Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    71s
  • max time network
    161s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    20/12/2024, 13:39

General

  • Target

    SpyNote v7.0‌‌.zip

  • Size

    20.6MB

  • MD5

    63abbd78db324c7abc21dc92aee41b00

  • SHA1

    b9bc0a052b5f6d3ec339b824c67b9e9de97fc6e9

  • SHA256

    7c9e308edff467528d167d0e4dfb7e17e61ba96ad413041b66c243869ef18721

  • SHA512

    8e9b185df25be1f2202fe083833dc171aa6c5ec2a54203e0c7d13c87588bb5dad13ba783f23d9097a654a22a59a20ddc9683ef58731a2c4d05b41aaacc8d0496

  • SSDEEP

    393216:iLYBnW9gu2LXzeDpkJU165/LqQ5pxCcYInXVZCkr6020tFcXQPgEEN:iLYg9gZGGJUI5/LzPYjkr60YgPgEa

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • .NET Reactor proctector 41 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0‌‌.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0‌‌.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4036
      • C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1688
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1212
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          PID:7996
      • C:\ProgramData\RuntimeBroker.exe
        "C:\ProgramData\RuntimeBroker.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Add-MpPreference -ExclusionPath 'C:\ProgramData\Windows'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          PID:5236
        • C:\Windows\SysWOW64\schtasks.exe
          "schtasks.exe" /create /tn RuntimeBroker.exe /tr "C:\ProgramData\Windows\RuntimeBroker.exe" /st 13:49 /du 23:59 /sc daily /ri 1 /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:7208
        • C:\ProgramData\Windows\RuntimeBroker.exe
          "C:\ProgramData\Windows\RuntimeBroker.exe"
          4⤵
            PID:6756
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC2ED.tmp.cmd""
            4⤵
              PID:7556
              • C:\Windows\SysWOW64\timeout.exe
                timeout 6
                5⤵
                • Delays execution with timeout.exe
                PID:4024
        • C:\Users\Admin\AppData\Local\Temp\7zO892B19A8\SpyNote v7.0‌‌.exe
          "C:\Users\Admin\AppData\Local\Temp\7zO892B19A8\SpyNote v7.0‌‌.exe"
          2⤵
            PID:5556
            • C:\Users\Admin\AppData\Local\Temp\7zO892B19A8\SpyNote v7.0.exe
              "C:\Users\Admin\AppData\Local\Temp\7zO892B19A8\SpyNote v7.0.exe"
              3⤵
                PID:5648
              • C:\Users\Admin\AppData\Roaming\svchost.exe
                "C:\Users\Admin\AppData\Roaming\svchost.exe"
                3⤵
                  PID:5516
                • C:\ProgramData\RuntimeBroker.exe
                  "C:\ProgramData\RuntimeBroker.exe"
                  3⤵
                    PID:7292
                • C:\Users\Admin\AppData\Local\Temp\7zO892F55D8\SpyNote v7.0‌‌.exe
                  "C:\Users\Admin\AppData\Local\Temp\7zO892F55D8\SpyNote v7.0‌‌.exe"
                  2⤵
                    PID:5372
                  • C:\Users\Admin\AppData\Local\Temp\7zO892D48D8\SpyNote v7.0‌‌.exe
                    "C:\Users\Admin\AppData\Local\Temp\7zO892D48D8\SpyNote v7.0‌‌.exe"
                    2⤵
                      PID:6396
                    • C:\Users\Admin\AppData\Local\Temp\7zO8927CCD8\SpyNote v7.0‌‌.exe
                      "C:\Users\Admin\AppData\Local\Temp\7zO8927CCD8\SpyNote v7.0‌‌.exe"
                      2⤵
                        PID:5156
                      • C:\Users\Admin\AppData\Local\Temp\7zO89255CD8\SpyNote v7.0‌‌.exe
                        "C:\Users\Admin\AppData\Local\Temp\7zO89255CD8\SpyNote v7.0‌‌.exe"
                        2⤵
                          PID:3496
                        • C:\Users\Admin\AppData\Local\Temp\7zO8922ADD8\SpyNote v7.0‌‌.exe
                          "C:\Users\Admin\AppData\Local\Temp\7zO8922ADD8\SpyNote v7.0‌‌.exe"
                          2⤵
                            PID:8028
                          • C:\Users\Admin\AppData\Local\Temp\7zO892793C8\SpyNote v7.0‌‌.exe
                            "C:\Users\Admin\AppData\Local\Temp\7zO892793C8\SpyNote v7.0‌‌.exe"
                            2⤵
                              PID:1492
                            • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe
                              "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe"
                              2⤵
                                PID:5772
                              • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe
                                "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe"
                                2⤵
                                  PID:6952
                                • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe
                                  "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe"
                                  2⤵
                                    PID:7628
                                    • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe
                                      "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe"
                                      3⤵
                                        PID:7144
                                      • C:\Users\Admin\AppData\Roaming\svchost.exe
                                        "C:\Users\Admin\AppData\Roaming\svchost.exe"
                                        3⤵
                                          PID:6784
                                        • C:\ProgramData\RuntimeBroker.exe
                                          "C:\ProgramData\RuntimeBroker.exe"
                                          3⤵
                                            PID:8452
                                        • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe
                                          "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0‌‌.exe"
                                          2⤵
                                            PID:6116
                                          • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe
                                            "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe"
                                            2⤵
                                              PID:8852
                                            • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe
                                              "C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe"
                                              2⤵
                                                PID:6892

