORITY\System:Service:
              1⤵
              • Loads dropped DLL
              PID:3032
              • \??\c:\windows\system\svchost.exe
                c:\windows\system\svchost.exe
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:2808
                • C:\Windows\system32\netsh.exe
                  netsh int ipv4 set dynamicport tcp start=1025 num=64511
                  3⤵
                  • Modifies data under HKEY_USERS
                  PID:2904
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:2324
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  3⤵
                  • Modifies Windows Firewall
                  • Modifies data under HKEY_USERS
                  PID:1528
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2624
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  3⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2936
                • C:\Windows\TEMP\~tlBA89.tmp
                  C:\Windows\TEMP\~tlBA89.tmp
                  3⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1640
                  • C:\Windows\system32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    4⤵
                    • Modifies data under HKEY_USERS
                    PID:268
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:1360
                  • C:\Windows\System32\netsh.exe
                    "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                    4⤵
                    • Modifies Windows Firewall
                    • Modifies data under HKEY_USERS
                    PID:1724
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                    4⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2428
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                    4⤵
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1828

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              73c4cd403a39f5a804e79da8fabbabec

              SHA1

              aa7bc60621139eef565cde2ec06913ae1243b9fc

              SHA256

              f90e249ade4939fcf5e00d4295f40b44eb0a96491281efeca59a05cb919eb52d

              SHA512

              d3e26b0197d3bbf28a7208cdc5ecc4d38a07319f3d4f24e734e70ad347745e7b2c33176f5b52bedc4fb646aa85aea71282921b15ec3043956779ce4645e2ff1c

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              c1c2bdbfe6143ed0dfba31ebe8207ceb

              SHA1

              c2b8e3e4dce4f1efd11668ae070eda6eb041f7cd

              SHA256

              9f4dacddd470d81fe46bba3c2507848374f876d0653a32a3dc4c7933afaa11e2

              SHA512

              ba4dbfc2352131416b30f6a2d412380c7009878fad9b3bc8cf3d287a1378afe988f201d86c3c45bfcdb2f8bf705b5afc793a1b0dfbda040143951aa27fc9a950

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              2.6MB

              MD5

              25c84e12bfd05b3fac26e8401ef7b9be

              SHA1

              8a9539ebe5c2b0456098093421265bbebb85aa26

              SHA256

              58941175dda88e5d9cb15f0db1bc1c1339b0357aff422ca5d5ee2a07186908c0

              SHA512

              069bda6a065ab7e47ca71dd974c2b3ec9cf15a5976faf9355437d8de04ebc0d6899eb93e807f611bea60903c51cfc61a2af77f0a1c7d442c396224e517c7b35c

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              6.5MB

              MD5

              998471196a004f02e37810e1c2cc8335

              SHA1

              445836bd7e8a0ec0e3287e0d7b73ce559324b78b

              SHA256

              d1b746aea333c4edfa95e05d9cd172e38923d6fb83cebd8d0eeb2d74780d6783

              SHA512

              b8c08c53111e4121bc778c1a1c574b5fb80601f33c2586f59267c271f43352a04578784e011204a4a601fe3c9e6126a3057ef912aab81f8fc999c5ceb4ae1bd4

            • \Users\Admin\AppData\Local\Temp\~tlA380.tmp

              Filesize

              393KB

              MD5

              9dbdd43a2e0b032604943c252eaf634a

              SHA1

              9584dc66f3c1cce4210fdf827a1b4e2bb22263af

              SHA256

              33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

              SHA512

              b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

            • \Users\Admin\AppData\Local\Temp\~tlD1C1.tmp

              Filesize

              385KB

              MD5

              e802c96760e48c5139995ffb2d891f90

              SHA1

              bba3d278c0eb1094a26e5d2f4c099ad685371578

              SHA256

              cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

              SHA512

              97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

            • \Windows\system\svchost.exe

              Filesize

              5.3MB

              MD5

              63552c60caeefe5f2d0e4028b3cc65d3

              SHA1

              dbed3040d53495a6afda01bfb8399376792eb48c

              SHA256

              64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

              SHA512

              caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

            • memory/584-168-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/584-170-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/584-176-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/584-171-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/584-167-0x0000000002AA0000-0x0000000002B20000-memory.dmp

