Analysis

  • max time kernel
    136s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 06:34

General

  • Target

    Shoofa.ps1

  • Size

    52KB

  • MD5

    bec5624e576379638737b54edd121409

  • SHA1

    8bfc71d5fc5bec930fad4dc6e55dadddffc48fdc

  • SHA256

    599c9c4648fa3d92c019dc99419cd6e4129d5be92031269d042fca0f16c6ff80

  • SHA512

    0ba24ae0bb04460da8459df64b1a91e4bba1fad98028766215eb28e5512a108b8240b6e94f20fabfdeececad40af929c7090e24ac529056901a689f7a1b2bd5f

  • SSDEEP

    1536:pi3FuKXDbqUDEMSWwH141TJj1Z4VVUPXxLXIxnm9:OFjzbqUmWr1zZ4QZDIxnm9

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 15 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 28 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Shoofa.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3688
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4948
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:380
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2220
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3032
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2260
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of SendNotifyMessage
    PID:1040
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4296
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3844
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:3988
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2328
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1164
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:3440
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5028
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1472
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:3408
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2208
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:3796
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:756
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3000
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:408
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1496
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2756
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4832
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:4828
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4824
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1048
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    PID:3108
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3356
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4708
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:1652
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4904
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1936
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:1164
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3632
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4668
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Modifies registry class
    PID:2160
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3556
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1528
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4176
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2568
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Checks SCSI registry key(s)
    PID:4540
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4292
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    471B

    MD5

    b542bd8a32623d5cf1c907db568d46a8

    SHA1

    49fe96f250aa5f2696a91daf18801418983095e9

    SHA256

    638ddab398a968ff6098f7ec7b84fb5c6c338b5142185656f987c8b7b7d21146

    SHA512

    3a7942e6fb9f9d12856bb0cf4356ca948d5fc3aa41a2d7e94859889f5654fb6fc01194b010b375f3d6f8a1ef6a1e91b6f03cddf7baea26c3f609b0dad069af81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    412B

    MD5

    fbcfc2572b49735670b91dc6133a8254

    SHA1

    18a955a78a82ce64836284f4e42e59eef86fcbe4

    SHA256

    4645926f3c6e5013c4279d27c98732a41eacc0bc45adc0e7022741f8b77a5056

    SHA512

    3ab06290b4dafbbf0c29ab26aac1173d8c2bd2a9465506ac0aac96577b808826b8c9d3c52df34126089112f1ce2314ae3bfbfa27c04d60b76718d13dc92276a2

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

    Filesize

    2KB

    MD5

    d49b9abfe98c8b34a278c64e6707517a

    SHA1

    c23036aaac38ad95c6d03795833295b92d6e5f6a

    SHA256

    604162a3793cdf57d9266c8c12532e79add4527307f3737d561d27d73663b6ae

    SHA512

    9234920e24c8436f30f4465a4bddf3eaf75b6f65733236fadc70cc279a9a8edbcd0c57a84c91baaf5de1c078b7444e508dd73fdeb0c6adbe08dad798d82c349b

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133758669300226869.txt

    Filesize

    75KB

    MD5

    03a36f848799d1597404ffa2a16e09c6

    SHA1

    7add84280b80d8c400a6ac854726b8592a731fe2

    SHA256

    f993b0596083d0714e5924a869a4eb4f954e5b75d5927498e6b42e028c251f3f

    SHA512

    9b2e3d9031017c6c53ae26e36f2eea05b011947fcf3db3f3cd773c4875747347dc7c0324896320874f682264edcc9cadabd0fe92e03204effd2e6d4a2cb0c020

  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80AM9X7C\microsoft.windows[1].xml

    Filesize

    96B

    MD5

    c839a1973d3feaead377ea2dad131fe6

    SHA1

    252758616792b9b2f10bc460c84b1c1eba75ea04

    SHA256

    efecd8d483398a6cb569af17e66cb0ba1ca4b9c65f4a697fc7642cc007fc3ccd

    SHA512

    fee6ca3d2ae272b0f1f291e98830215f2ac138747651be78325ab7c1ba3f01f72cbfed4c886853caba45f16c59c78543a87a5f872b2c1f85bffa3a4e11bf50e1

