Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    211s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 04:38

General

  • Target

    https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/WolframAV.zip

Score
7/10
upx

Malware Config

Signatures

  • Drops startup file 4 IoCs
  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/WolframAV.zip
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7549758,0x7fef7549768,0x7fef7549778
      2⤵
        PID:2448
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:2
        2⤵
          PID:2728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1428 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:8
          2⤵
            PID:2812
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:8
            2⤵
              PID:2556
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2164 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:1
              2⤵
                PID:1692
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2172 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:1
                2⤵
                  PID:1676
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1712 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:2
                  2⤵
                    PID:2172
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3432 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:8
                    2⤵
                      PID:924
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3456 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:1
                      2⤵
                        PID:2308
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=2640 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:1
                        2⤵
                          PID:1580
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:8
                          2⤵
                            PID:1476
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1352,i,12369984594798221057,14105742865258344071,131072 /prefetch:8
                            2⤵
                              PID:1808
                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                            1⤵
                              PID:1144
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0xc0
                              1⤵
                                PID:784
                              • C:\Program Files\7-Zip\7zG.exe
                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\WolframAV\" -spe -an -ai#7zMap31909:80:7zEvent5727
                                1⤵
                                  PID:696
                                • C:\Users\Admin\Downloads\WolframAV\[email protected]
                                  "C:\Users\Admin\Downloads\WolframAV\[email protected]"
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2664
                                  • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe
                                    "C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:940
                                • C:\Users\Admin\Downloads\WolframAV\[email protected]
                                  "C:\Users\Admin\Downloads\WolframAV\[email protected]"
                                  1⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2860
                                  • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe
                                    "C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\Wolfram Antivirus.exe"
                                    2⤵
                                    • Drops startup file
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Modifies Internet Explorer settings
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of SendNotifyMessage
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1688
                                    • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                      "C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"
                                      3⤵
                                      • Drops startup file
                                      • Executes dropped EXE
                                      PID:2052
                                      • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                        a execC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:840
                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          PID:2440
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                            a execC:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:2408
                                            • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                              "C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              PID:1108
                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                            a execC:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:1536
                                            • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                              "C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe"
                                              7⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              PID:1156
                                              • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe
                                                a execC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                                8⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                PID:804
                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe
                                                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\csrss.exe"
                                                  9⤵
                                                  • Executes dropped EXE
                                                  PID:2672

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                  Filesize

                                  342B

                                  MD5

                                  a47d92b74fd08fa66b3bc55d3c6927ea

                                  SHA1

                                  13074b6a4b70be753303543d331de77cd580f61b

                                  SHA256

                                  71f27a1e03fd210446efd4c845d354de7c55c308c0531def81e9241b3b2d83a4

                                  SHA512

                                  a4fc5ac1c30443b1ea4d2391f4407271449291cd5b16bf8367143c6d50f67343f808f034be64484eb8b61a813497d1fab2925130f542e4a02ac12579266497ba

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  aefd77f47fb84fae5ea194496b44c67a

                                  SHA1

                                  dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                  SHA256

                                  4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                  SHA512

                                  b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                  Filesize

                                  264KB

                                  MD5

                                  f50f89a0a91564d0b8a211f8921aa7de

                                  SHA1

                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                  SHA256

                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                  SHA512

                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  2f464728788f025f1779836089af476f

                                  SHA1

                                  f9aefd63c785893dff4aaf4d5440e3302d2adbf5

                                  SHA256

                                  36776fb0144b8ac0a7c35e4a2aa1a1ce668b9b1211935117626bc31380d56a72

                                  SHA512

                                  b5b44ed728726b037616411f2d4ebc15b63424f12088216d1e2b6d3ca502e52b9581ca016c91c5a858968d1c2993153755b87eef24ca488af1d17fc66263ca6c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  a4886f18cfa413e49ddbdaf9225d7aca

                                  SHA1

                                  a3187afaffe2f2a1669632e5bb9dac40053b9a42

                                  SHA256

                                  4cd37c7f02c823cbe6c0802d72fef6dfec18de14a59b7f4fad5b6e8ce8c63f3a

                                  SHA512

                                  39ea60fb94b2db33b45618f85080ff2dd1dac7ff8df1c5edf9c75fd7f4700d6fc7e3870a7e056606a12e4aa6297ec10885fd6d286854261d765a5a490437289e

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                  Filesize

                                  16B

                                  MD5

                                  18e723571b00fb1694a3bad6c78e4054

                                  SHA1

                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                  SHA256

                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                  SHA512

                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  154KB

                                  MD5

                                  75e0a85c5b6ae58b37ef99fa94c36f05

                                  SHA1

                                  f904e18721f38693e9ec8839f3aeb356c5574133

                                  SHA256

                                  a03e9d2fd6b69e7d134e331d84b1c01cbe12c3c197a3f14dc340a81604e5d26c

                                  SHA512

                                  d44d3e81c3fc129e4bd295f84cf01ef0356bdde3d2c19dfdff11b8d272d208371bd4d1cc5931d4e7fa2b502f759670b72349b3de639e20b98aa0414156f79975

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c575cd0c-3448-475a-b565-38c5130c1533.tmp