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\ProgramData\RuntimeBroker.exe

                                              Filesize

                                              363KB

                                              MD5

                                              4176d661566bec63a8375faa54729c0c

                                              SHA1

                                              6951cdaf28d99acc2627f4c9030ab67c30b610fe

                                              SHA256

                                              06ca6410380234120df1e71863648235f5ba0acde658deebc89ac6d9fcbc8791

                                              SHA512

                                              a1d42c6c6d1313d02414793aacc525cf984aad93069c85367955589ed3015740e32fb7721c7c32333692a5f653ee46d2e9aa4756e8f074444079d3d5bad403d0

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SpyNote v7.0‌‌.exe.log

                                              Filesize

                                              654B

                                              MD5

                                              11c6e74f0561678d2cf7fc075a6cc00c

                                              SHA1

                                              535ee79ba978554abcb98c566235805e7ea18490

                                              SHA256

                                              d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63

                                              SHA512

                                              32c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RuntimeBroker.exe.log

                                              Filesize

                                              410B

                                              MD5

                                              e5f7f742c8556fb04438af7cc96ac384

                                              SHA1

                                              aacf3dc921970079e9e2dee47123474b5a486242

                                              SHA256

                                              532f056ecc417d837c28f58d14c5b44c9edb39087b7f42e6b63938cc9d0ca149

                                              SHA512

                                              192e1088220007d3b4ad2a42ed3ff64f87b0714c8d9203567545287fa845a98da05b9015cd3f8a34430e910f72d61d7681f36beb3719792e3c5bc94e9fe68990

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.log

                                              Filesize

                                              418B

                                              MD5

                                              8260f0db586fb0ec20e9b81ad02adb07

                                              SHA1

                                              e8b804441ebcb82c24aaedfe6e9199d8a5320115

                                              SHA256

                                              248d0a3417f917ba9358f58ffed05a45255662d59b1058e1acab704086812364

                                              SHA512

                                              a0955e4869298c39f31114a766d2aaa7ba1aeda7acead25e9263cc4a57e105acda3188b864940d60c8472869a81df9b103f82593bb1c2ebe9ee295c4e5457436

                                            • C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0.exe

                                              Filesize

                                              2.0MB

                                              MD5

                                              afe92735dc4dc4563b17e78cc741cabc

                                              SHA1

                                              0d73cc4d07b6d576d77203b8b54a975cd3255e56

                                              SHA256

                                              53c22781dcbe31847b99acd7ef24088ab5793246b8c55b23585c1069b387c83c

                                              SHA512

                                              7ca7037167cc00a0f0b2eed7afbd34805350a632e0ffead3c785149ccbceaf0f3e436b7aee2df61f8f98b8180e0f8e946cd9686f044504489abb128709ed839e

                                            • C:\Users\Admin\AppData\Local\Temp\7zO892D8868\SpyNote v7.0‌‌.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              a8ebac97b36b859428d6eb96f1b39ab9

                                              SHA1

                                              bfa65f35f19d3cfdab70a9f7d2e2c017d60c5b44

                                              SHA256

                                              cb7d211955a21b258aef51606c6d7e8a73031a415e5beaf7dac761952abc1850

                                              SHA512

                                              513a7ec21e320e07b7c4448cea91e0191a44f7c057433ae4ff3fa0bf919bfe02c751c444465517fc793f010d48610323dc9dbe84b76845fb1268ac4a714457c2

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\FileManager\.flv.png

                                              Filesize

                                              318B

                                              MD5

                                              1fe9e7c9b54198110e55376074966fd6

                                              SHA1

                                              c07ad95af36dc363023489ade4ac4f8418ff8c45

                                              SHA256

                                              d3158f452be08061c6c558bda2acd24fc621fadef48ff65e4b1a38555c412438

                                              SHA512

                                              b416a2349d725a68696e58b15a5d54adc58ade122d31bcab19a1acbe670748979f1c6edda87d95c97c643479ce703e5652164047f0079c338e8f0e7fada063e5