              Filesize

              512KB

            • memory/584-165-0x000000001B340000-0x000000001B622000-memory.dmp

              Filesize

              2.9MB

            • memory/584-166-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/584-177-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/596-88-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/596-83-0x0000000002A60000-0x0000000002AE0000-memory.dmp

              Filesize

              512KB

            • memory/596-69-0x0000000002A60000-0x0000000002AE0000-memory.dmp

              Filesize

              512KB

            • memory/596-68-0x0000000002A60000-0x0000000002AE0000-memory.dmp

              Filesize

              512KB

            • memory/596-67-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/1272-198-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/1272-199-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/1272-201-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/1272-238-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/1308-43-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1308-0-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1308-3-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1308-5-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1308-6-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1308-4-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/1328-64-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/1328-89-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/1328-66-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/1328-65-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/1328-63-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/1328-70-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/1328-58-0x0000000002270000-0x0000000002278000-memory.dmp

              Filesize

              32KB

            • memory/1328-55-0x000000001B230000-0x000000001B512000-memory.dmp

              Filesize

              2.9MB

            • memory/1328-85-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/2000-281-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2328-219-0x0000000002960000-0x00000000029E0000-memory.dmp

              Filesize

              512KB

            • memory/2328-223-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/2328-218-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/2328-217-0x0000000002960000-0x00000000029E0000-memory.dmp

              Filesize

              512KB

            • memory/2328-220-0x0000000002960000-0x00000000029E0000-memory.dmp

              Filesize

              512KB

            • memory/2372-157-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2372-200-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2372-159-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2372-158-0x0000000140000000-0x000000014015E400-memory.dmp

              Filesize

              1.4MB

            • memory/2428-122-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-127-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-47-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-156-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-124-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-49-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-110-0x0000000140000000-0x0000000140644400-memory.dmp

              Filesize

              6.3MB

            • memory/2428-71-0x000000000B6D0000-0x000000000BBCC000-memory.dmp

              Filesize

              5.0MB

            • memory/2468-241-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/2468-239-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/2468-268-0x0000000140000000-0x0000000140170400-memory.dmp

              Filesize

              1.4MB

            • memory/2584-24-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2584-26-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2584-18-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2584-28-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2584-19-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2584-30-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2584-23-0x00000000028A0000-0x0000000002920000-memory.dmp

              Filesize

              512KB

            • memory/2660-21-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2660-16-0x000000001B370000-0x000000001B652000-memory.dmp

              Filesize

              2.9MB

            • memory/2660-32-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2660-29-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2660-27-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2660-25-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2660-22-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2660-20-0x00000000029B0000-0x0000000002A30000-memory.dmp

              Filesize

              512KB

            • memory/2660-17-0x0000000002490000-0x0000000002498000-memory.dmp

              Filesize

              32KB

            • memory/2736-180-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/2736-181-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/2736-187-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/2736-179-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/2736-182-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/2736-183-0x00000000027E0000-0x0000000002860000-memory.dmp

              Filesize

              512KB

            • memory/2736-178-0x000007FEF49E0000-0x000007FEF537D000-memory.dmp

              Filesize

              9.6MB

            • memory/2804-207-0x000000001B260000-0x000000001B542000-memory.dmp

              Filesize

              2.9MB

            • memory/2804-211-0x00000000022D0000-0x0000000002350000-memory.dmp

              Filesize

              512KB

            • memory/2804-215-0x0000000002390000-0x0000000002398000-memory.dmp

              Filesize

              32KB

            • memory/2804-209-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB

            • memory/2804-221-0x00000000022D0000-0x0000000002350000-memory.dmp

              Filesize

              512KB

            • memory/2804-222-0x00000000022D0000-0x0000000002350000-memory.dmp

              Filesize

              512KB

            • memory/2804-216-0x000007FEF4880000-0x000007FEF521D000-memory.dmp

              Filesize

              9.6MB