Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 05:21

General

  • Target

    6fed287a09bdd29f1935e1fc0ef50840_NeikiAnalytics.exe

  • Size

    1.3MB

  • MD5

    6fed287a09bdd29f1935e1fc0ef50840

  • SHA1

    6f524e3acbf58c0daafc6bb67c5fcd4182e04dc8

  • SHA256

    4faa0a94ee4cb1b9c9503783ca8da7fac14107f4f893be36ab931f26f8409594

  • SHA512

    9a2699088635ebf3871315913aff56f280cacdc36853ec0ba218a736bf3dedfaadd75c7bce3ed27616426c18bffb00840158dcdeaa7877cfb8a16dfaff82e3b4

  • SSDEEP

    12288:OHgn3FN92mrRUDkDTYNmN3Rus3SAFYq8Noz9qirzrEX1fsd7TOoOTd:OHa1N3RUDHNmdPCAaq8Nozgi/rE0TOj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 22 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fed287a09bdd29f1935e1fc0ef50840_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6fed287a09bdd29f1935e1fc0ef50840_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1300
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2452
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Executes dropped EXE
    PID:4260
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:1568
    • C:\Windows\system32\fxssvc.exe
      C:\Windows\system32\fxssvc.exe
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1372
    • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"
      1⤵
      • Executes dropped EXE
      PID:1088
    • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
      "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4568
    • C:\Windows\System32\msdtc.exe
      C:\Windows\System32\msdtc.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      PID:3684
    • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
      "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
      1⤵
      • Executes dropped EXE
      PID:4420
    • C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe
      1⤵
      • Executes dropped EXE
      PID:2912
    • C:\Windows\SysWow64\perfhost.exe
      C:\Windows\SysWow64\perfhost.exe
      1⤵
      • Executes dropped EXE
      PID:4232
    • C:\Windows\system32\locator.exe
      C:\Windows\system32\locator.exe
      1⤵
      • Executes dropped EXE
      PID:2292
    • C:\Windows\System32\SensorDataService.exe
      C:\Windows\System32\SensorDataService.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:3904
    • C:\Windows\System32\snmptrap.exe
      C:\Windows\System32\snmptrap.exe
      1⤵
      • Executes dropped EXE
      PID:2428
    • C:\Windows\system32\spectrum.exe
      C:\Windows\system32\spectrum.exe
      1⤵
      • Executes dropped EXE
      • Checks SCSI registry key(s)
      PID:2712
    • C:\Windows\System32\OpenSSH\ssh-agent.exe
      C:\Windows\System32\OpenSSH\ssh-agent.exe
      1⤵
      • Executes dropped EXE
      PID:3260
    • C:\Windows\system32\TieringEngineService.exe
      C:\Windows\system32\TieringEngineService.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:1668
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc
      1⤵
        PID:1256
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4376
        • C:\Windows\system32\AgentService.exe
          C:\Windows\system32\AgentService.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2992
        • C:\Windows\System32\vds.exe
          C:\Windows\System32\vds.exe
          1⤵
          • Executes dropped EXE
          PID:1112
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1264
        • C:\Windows\system32\wbengine.exe
          "C:\Windows\system32\wbengine.exe"
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:768
        • C:\Windows\system32\wbem\WmiApSrv.exe
          C:\Windows\system32\wbem\WmiApSrv.exe
          1⤵
          • Executes dropped EXE
          PID:1576
        • C:\Windows\system32\SearchIndexer.exe
          C:\Windows\system32\SearchIndexer.exe /Embedding
          1⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3668
          • C:\Windows\system32\SearchProtocolHost.exe
            "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
            2⤵
            • Modifies data under HKEY_USERS
            PID:4036
          • C:\Windows\system32\SearchFilterHost.exe
            "C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 896
            2⤵
            • Modifies data under HKEY_USERS
            PID:2992

