Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

17/04/2024, 12:37

240417-pths4afc45 8

17/04/2024, 12:37

240417-ptg7kafc43 8

17/04/2024, 12:36

240417-ptcbbafc34 8

17/04/2024, 12:36

240417-ptbpsafc29 8

17/04/2024, 12:36

240417-pta39afc28 8

16/04/2024, 13:44

240416-q1vxnsda7z 8

Analysis

  • max time kernel
    1195s
  • max time network
    1200s
  • platform
    windows10-1703_x64
  • resource
    win10-20240319-en
  • resource tags

    arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system
  • submitted
    17/04/2024, 12:37

General

  • Target

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe

  • Size

    5.3MB

  • MD5

    63552c60caeefe5f2d0e4028b3cc65d3

  • SHA1

    dbed3040d53495a6afda01bfb8399376792eb48c

  • SHA256

    64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

  • SHA512

    caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

  • SSDEEP

    98304:vwrOjNr08jQxkFg97Nw76XgfqCPa1AQy2cmw:YC5r0wQxKg97Nw76XgyC6

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe
    "C:\Users\Admin\AppData\Local\Temp\64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1376
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2192
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
      2⤵
      • Creates scheduled task(s)
      PID:4852
    • C:\Windows\System\svchost.exe
      "C:\Windows\System\svchost.exe" formal
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\~tlF59.tmp
        C:\Users\Admin\AppData\Local\Temp\~tlF59.tmp
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1816
        • C:\Windows\SYSTEM32\netsh.exe
          netsh int ipv4 set dynamicport tcp start=1025 num=64511
          4⤵
            PID:3136
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:3524
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1728
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4636
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Windows\SYSTEM32\schtasks.exe
            schtasks /delete /TN "Timer"
            4⤵
              PID:2024
            • C:\Windows\SYSTEM32\schtasks.exe
              schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
              4⤵
              • Creates scheduled task(s)
              PID:904
            • C:\Windows\System\svchost.exe
              "C:\Windows\System\svchost.exe" formal
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3584
              • C:\Windows\SYSTEM32\netsh.exe
                netsh int ipv4 set dynamicport tcp start=1025 num=64511
                5⤵
                  PID:2924
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:2968
                • C:\Windows\System32\netsh.exe
                  "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                  5⤵
                  • Modifies Windows Firewall
                  PID:4428
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:888
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3460
                • C:\Users\Admin\AppData\Local\Temp\~tl6E8.tmp
                  C:\Users\Admin\AppData\Local\Temp\~tl6E8.tmp
                  5⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2320
                  • C:\Windows\SYSTEM32\netsh.exe
                    netsh int ipv4 set dynamicport tcp start=1025 num=64511
                    6⤵
                      PID:2284
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:696
                    • C:\Windows\System32\netsh.exe
                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                      6⤵
                      • Modifies Windows Firewall
                      PID:4852
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1728
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                      6⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4164
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            PID:3200
          • \??\c:\windows\system\svchost.exe
            c:\windows\system\svchost.exe
            1⤵
            • Executes dropped EXE
            PID:3224

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            268b890dae39e430e8b127909067ed96

            SHA1

            35939515965c0693ef46e021254c3e73ea8c4a2b

            SHA256

            7643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c

            SHA512

            abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            301d5d8470a9775dc65b5082b85291f0

            SHA1

            b7e7dceba94e516bdded38361f3958b66d46e627

            SHA256

            63eda7bce066f184c050cf8e2330a1e7abe1c249f786899e70ac362102c241a8

            SHA512

            af081a94a9d7615eb5ac583f7de44cf60e0d78ad0a7033efa50861e69275904ed413ae1e0bd4ff783f84854c1d411fd45c675fe3b58346ac87b54afc208cd201

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            8f4cb884a230e7fedae1e0214b3f2e76

            SHA1

            1f3289fe413d5e24740a494e0867c7e46a788f78

            SHA256

            3c0a409190b379a8f4c20cb9cab299f0e78687b28bfb98189b996df5ff5705fc

            SHA512

            b2376e32820789944148ab6dec4f8391e1667e887bd6feb864c790a302442391e23e95b384f8c88674b4bac9ad29884efa9781f10ad4d1a9e9ea8123b37f0531

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            faa4de2464b58758360c8c048aa971a3

            SHA1

            d662537257efef23cde752ff9e5e1b021f79e6d2

            SHA256

            20475dfca6579e71ff82bd70b4efcf1820d5b3fc88a5eed4d663db7c0613c3cf

            SHA512

            638ae9a101504273130d54cbb938c11774020988c1d4a24a62107a8c769773240e76b9962f612269116496061d7b25906e8a6c00c5bc63728741b42730ab7230