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fw4lgwba.i3l.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/408-777-0x000002335C680000-0x000002335C6A0000-memory.dmp

    Filesize

    128KB

  • memory/408-772-0x0000022B5A520000-0x0000022B5A620000-memory.dmp

    Filesize

    1024KB

  • memory/408-773-0x0000022B5A520000-0x0000022B5A620000-memory.dmp

    Filesize

    1024KB

  • memory/408-799-0x000002335CA50000-0x000002335CA70000-memory.dmp

    Filesize

    128KB

  • memory/408-786-0x000002335C640000-0x000002335C660000-memory.dmp

    Filesize

    128KB

  • memory/756-770-0x0000000004850000-0x0000000004851000-memory.dmp

    Filesize

    4KB

  • memory/1040-172-0x00000000045A0000-0x00000000045A1000-memory.dmp

    Filesize

    4KB

  • memory/1048-1100-0x0000027C838C0000-0x0000027C838E0000-memory.dmp

    Filesize

    128KB

  • memory/1048-1099-0x0000027C832A0000-0x0000027C832C0000-memory.dmp

    Filesize

    128KB

  • memory/1048-1069-0x0000027C832E0000-0x0000027C83300000-memory.dmp

    Filesize

    128KB

  • memory/1164-1513-0x0000000004480000-0x0000000004481000-memory.dmp

    Filesize

    4KB

  • memory/1164-336-0x0000023174E20000-0x0000023174E40000-memory.dmp

    Filesize

    128KB

  • memory/1164-350-0x0000023175230000-0x0000023175250000-memory.dmp

    Filesize

    128KB

  • memory/1164-329-0x0000023174E60000-0x0000023174E80000-memory.dmp

    Filesize

    128KB

  • memory/1472-480-0x000001CA22A70000-0x000001CA22A90000-memory.dmp

    Filesize

    128KB

  • memory/1472-475-0x000001C220A00000-0x000001C220B00000-memory.dmp

    Filesize

    1024KB

  • memory/1472-511-0x000001CA22A30000-0x000001CA22A50000-memory.dmp

    Filesize

    128KB

  • memory/1472-512-0x000001CA22E40000-0x000001CA22E60000-memory.dmp

    Filesize

    128KB

  • memory/1472-477-0x000001C220A00000-0x000001C220B00000-memory.dmp

    Filesize

    1024KB

  • memory/1472-476-0x000001C220A00000-0x000001C220B00000-memory.dmp

    Filesize

    1024KB

  • memory/1496-915-0x0000000004A80000-0x0000000004A81000-memory.dmp

    Filesize

    4KB

  • memory/1652-1361-0x0000000004980000-0x0000000004981000-memory.dmp

    Filesize

    4KB

  • memory/1936-1399-0x000001A5E0240000-0x000001A5E0260000-memory.dmp

    Filesize

    128KB

  • memory/1936-1398-0x000001A5DFE30000-0x000001A5DFE50000-memory.dmp

    Filesize

    128KB

  • memory/1936-1368-0x000001A5DFE70000-0x000001A5DFE90000-memory.dmp

    Filesize

    128KB

  • memory/2220-29-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/2260-56-0x00000289B7CD0000-0x00000289B7CF0000-memory.dmp

    Filesize

    128KB

  • memory/2260-44-0x00000289B75C0000-0x00000289B75E0000-memory.dmp

    Filesize

    128KB

  • memory/2260-30-0x00000289B6900000-0x00000289B6A00000-memory.dmp

    Filesize

    1024KB

  • memory/2260-31-0x00000289B6900000-0x00000289B6A00000-memory.dmp

    Filesize

    1024KB

  • memory/2260-35-0x00000289B7900000-0x00000289B7920000-memory.dmp

    Filesize

    128KB

  • memory/3108-1214-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/3408-621-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