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe

          Filesize

          2.2MB

          MD5

          4ad943ac3e9d5fce8dab62296e6c6e69

          SHA1

          194b1f8ada9298f7c09531a1562f8dbe6f2b8f33

          SHA256

          eec0e97e95f284ca2eb4f56538a2a0535463ce9dd6a61bd450c3d75478136405

          SHA512

          3126e530e7fd8d108ff642bfe2ad5bead132c4d0d9f92946f2fd7ae5c700e658472822623ed74baa199f6c3b931c0313aa1dd5c463ac73f03dae13600fc88c3a

        • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

          Filesize

          1.4MB

          MD5

          3470a731fb35b9753fb53bed37f26e05

          SHA1

          73c5f205dcabdc40e51b5a5d1cf8af5a449167a4

          SHA256

          6647b508bbdd85d3443b29f2fba6ecddb437e82a820490883bdf5acc0a76b53f

          SHA512

          0dde38443b4ad205b69832d9f157e2a669a6e0ec1c1880ef0a65d1afb88200900bed14e467120f6f8255ea732c93af60e3bdd2d17151e55b4843d26278463d4a

        • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

          Filesize

          1.4MB

          MD5

          e77b356613d741bfd7369a4c9425c449

          SHA1

          240dae61ed6417d36ecb25cae1bc0bd1988e79c3

          SHA256

          4a0a46a1bd0c785b1e4e7184c325dfb6298022a7fcaeb0310104f42a5b104560

          SHA512

          0e529bb94375a5a6ce18fb0b548f986f8ba620a8c4a46276ff50bc8f01fba2f455e50fbff21ac13e3cb9ffcc3e9e181271886c0e88a7161165940653e2a57ecb

        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

          Filesize

          2.1MB

          MD5

          a13c0c9fa80b7f9070b70c1bcfd6f070

          SHA1

          92b39674a2591ab1f4f20cc967ea9f0069a67366

          SHA256

          aa3bbc334c2cb71e87eda153094cb04316938b330dcb7f33db6d82a6024fbdb2

          SHA512

          f644e2ca457f1fc54e72eb8c8d349001df53d67c537a3adc7fad0fc5b01df92f82d82a8fa4bf8f09debf7dde52678fd8b158e59a3ad552a87e1a736c705cb4ad

        • C:\Windows\SysWOW64\perfhost.exe

          Filesize

          1.2MB

          MD5

          697d6950365bc5580f7802164565420b

          SHA1

          29ca9da6d9c61552fc22e3272f406367a3f22bef

          SHA256

          1e8fb73d5e1da3622f979b60e7e7021f0ddadf7ae13353c331c21b670f8b90ea

          SHA512

          a8e63af23ccf1e68cfb9ed61916ff7af27780b50c9fad1efbc36b00b53f5cff9667f5c73c952a82f0b7e56becc4b26f87e55bae972748dd5f77678e4dde0aad5

        • C:\Windows\System32\AgentService.exe

          Filesize

          1.7MB

          MD5

          01cfa237bdb7bb142a2aa2231f3f4903

          SHA1

          67b29bff769eb8d86ae521e95dac85943be77761

          SHA256

          65b6a9995ceb55e7c6f71868c588237cc5953af076dede967dd423134a430a62

          SHA512

          254c4b67c337b6bfa2ebe8cde27e869a2be294ddd30b3b75daffb083725d45557d05357f7ba8c5228c2fb28d34db7732548e17ccce13374d15109213139268af

        • C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe

          Filesize

          1.3MB

          MD5

          d576ce99365b318ba8f9f7d40e3b9a37

          SHA1

          1ec578ad61bb6ff0fb0687bc2b9308c135758e07

          SHA256

          b23c3976bca6a7c26cfee4866a1e5276c248aa2225431f85dcfe42a06c71181c

          SHA512

          cf85f770def49a088eca461d6024d9e787ede46ade076ac2c659f3393aaa7e9155f37e06f8628c794690c0c51486018a56b6aa138b40bb12fbcda5bd40d73e8b