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\FileManager\.html.png

                                              Filesize

                                              350B

                                              MD5

                                              0b0142846b368838009adb8e0ca5728b

                                              SHA1

                                              f588ffee0e694ed0dd1cff29a7bb2f35e244f0da

                                              SHA256

                                              e91e1941c2bd0c5c73a04a9bf3c218f15fb0cc0ee5538e449a93d4dcb4659853

                                              SHA512

                                              129ed4c70168aec2b26a9c5d4127c1fc83e38201b231a5969b41f7fd1270a72f87350f4e3fa75b77ab10792e52427cb8a2ef03a5e8babafe03fda2958dcd56f8

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\FileManager\.ico.png

                                              Filesize

                                              371B

                                              MD5

                                              1599dd804230f5749666f27853e2242b

                                              SHA1

                                              95b1b1891204422f13d08fce052d77595d457a82

                                              SHA256

                                              757e61f6cbb0010be9fb615d221e0cba62d3d5f6edb5ccfb770875d5bed0ff1f

                                              SHA512

                                              1e074489a3b55ce1bfe5bfa3f4b166e8cd847d711a062eeb94a0935e2c137175b320ce02ba438ba12e4fa6250989846a47e66af25df507a3b78431501833e495

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\FileManager\.imy.png

                                              Filesize

                                              307B

                                              MD5

                                              ded8c7514fff2c655678e5d972091f68

                                              SHA1

                                              df0eed69289e2cf1aa2199a7e481ad75edc77e96

                                              SHA256

                                              67855916347feef5403c65be95c7782e43aa54bc816cdba6fba629268fae5dcf

                                              SHA512

                                              351d94384752995b259ad894b621adf9c6fa7a628029beac26f0d6fa605b527969fbfd542693e7ae567d4c8800be200dd3eab7a44bc09e1c6cf17023510f20c2

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\Flags\re.png

                                              Filesize

                                              545B

                                              MD5

                                              c1cf1874c3305e5663547a48f6ad2d8c

                                              SHA1

                                              0f67f12d76a0543772a3259a3b38935381349e01

                                              SHA256

                                              79a39793efbf8217efbbc840e1b2041fe995363a5f12f0c01dd4d1462e5eb842

                                              SHA512

                                              c00e202e083f703e39cafbb86f3e3f6b330359906e3a6c7a6a78364d6adeb489f8b8ab1b2d6a1b8d9ef1a17702cfc8fc17219cf1aae3e5a7c18833f028037843

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\Flags\sj.png

                                              Filesize

                                              512B

                                              MD5

                                              559ce5baaee373db8da150a5066c1062

                                              SHA1

                                              ee80e5f63c986d04f46bff10f639113c88107ced

                                              SHA256

                                              f8dc302371c809ebda3e9183c606264601f8dd851d2b1878fd25f0f6abe2988c

                                              SHA512

                                              c0ca7595cdd2dcef0385ccb1c0d15bb74accaea63b9531233bddf14c1791ffc9712dff660292706cfa269a975d29d7a189885cd09046ac6d8ed39a57ec9557ca

                                            • C:\Users\Admin\AppData\Local\Temp\Resources\Icons\ToolStrip\0\folder.png

                                              Filesize

                                              216B

                                              MD5

                                              dfb32f74e4a91f72ae9abe8c2eff21b8

                                              SHA1

                                              97c2f6a545ece37a5bb89d7b3e394f936ccec70b

                                              SHA256

                                              311037d89c1f321ac0ffc5ab9c149e7c5639a1188ab6e2b15556fc157192be48

                                              SHA512

                                              900fb3523393487c00566439b689589822b520392425f952b55783bd47ad9cdd2547162c1e938dded1041702c37a3585b010900e4479c5accf3af723519120aa

                                            • C:\Users\Admin\AppData\Local\Temp\SpyNote v7.0.exe.config

                                              Filesize

                                              1KB

                                              MD5

                                              6ee4c4ade818348068f8758532b8bdef

                                              SHA1

                                              58bb8a1c3d0229aa8bcfbb4a448ee09aa6408d93

                                              SHA256

                                              38c3a90cd3d444059138d22ef7c80bc2bb8697f325df681de2de0c08edd5b743

                                              SHA512

                                              7a037bf8287a4a805f0e46f9f3c9ce04a13fff26fec244cadcccafa28c32a48dda4ea49476243e1ea9f3d4ff1e9b067abc9e702dbe684984de86b353ee4c615b

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bhgf5gic.eey.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\tmpC2ED.tmp.cmd