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            2ea9c523f2bc5057885ece1de114d14b

            SHA1

            ef91c1ce2b093e7636baf95c29ea58eceee4a27b

            SHA256

            e899ca7e6d4d944bb6828972ffc2e8feca370f6de50b84c30a9152f4c946d0c9

            SHA512

            d4dfca25364b743981d5a97aa0a31157cf1ccfdd89e795041f5e9bbe88e716b906edba97249696728903f3fff4e1dcef677712ad56c02c216d08b902b5f4bd22

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            e89d660dbce450596b59a7a06a068fa9

            SHA1

            471d89b82872f3104d20ce7a19e14346d6bb6b7c

            SHA256

            566908cc5827bfbd61d6b197db3c4b421be6c64129d0fc2649a3ebaee3f9efa2

            SHA512

            e3c456cf3ed726a336ad2285dfbad6ff6209c3f28e05bf9a938e31df5f79ba2567b7f27048a71c7ff4b54eb45254074e072ee2c12da5bc7e23581034252672e9

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1h1lzjq4.cj0.ps1

            Filesize

            1B

            MD5

            c4ca4238a0b923820dcc509a6f75849b

            SHA1

            356a192b7913b04c54574d18c28d46e6395428ab

            SHA256

            6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

            SHA512

            4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

          • C:\Users\Admin\AppData\Local\Temp\~tl6E8.tmp

            Filesize

            393KB

            MD5

            9dbdd43a2e0b032604943c252eaf634a

            SHA1

            9584dc66f3c1cce4210fdf827a1b4e2bb22263af

            SHA256

            33c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86

            SHA512

            b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1

          • C:\Users\Admin\AppData\Local\Temp\~tlF59.tmp

            Filesize

            385KB

            MD5

            e802c96760e48c5139995ffb2d891f90

            SHA1

            bba3d278c0eb1094a26e5d2f4c099ad685371578

            SHA256

            cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c

            SHA512

            97300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

            Filesize

            2.6MB

            MD5

            e7634067c1219da664e2c13a622988bf

            SHA1

            b354b3912ec59fefecdaa660af50c679b136b6ca

            SHA256

            e1f51b61149b811c5029caaa39ddf54faa18fcd18bbcf432155ad324fbc0fdb7

            SHA512

            b61ea1448ec13e88c66e043c0f99d95a2626e631841bec0b0e2e1dd6cbbcb8f8587d414f3ad32794ccdadf7c763910ed844220684f3edc71109f47fe4353c944

          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

            Filesize

            11.7MB

            MD5

            8d436a6212dcd0ca7e88972f3f5b844c

            SHA1

            ba793ae7f2e44b052cfe5847bb4659eec7f750df

            SHA256

            f2edf90759f13206e86f38ee9837bfa5a0b0e288bb1ba39fa4ee3c83ec2fe4b3

            SHA512

            2ae1e9386e3daea3954128ed1c44a5c1fb9035af8c4134ed36fb00def33130f436dabdc3cbdd0966e1bd2bf6ed40a00512cf832c979dda3983cba8f22641bd5f

          • C:\Windows\System\svchost.exe

            Filesize

            5.3MB

            MD5

            63552c60caeefe5f2d0e4028b3cc65d3

            SHA1

            dbed3040d53495a6afda01bfb8399376792eb48c

            SHA256

            64e589ec7bd006671b3192241c36ab7d87c9f4e93fd0b0d6f5f327de1b9a59ab

            SHA512

            caf92a581afd25daaf9763a382b47fc87141773a8879c24ed855dfe1186b86ed7269b0cf17e8c1caee983eb85008f1161f4df07aabe0e1bb719514b41c365ba0

          • memory/888-514-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/888-557-0x000001982C730000-0x000001982C740000-memory.dmp

            Filesize

            64KB

          • memory/888-517-0x000001982C730000-0x000001982C740000-memory.dmp

            Filesize

            64KB

          • memory/888-516-0x000001982C730000-0x000001982C740000-memory.dmp

            Filesize

            64KB

          • memory/888-606-0x000001982C730000-0x000001982C740000-memory.dmp

            Filesize

            64KB

          • memory/1376-20-0x000002C474360000-0x000002C474370000-memory.dmp

            Filesize

            64KB

          • memory/1376-17-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/1376-105-0x000002C474360000-0x000002C474370000-memory.dmp

            Filesize

            64KB

          • memory/1376-14-0x000002C4745C0000-0x000002C4745E2000-memory.dmp

            Filesize

            136KB

          • memory/1376-110-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/1376-18-0x000002C474BD0000-0x000002C474C46000-memory.dmp