        • C:\Windows\System32\FXSSVC.exe

          Filesize

          1.2MB

          MD5

          7d926aa8c3b7440ea4d73aebd0249f17

          SHA1

          8b2f66c34e1e1b7739dee5843d197e5a7cae5cba

          SHA256

          50185bd3ed413a2504fbb15ca99cdd287239f8f4d478484aefa27e80ae6d538a

          SHA512

          e295938d57aa36ce97adbe6c58718a97bbd715e082fc594d100087ea5773fee5bce59fa8434bc930e9c6cf0f23021a25638d3ad0121a35c3f3ba66ecf7e1840f

        • C:\Windows\System32\Locator.exe

          Filesize

          1.2MB

          MD5

          5f2fc43a91d85d84e0f913965ce8580a

          SHA1

          35904bd3c63778fbc20d8a50c01681bbb4091049

          SHA256

          4eeb846c20f71caa62850adc87c423c6b797e85b632535888d2bbc01671dd500

          SHA512

          216f69a71477acfee0c78fb432282097405080808f0050434ce7b3fd8804174da2cfcf90e179b3910f63e8e35672fd8221ff7b787c68fdedf4e3cce05f1788e9

        • C:\Windows\System32\OpenSSH\ssh-agent.exe

          Filesize

          1.5MB

          MD5

          1db125a5ab122eb0e5f1da75dd39fdd8

          SHA1

          3fecf26cd865cc217472ca45fc9313094dc55c1d

          SHA256

          d9579ba52e4d2c03aec09827404cc6c9126afde93b55453d2b18cbfd7136b3dc

          SHA512

          3023dcf610397ea6383f2f5c2be58b818abfced3c8a04374c530034efe6f770687b48057ab2da8a844ec1870cb08f1a35d98ac2101659ccfad4953fe79dde9f5

        • C:\Windows\System32\PerceptionSimulation\PerceptionSimulationService.exe

          Filesize

          1.3MB

          MD5

          e5bdc59ad00884dcbada02c74cbfe917

          SHA1

          27b495e62daa28319fb7d0b5e20cec91a25d367c

          SHA256

          7de1b2934ad62c7821fafa573ea3f6aa1f55604d8c058243653377fef6b68266

          SHA512

          704e0401416e3a5e3904841c9d34f6d9549e92d1561652d16bc0a855ba90dc3bb7a5551c2800946608664cbbebd2e0e514d7f733b6389ee1a41d4c2348937e3d

        • C:\Windows\System32\SearchIndexer.exe

          Filesize

          1.4MB

          MD5

          cdbc91d04304392817da17318f061abe

          SHA1

          e9c72aeb5d1fb3c804619e6da26942e900942282

          SHA256

          05da2a5557b42c0030fe93d2d91f01c249bd7760cdf081c5b338e8d2fd310f1f

          SHA512

          aac34e691c91c93075dcf06142cddc460e760c741f83ee8911ac85823a1a075953c9a4dd61416c4132b4c93182b425821155f4f8541630d47d054287245e8576

        • C:\Windows\System32\SensorDataService.exe

          Filesize

          1.8MB

          MD5

          705cf6c3ebc3bcaff2008cbc0e574405

          SHA1

          281eb2cdb1bb9016d537f12c4b42c5cebd5d8f09

          SHA256

          ea93f00235693544a4b98d9af8d9a33e04b29e4a025ead122920f05d8cf66209

          SHA512

          66b11463df011ffc33fbda5eb23af5f4cf984a58ecbdef06da981f86f7c81964d79831d3e43d73e9099b549610ecf5403936c24765a7fdce3df7500ff234b4f8

        • C:\Windows\System32\Spectrum.exe

          Filesize

          1.4MB

          MD5

          d0b4e366633a5ce75911f46c1d6a38bc

          SHA1

          851a0a8ec5a7753290fd74c7333d0179ffc479f5

          SHA256

          155c123be923269175574525b2fc83b416ae127b6eb36159aa49f9b39ecebeda

          SHA512

          4c4564374a6aab0dba74a09d2aa120eeec3b371cfd6f44c511950d79cf2a51bfa2af21719423a24855093abd37df277caed6e58f60ad21430167acbee2afe83b