    Filesize

    4KB

  • memory/3440-474-0x0000000004030000-0x0000000004031000-memory.dmp

    Filesize

    4KB

  • memory/3688-12-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-14-0x0000018D4D980000-0x0000018D4D9A4000-memory.dmp

    Filesize

    144KB

  • memory/3688-15-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-16-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-18-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-19-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-13-0x0000018D4D980000-0x0000018D4D9AA000-memory.dmp

    Filesize

    168KB

  • memory/3688-11-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3688-0-0x00007FFA7BF23000-0x00007FFA7BF25000-memory.dmp

    Filesize

    8KB

  • memory/3688-1-0x0000018D332F0000-0x0000018D33312000-memory.dmp

    Filesize

    136KB

  • memory/3688-20-0x00007FFA7BF20000-0x00007FFA7C9E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3796-624-0x000002E6D0700000-0x000002E6D0800000-memory.dmp

    Filesize

    1024KB

  • memory/3796-628-0x000002E6D17E0000-0x000002E6D1800000-memory.dmp

    Filesize

    128KB

  • memory/3796-623-0x000002E6D0700000-0x000002E6D0800000-memory.dmp

    Filesize

    1024KB

  • memory/3796-652-0x000002E6D1DB0000-0x000002E6D1DD0000-memory.dmp

    Filesize

    128KB

  • memory/3796-641-0x000002E6D17A0000-0x000002E6D17C0000-memory.dmp

    Filesize

    128KB

  • memory/3796-625-0x000002E6D0700000-0x000002E6D0800000-memory.dmp

    Filesize

    1024KB

  • memory/3844-174-0x000001D0BCF00000-0x000001D0BD000000-memory.dmp

    Filesize

    1024KB

  • memory/3844-175-0x000001D0BCF00000-0x000001D0BD000000-memory.dmp

    Filesize

    1024KB

  • memory/3844-189-0x000001D0BE010000-0x000001D0BE030000-memory.dmp

    Filesize

    128KB

  • memory/3844-179-0x000001D0BE050000-0x000001D0BE070000-memory.dmp

    Filesize

    128KB

  • memory/3844-208-0x000001D0BE420000-0x000001D0BE440000-memory.dmp

    Filesize

    128KB

  • memory/3988-321-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/4668-1515-0x00000264B0700000-0x00000264B0800000-memory.dmp

    Filesize

    1024KB

  • memory/4668-1516-0x00000264B0700000-0x00000264B0800000-memory.dmp

    Filesize

    1024KB

  • memory/4708-1242-0x00000260C0050000-0x00000260C0070000-memory.dmp

    Filesize

    128KB

  • memory/4708-1220-0x00000260BFC80000-0x00000260BFCA0000-memory.dmp

    Filesize

    128KB

  • memory/4708-1230-0x00000260BFC40000-0x00000260BFC60000-memory.dmp

    Filesize

    128KB

  • memory/4708-1216-0x00000260BEB20000-0x00000260BEC20000-memory.dmp

    Filesize

    1024KB

  • memory/4708-1215-0x00000260BEB20000-0x00000260BEC20000-memory.dmp

    Filesize

    1024KB

  • memory/4708-1217-0x00000260BEB20000-0x00000260BEC20000-memory.dmp

    Filesize

    1024KB

  • memory/4828-1061-0x0000000004180000-0x0000000004181000-memory.dmp

    Filesize

    4KB

  • memory/4832-953-0x000001F6F9D80000-0x000001F6F9DA0000-memory.dmp

    Filesize

    128KB

  • memory/4832-954-0x000001F6FA190000-0x000001F6FA1B0000-memory.dmp

    Filesize

    128KB

  • memory/4832-917-0x000001F6F8D00000-0x000001F6F8E00000-memory.dmp

    Filesize

    1024KB

  • memory/4832-922-0x000001F6F9DC0000-0x000001F6F9DE0000-memory.dmp

    Filesize

    128KB

  • memory/4832-918-0x000001F6F8D00000-0x000001F6F8E00000-memory.dmp

    Filesize

    1024KB

  • memory/4832-919-0x000001F6F8D00000-0x000001F6F8E00000-memory.dmp

    Filesize

    1024KB