            Filesize

            472KB

          • memory/1376-31-0x000002C474360000-0x000002C474370000-memory.dmp

            Filesize

            64KB

          • memory/1376-46-0x000002C474360000-0x000002C474370000-memory.dmp

            Filesize

            64KB

          • memory/1816-392-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1816-391-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1816-508-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/1816-397-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/2192-29-0x000001D4FB4C0000-0x000001D4FB4D0000-memory.dmp

            Filesize

            64KB

          • memory/2192-19-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/2192-30-0x000001D4FB4C0000-0x000001D4FB4D0000-memory.dmp

            Filesize

            64KB

          • memory/2192-104-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/2192-98-0x000001D4FB4C0000-0x000001D4FB4D0000-memory.dmp

            Filesize

            64KB

          • memory/2192-58-0x000001D4FB4C0000-0x000001D4FB4D0000-memory.dmp

            Filesize

            64KB

          • memory/2292-489-0x000001C457B30000-0x000001C457B40000-memory.dmp

            Filesize

            64KB

          • memory/2292-459-0x000001C457B30000-0x000001C457B40000-memory.dmp

            Filesize

            64KB

          • memory/2292-419-0x000001C457B30000-0x000001C457B40000-memory.dmp

            Filesize

            64KB

          • memory/2292-418-0x000001C457B30000-0x000001C457B40000-memory.dmp

            Filesize

            64KB

          • memory/2292-407-0x00007FF978140000-0x00007FF978B2C000-memory.dmp

            Filesize

            9.9MB

          • memory/2292-495-0x00007FF978140000-0x00007FF978B2C000-memory.dmp

            Filesize

            9.9MB

          • memory/2424-123-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2424-227-0x0000000015740000-0x0000000015C3C000-memory.dmp

            Filesize

            5.0MB

          • memory/2424-124-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2424-243-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/2424-389-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/3200-323-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/3200-319-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/3224-378-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/3224-374-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/3460-521-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/3460-524-0x000001CA51D50000-0x000001CA51D60000-memory.dmp

            Filesize

            64KB

          • memory/3460-525-0x000001CA51D50000-0x000001CA51D60000-memory.dmp

            Filesize

            64KB

          • memory/3460-554-0x000001CA51D50000-0x000001CA51D60000-memory.dmp

            Filesize

            64KB

          • memory/3460-605-0x000001CA51D50000-0x000001CA51D60000-memory.dmp

            Filesize

            64KB

          • memory/3584-504-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/3584-511-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/3584-505-0x0000000140000000-0x000000014015E400-memory.dmp

            Filesize

            1.4MB

          • memory/4144-222-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/4144-130-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/4144-134-0x000001556E120000-0x000001556E130000-memory.dmp

            Filesize

            64KB

          • memory/4144-137-0x000001556E120000-0x000001556E130000-memory.dmp

            Filesize

            64KB

          • memory/4144-168-0x000001556E120000-0x000001556E130000-memory.dmp

            Filesize

            64KB

          • memory/4144-216-0x000001556E120000-0x000001556E130000-memory.dmp

            Filesize

            64KB

          • memory/4252-221-0x0000023247FA0000-0x0000023247FB0000-memory.dmp

            Filesize

            64KB

          • memory/4252-138-0x0000023247FA0000-0x0000023247FB0000-memory.dmp

            Filesize

            64KB

          • memory/4252-133-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/4252-226-0x00007FF9693C0000-0x00007FF969DAC000-memory.dmp

            Filesize

            9.9MB

          • memory/4252-175-0x0000023247FA0000-0x0000023247FB0000-memory.dmp

            Filesize

            64KB

          • memory/4252-136-0x0000023247FA0000-0x0000023247FB0000-memory.dmp

            Filesize

            64KB

          • memory/4636-399-0x00007FF978140000-0x00007FF978B2C000-memory.dmp

            Filesize

            9.9MB

          • memory/4636-488-0x0000021F17E70000-0x0000021F17E80000-memory.dmp

            Filesize

            64KB

          • memory/4636-496-0x00007FF978140000-0x00007FF978B2C000-memory.dmp

            Filesize

            9.9MB

          • memory/4636-401-0x0000021F17E70000-0x0000021F17E80000-memory.dmp

            Filesize

            64KB

          • memory/4636-400-0x0000021F17E70000-0x0000021F17E80000-memory.dmp

            Filesize

            64KB

          • memory/4636-424-0x0000021F17E70000-0x0000021F17E80000-memory.dmp

            Filesize

            64KB

          • memory/4896-118-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/4896-0-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/4896-5-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/4896-4-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB

          • memory/4896-3-0x0000000140000000-0x0000000140644400-memory.dmp

            Filesize

            6.3MB