        • C:\Windows\System32\TieringEngineService.exe

          Filesize

          1.5MB

          MD5

          81a684a03e3a7dac825d8aeef2a634ba

          SHA1

          b5cfb65b09843ddd97dd788304a5e349c3fb69d8

          SHA256

          0eb7cf4e086973314d973a11a3e675126cd24ddcd3593c590dbc9ec5fb6e1e01

          SHA512

          762c20cd08fdf8f334a6e6a0ac175c3c7b325b802b3e831a10120012354c0b4afe2599dd0c3006851f66623246f5178f77172ac800765bd6a30e40693cb76270

        • C:\Windows\System32\VSSVC.exe

          Filesize

          2.0MB

          MD5

          2d68f2f7ddc831cd5fabaa39d9cc598c

          SHA1

          18f569ece76800ea2b6b6d417949508cdccd31fe

          SHA256

          c06888687c3702b6f19e86e5608bd43cd0d1b7dd4ab00865086a597c78716996

          SHA512

          177ba5957212142cf7be4d6362fc4cb7d3d04e062399a8f5e34f395a21f34b82a9caffd4bf06f9a65374b1ad7475b3732a425e098b8d855450f78bb31fa168c7

        • C:\Windows\System32\alg.exe

          Filesize

          1.3MB

          MD5

          f715eaa52357cc022dc73ae97204d73b

          SHA1

          7ea7aaa471aa724124fc63a8f01b1126828b444e

          SHA256

          4213f0516ccb3647f4d8f8c7f0b4d154ec6879d14923e8771f96bddcc9822129

          SHA512

          aaebfa779499704c7e87a2f9084b23956b777ac27cbea5c8d8bfce53b19c7a2098642bd1c85780c3c72a46c6cc82e441eddf0c8b5d360c4c0ccc9c8f2276d435

        • C:\Windows\System32\msdtc.exe

          Filesize

          1.3MB

          MD5

          c404c6672431a46fa173c66ffa85c64c

          SHA1

          131a69511f4885de1a01fffcfb215dfdc217ab8f

          SHA256

          6343d09d060ad20956b4d25f410fe13a2b34aae3012b7517e7f21ce767b2d899

          SHA512

          695aa0ca6dc14082973fd44a38a8e7e3d6bd5bc8ddf0ab7125a82c98eca52bfac96a2f1cf2c7edc5e5ade035fdcb95eebc8cff1fc484c79cba6e89a9c19f8d2a

        • C:\Windows\System32\snmptrap.exe

          Filesize

          1.2MB

          MD5

          74efe9d77a22d0172861e92ad3c8d572

          SHA1

          f754f828064ebe1f5849c280180834fc75b3274e

          SHA256

          b0611bfc3186405fbdd4472d0de614455eee749b027a1aefea3f6cf435946883

          SHA512

          d6eeb1b905ea1cd595bba3d32891d3963d07e8db1e47a33e98d4d1de56c656807df0e912c0ed82f9cc97fbd7e55d25ada418434d61f9ee58b8b13f3ce969ff7c

        • C:\Windows\System32\vds.exe

          Filesize

          1.3MB

          MD5

          06dd43d38fef7e8d6258d7bd16805043

          SHA1

          5a1a4bc0521a85345a7fb70abfb64089c218b748

          SHA256

          451411db3244041a7b9034327f21929f8cb38dcdea7d532a1c27bd5522f71e97

          SHA512

          142da5ec97385502938d9643e4475007cab81f7336cd1178b27c65372590abc962950594b6e7c133692aff5ee338e4664a8671b44c5cc05ceb652d9f835f1487

        • C:\Windows\System32\wbem\WmiApSrv.exe

          Filesize

          1.4MB

          MD5

          c620f9a4ff37db97e828b8767611dcff

          SHA1

          a8518c31502c9ab30e1dcbcea0848bbffbdd7127

          SHA256

          16d0129e61fb1a6805c22015aed8ab59858cd0262ca0711349b066aa0cbb25ae

          SHA512

          97264016a3a7f59816e487ce48de84ea76d09ae793d214c2367ce279bfa5b23c9e779991e4b787bb249a47c03414959b817a80590553d2909856e56d38c67daa