                                  Filesize

                                  154KB

                                  MD5

                                  a4897c418fe9fa4a4e88bb3d0901db17

                                  SHA1

                                  131acf0d314fe02c86c67a31e578e6e857a352c3

                                  SHA256

                                  bc48d466f4400060b509dd00eb8482055775312f7e39745f0606465691614fa0

                                  SHA512

                                  e7ed501ce6498ff9b5b49bc6eb031e6639b6a838cd5229bbfffe31ea029e66d6286b28992fa40dd001bd95a9c58222fd6ce294ec8238beb0fa0e74807c4422ca

                                • C:\Users\Admin\AppData\Local\Temp\Cab6106.tmp

                                  Filesize

                                  70KB

                                  MD5

                                  49aebf8cbd62d92ac215b2923fb1b9f5

                                  SHA1

                                  1723be06719828dda65ad804298d0431f6aff976

                                  SHA256

                                  b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                  SHA512

                                  bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                • C:\Users\Admin\AppData\Local\Temp\Tar6119.tmp

                                  Filesize

                                  181KB

                                  MD5

                                  4ea6026cf93ec6338144661bf1202cd1

                                  SHA1

                                  a1dec9044f750ad887935a01430bf49322fbdcb7

                                  SHA256

                                  8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                  SHA512

                                  6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\wf.conf

                                  Filesize

                                  300B

                                  MD5

                                  fd49a0bbed6577af66913c9802785e82

                                  SHA1

                                  7b2a94844803b0cef44669d163f3c19e7672b6db

                                  SHA256

                                  ecc501bf98587d0b822e13cd983776e66a97c2979508e3e7226a71b29984e67e

                                  SHA512

                                  b4e6b6a2d7d6813019286fee8e931755fb80b9d67a7bcbea554f65bb28d2d496d8ee42464ca7a98fa73d319e94378fc02d138ad12a8fbb7d331d8a844bccf609

                                • C:\Users\Admin\AppData\Roaming\Wolfram Antivirus\wf.conf

                                  Filesize

                                  901B

                                  MD5

                                  2dfe6cbc2978ef90bfe029d982cd293f

                                  SHA1

                                  42f022d4806a9aaa1b3cc79375b409eaa8c6813c

                                  SHA256

                                  e55b032639e404cc68b68d902a69bd2862e8cb33349716819e067740d5f25fa4

                                  SHA512

                                  d954ccb2a0ed82837af385f992cf26e6bd51b8e9e167b0b02e2cc5aaf14b942c250bf098944201e574b80a6685fe36341146a4d8fefeee1f4b28423c6970c2f8

                                • C:\Users\Admin\Downloads\WolframAV.zip

                                  Filesize

                                  2.4MB

                                  MD5

                                  5a58f30a316ba75a1ebed54621dd2635

                                  SHA1

                                  19b5abfad96aaa7541ead444da14bf3a67ee2a14

                                  SHA256

                                  1b07719b899418d446ec78c9a7d6970d3b61e4a0987838112fdc2460b6c134fb

                                  SHA512

                                  f88910fb6387962b189345f310b2ebc9e3898058301b0ae2cee8769138d7b50d1729e63e9f05e1eece30afe1ba7a91a1ef8d7831370e9e8378da17fbc5b5d32c

                                • C:\Users\Admin\Downloads\WolframAV\[email protected]

                                  Filesize

                                  2.6MB

                                  MD5

                                  ba371189ab70090c298d92d502e130e5

                                  SHA1

                                  28b6c0172da07a81ab58f5e71654b047914f3f89

                                  SHA256

                                  b9afb9c819302396858d2966371d904d9dd8661da835fd0ccc74758aae84e519

                                  SHA512

                                  a8d8b26afe4b1846b96d264a4d97d364a77adc698a4c14b26014742f59e611defb54f90a4c185004ac05d02e3e51de3b35e48853b6ef5c205b55d112f5260ace

                                • \Users\Admin\AppData\Roaming\Wolfram Antivirus\csrss.exe

                                  Filesize

                                  222KB

                                  MD5

                                  08bd665ba70ed5c9df9ca94b52f283ac

                                  SHA1

                                  dc7fd2f628a388943677328fa62c430df12bfd4a

                                  SHA256

                                  e405a76f5599eff5049a7360684ea87e69e67794b95370d17a35e31cefdaec84

                                  SHA512

                                  1394475d6a92e090dae49a966ce48f20f928ea953b1c3f22e3613bd11dfd3e43181cb5f429b5b370d8b45909857e030108d522b470915a03f3cbdbf4cbbbb53c

                                • memory/804-488-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/840-336-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/940-331-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/940-330-0x0000000002A90000-0x0000000002C05000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/1108-351-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/1156-499-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/1536-481-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/1688-468-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-383-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-498-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-490-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-356-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-460-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-439-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-300-0x0000000002920000-0x0000000002A95000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/1688-406-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-414-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-421-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/1688-429-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/2052-358-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/2408-343-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/2440-360-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/2440-493-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/2664-282-0x0000000002950000-0x0000000002AC5000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/2664-294-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/2664-283-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB

                                • memory/2672-491-0x0000000000400000-0x000000000043A000-memory.dmp

                                  Filesize

                                  232KB

                                • memory/2860-295-0x00000000029B0000-0x0000000002B25000-memory.dmp

                                  Filesize

                                  1.5MB

                                • memory/2860-298-0x0000000000400000-0x0000000000CE9000-memory.dmp

                                  Filesize

                                  8.9MB