                                              Filesize

                                              146B

                                              MD5

                                              0cb895ad0d191f024bfaa2b703b64524

                                              SHA1

                                              0f68b39ae4514fb558a8af8df191995067188e85

                                              SHA256

                                              d1817b363226fb7732abec69eaa515434868ed03748a02716b9470fd59c77448

                                              SHA512

                                              717f42a851decc01f4c5f2d1d8c0a30d19b56b7cce1ab08b4874c49f73541f47f542b23f8052afc8b06312997d69f5a97ca236c2c726f7667626b17b6f6ae23b

                                            • C:\Users\Admin\AppData\Roaming\svchost.exe

                                              Filesize

                                              351KB

                                              MD5

                                              c8a63c858009f4611474c71b40dd4ded

                                              SHA1

                                              29fb9205a79790102ca28ac31c88e51008a852cd

                                              SHA256

                                              9fc20a59382e6eb19e83d0febc845b017ada8968d329a6698a1db09fb844871f

                                              SHA512

                                              52d92a18b1898d6f22f7e9eb334c369294683cb2a54a80c0791cd2457f5e9af3cdd225d01fd8a80883586680543eabc8589a8962e0a0b6c0e73bbcd68b0482c6

                                            • memory/1212-1255-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1222-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1237-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1209-0x0000000005B40000-0x0000000005BC6000-memory.dmp

                                              Filesize

                                              536KB

                                            • memory/1212-1203-0x0000000005500000-0x0000000005588000-memory.dmp

                                              Filesize

                                              544KB

                                            • memory/1212-1230-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1262-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1257-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1211-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1212-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1214-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1216-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1220-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1218-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1224-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1260-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1226-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1253-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1251-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1248-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1246-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1244-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1242-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1228-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1239-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1235-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1212-1232-0x0000000005B40000-0x0000000005BC1000-memory.dmp

                                              Filesize

                                              516KB

                                            • memory/1688-1210-0x0000000006190000-0x000000000622C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/1688-1206-0x0000000005BE0000-0x0000000006186000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/1688-1241-0x00000000053E0000-0x00000000057D3000-memory.dmp

                                              Filesize

                                              3.9MB

                                            • memory/1688-1258-0x00000000053E0000-0x00000000057D3000-memory.dmp

                                              Filesize

                                              3.9MB

                                            • memory/1688-1205-0x00000000057E0000-0x0000000005BDA000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/1688-1234-0x00000000053E0000-0x00000000057D3000-memory.dmp

                                              Filesize

                                              3.9MB

                                            • memory/1688-1265-0x00000000053E0000-0x00000000057D3000-memory.dmp

                                              Filesize

                                              3.9MB

                                            • memory/1688-1208-0x00000000053E0000-0x00000000057D8000-memory.dmp

                                              Filesize

                                              4.0MB

                                            • memory/4036-1149-0x00007FFDE3EF3000-0x00007FFDE3EF5000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/4036-1150-0x0000000000430000-0x00000000006D4000-memory.dmp

                                              Filesize

                                              2.6MB

                                            • memory/4036-1153-0x00007FFDE3EF0000-0x00007FFDE49B2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4036-1202-0x00007FFDE3EF0000-0x00007FFDE49B2000-memory.dmp

                                              Filesize

                                              10.8MB

                                            • memory/4120-1276-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-1272-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-4974-0x0000000005C50000-0x0000000005CE2000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/4120-1267-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-1268-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-1204-0x0000000005500000-0x000000000557E000-memory.dmp

                                              Filesize

                                              504KB

                                            • memory/4120-1274-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-1270-0x0000000005B40000-0x0000000005BB7000-memory.dmp

                                              Filesize

                                              476KB

                                            • memory/4120-1207-0x0000000005B40000-0x0000000005BBC000-memory.dmp

                                              Filesize

                                              496KB

                                            • memory/5236-19366-0x000000006F9F0000-0x000000006FA3C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5236-19360-0x0000000006B70000-0x0000000006BA2000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/5236-8367-0x0000000006140000-0x0000000006497000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/5236-21084-0x0000000007AC0000-0x0000000007ADA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/5236-8309-0x0000000005ED0000-0x0000000005F36000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/5236-14887-0x00000000066E0000-0x00000000066FE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/5236-8307-0x00000000056F0000-0x0000000005712000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/5236-19379-0x0000000006B10000-0x0000000006B2E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/5236-14955-0x0000000006C90000-0x0000000006CDC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5236-8308-0x0000000005790000-0x00000000057F6000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/5236-5890-0x00000000050F0000-0x0000000005126000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/5236-19554-0x00000000078F0000-0x0000000007993000-memory.dmp

                                              Filesize

                                              652KB

                                            • memory/5236-5898-0x0000000005800000-0x0000000005ECA000-memory.dmp

                                              Filesize

                                              6.8MB

                                            • memory/5236-20914-0x0000000008100000-0x000000000877A000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/6756-8909-0x0000000006DC0000-0x0000000006DCA000-memory.dmp

                                              Filesize

                                              40KB