        • C:\Windows\System32\wbengine.exe

          Filesize

          2.1MB

          MD5

          4ce9bab8813a35248357b6eea19154a5

          SHA1

          63416adba75eac284e5f1ba1b63110b598e64723

          SHA256

          f2a99417fd2e3a1ab1c7674654b9d49adf21d404117e1afee0e0378b2d540bab

          SHA512

          1fcee036ec4c7696fc79c974d15afb8d73c1ceb9b155588d14ec13f8ad0715d30b92fec2286d5b19945d0e982f4a31e547abef5ef879ecbc7698a6050b46f071

        • memory/768-252-0x0000000140000000-0x0000000140216000-memory.dmp

          Filesize

          2.1MB

        • memory/768-394-0x0000000140000000-0x0000000140216000-memory.dmp

          Filesize

          2.1MB

        • memory/1088-70-0x0000000000890000-0x00000000008F0000-memory.dmp

          Filesize

          384KB

        • memory/1088-69-0x0000000140000000-0x0000000140245000-memory.dmp

          Filesize

          2.3MB

        • memory/1088-63-0x0000000000890000-0x00000000008F0000-memory.dmp

          Filesize

          384KB

        • memory/1088-162-0x0000000140000000-0x0000000140245000-memory.dmp

          Filesize

          2.3MB

        • memory/1112-345-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1112-224-0x0000000140000000-0x0000000140147000-memory.dmp

          Filesize

          1.3MB

        • memory/1264-361-0x0000000140000000-0x00000001401FC000-memory.dmp

          Filesize

          2.0MB

        • memory/1264-236-0x0000000140000000-0x00000001401FC000-memory.dmp

          Filesize

          2.0MB

        • memory/1300-0-0x0000000000400000-0x00000000005E8000-memory.dmp

          Filesize

          1.9MB

        • memory/1300-35-0x0000000000400000-0x00000000005E8000-memory.dmp

          Filesize

          1.9MB

        • memory/1300-7-0x0000000002420000-0x0000000002487000-memory.dmp

          Filesize

          412KB

        • memory/1300-6-0x0000000002420000-0x0000000002487000-memory.dmp

          Filesize

          412KB

        • memory/1300-1-0x0000000002420000-0x0000000002487000-memory.dmp

          Filesize

          412KB

        • memory/1372-54-0x0000000000810000-0x0000000000870000-memory.dmp

          Filesize

          384KB

        • memory/1372-149-0x0000000140000000-0x0000000140237000-memory.dmp

          Filesize

          2.2MB

        • memory/1372-52-0x0000000140000000-0x0000000140237000-memory.dmp

          Filesize

          2.2MB

        • memory/1372-59-0x0000000000810000-0x0000000000870000-memory.dmp

          Filesize

          384KB

        • memory/1576-404-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1576-263-0x0000000140000000-0x0000000140205000-memory.dmp

          Filesize

          2.0MB

        • memory/1668-331-0x0000000140000000-0x0000000140221000-memory.dmp

          Filesize

          2.1MB

        • memory/1668-198-0x0000000140000000-0x0000000140221000-memory.dmp

          Filesize

          2.1MB

        • memory/2292-251-0x0000000140000000-0x00000001401D4000-memory.dmp

          Filesize

          1.8MB

        • memory/2292-146-0x0000000140000000-0x00000001401D4000-memory.dmp

          Filesize

          1.8MB

        • memory/2316-49-0x0000000140000000-0x0000000140135000-memory.dmp

          Filesize

          1.2MB

        • memory/2316-38-0x0000000140000000-0x0000000140135000-memory.dmp

          Filesize

          1.2MB

        • memory/2316-39-0x0000000000E80000-0x0000000000EE0000-memory.dmp

          Filesize

          384KB

        • memory/2316-45-0x0000000000E80000-0x0000000000EE0000-memory.dmp

          Filesize

          384KB

        • memory/2316-47-0x0000000000E80000-0x0000000000EE0000-memory.dmp

          Filesize

          384KB

        • memory/2428-163-0x0000000140000000-0x00000001401D5000-memory.dmp

          Filesize

          1.8MB

        • memory/2428-275-0x0000000140000000-0x00000001401D5000-memory.dmp

          Filesize

          1.8MB

        • memory/2452-74-0x0000000140000000-0x00000001401E9000-memory.dmp

          Filesize

          1.9MB

        • memory/2452-12-0x0000000140000000-0x00000001401E9000-memory.dmp

          Filesize

          1.9MB

        • memory/2452-13-0x00000000007A0000-0x0000000000800000-memory.dmp

          Filesize

          384KB

        • memory/2452-21-0x00000000007A0000-0x0000000000800000-memory.dmp

          Filesize

          384KB

        • memory/2712-328-0x0000000140000000-0x0000000140169000-memory.dmp

          Filesize

          1.4MB

        • memory/2712-174-0x0000000140000000-0x0000000140169000-memory.dmp

          Filesize

          1.4MB

        • memory/2912-125-0x0000000140000000-0x00000001401EA000-memory.dmp

          Filesize

          1.9MB

        • memory/2912-235-0x0000000140000000-0x00000001401EA000-memory.dmp

          Filesize

          1.9MB

        • memory/2992-209-0x0000000140000000-0x00000001401C0000-memory.dmp

          Filesize

          1.8MB

        • memory/2992-220-0x0000000140000000-0x00000001401C0000-memory.dmp

          Filesize

          1.8MB

        • memory/3260-330-0x0000000140000000-0x0000000140241000-memory.dmp

          Filesize

          2.3MB

        • memory/3260-186-0x0000000140000000-0x0000000140241000-memory.dmp

          Filesize

          2.3MB

        • memory/3668-284-0x0000000140000000-0x0000000140179000-memory.dmp

          Filesize

          1.5MB

        • memory/3668-414-0x0000000140000000-0x0000000140179000-memory.dmp

          Filesize

          1.5MB

        • memory/3684-197-0x0000000140000000-0x00000001401F8000-memory.dmp

          Filesize

          2.0MB

        • memory/3684-93-0x0000000000D50000-0x0000000000DB0000-memory.dmp

          Filesize

          384KB

        • memory/3684-91-0x0000000140000000-0x00000001401F8000-memory.dmp

          Filesize

          2.0MB

        • memory/3904-239-0x0000000140000000-0x00000001401D7000-memory.dmp

          Filesize

          1.8MB

        • memory/3904-150-0x0000000140000000-0x00000001401D7000-memory.dmp

          Filesize

          1.8MB

        • memory/4232-240-0x0000000000400000-0x00000000005D6000-memory.dmp

          Filesize

          1.8MB

        • memory/4232-128-0x0000000000400000-0x00000000005D6000-memory.dmp

          Filesize

          1.8MB

        • memory/4260-34-0x0000000140000000-0x00000001401E8000-memory.dmp

          Filesize

          1.9MB

        • memory/4260-32-0x00000000006B0000-0x0000000000710000-memory.dmp

          Filesize

          384KB

        • memory/4260-26-0x00000000006B0000-0x0000000000710000-memory.dmp

          Filesize

          384KB

        • memory/4260-90-0x0000000140000000-0x00000001401E8000-memory.dmp

          Filesize

          1.9MB

        • memory/4420-223-0x0000000140000000-0x000000014020E000-memory.dmp

          Filesize

          2.1MB

        • memory/4420-109-0x0000000140000000-0x000000014020E000-memory.dmp

          Filesize

          2.1MB

        • memory/4568-87-0x0000000140000000-0x0000000140209000-memory.dmp

          Filesize

          2.0MB

        • memory/4568-85-0x00000000016B0000-0x0000000001710000-memory.dmp

          Filesize

          384KB

        • memory/4568-75-0x00000000016B0000-0x0000000001710000-memory.dmp

          Filesize

          384KB

        • memory/4568-83-0x0000000140000000-0x0000000140209000-memory.dmp

          Filesize

          2.0MB

        • memory/4568-81-0x00000000016B0000-0x0000000001710000-memory.dmp

          Filesize

          384KB