Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 02:28

General

  • Target

    a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe

  • Size

    25.9MB

  • MD5

    04e428b8cc919452e07cae9081618efc

  • SHA1

    4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09

  • SHA256

    a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380

  • SHA512

    88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238

  • SSDEEP

    393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

103.17.38.43:4449

192.168.4.182:4449

Mutex

chrome

Attributes
  • delay

    1

  • install

    true

  • install_file

    svh.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

127.0.0.1:7000

192.168.4.185:7000

192.168.4.182:7000

192.168.4.181:7000

103.17.38.43:7000

103.17.38.40/29:7000

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    chrome.exe

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

103.17.38.43:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    chrome.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 4 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe
    "C:\Users\Admin\AppData\Local\Temp\a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Roaming\G160.exe
      "C:\Users\Admin\AppData\Roaming\G160.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Suspicious behavior: EnumeratesProcesses
      PID:708
    • C:\Users\Admin\AppData\Roaming\chrome.exe
      "C:\Users\Admin\AppData\Roaming\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4508
    • C:\Users\Admin\AppData\Roaming\chrome vecom.exe
      "C:\Users\Admin\AppData\Roaming\chrome vecom.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3124
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:900
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8A2F.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:3844
        • C:\Users\Admin\AppData\Roaming\svh.exe
          "C:\Users\Admin\AppData\Roaming\svh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3884
    • C:\Users\Admin\AppData\Roaming\chrome2.exe
      "C:\Users\Admin\AppData\Roaming\chrome2.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3420
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:4788
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3872
    • C:\Users\Admin\AppData\Roaming\chrome1.exe
      "C:\Users\Admin\AppData\Roaming\chrome1.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3956
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3648
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
    1⤵
      PID:900
    • C:\Users\Admin\AppData\Local\chrome.exe
      C:\Users\Admin\AppData\Local\chrome.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4928
    • C:\Users\Admin\AppData\Local\chrome.exe
      C:\Users\Admin\AppData\Local\chrome.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chrome.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      6d3e9c29fe44e90aae6ed30ccf799ca8

      SHA1

      c7974ef72264bbdf13a2793ccf1aed11bc565dce

      SHA256

      2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

      SHA512

      60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      15dde0683cd1ca19785d7262f554ba93

      SHA1

      d039c577e438546d10ac64837b05da480d06bf69

      SHA256

      d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

      SHA512

      57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      ef647504cf229a16d02de14a16241b90

      SHA1

      81480caca469857eb93c75d494828b81e124fda0

      SHA256

      47002672443e80410e55a0b6d683573ac27d70d803b57ee3c2818d1008669710

      SHA512

      a6d8c08c708eee6f7e700880ce79d2ba7cd0acbe8529d96e18f3e90ea1f3cf33fd801dd6eba6017cdd02769e968c48278c090c1deeac710124f79423cd862ee1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      31fab79c206e742ed94fd8f6958e13dc

      SHA1

      4670f6726c4f6cf5c6bcb8275fe41e05266adad6

      SHA256

      7fd193318e5923cb28b74bfd9d7e2b2f0a8889b5a5fe2bf3a980fd0f38a50e92

      SHA512

      8946d386bafe71997cd1a827e6e0064f19b96317c21b275ad91b48d0e74db6ea03121cae1c4f74c6dd46d5fa9bbf468b62f9a05bb4514a1cfde9781199231e1c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      0aa63dbb46d451e47a7a682c64af776d

      SHA1

      3b0026f2dae8e9c491ccaa40133755779de35aaa

      SHA256

      9158038718d41172c22a3c1a15852405e3e1c8e2c44fa066328eb1520e5d977b

      SHA512

      4d2564850c2ab1bc71089412f19147df4a1cd3075aa2039aa894271b333cd9c510b7ba4d70889f24d45d8b366d8b5167abdcf24314e4753420337c7d34e7c43f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      5afb2e6ea0396df69c8d082b7c0111b5

      SHA1

      ed3fe21a7591d295581a3270c0804e88ac9d3fde

      SHA256

      0cdd39b0d1adb03a8262ac587582c571c02a4c0d4767fe2094150d33eb1946b4

      SHA512

      d58837e7782e157189e3319fef42dcceaf68474d6d219b02d926580617ec10efd5b77294259e539b3b298b9844318d943a5d92b6408500454d67684319df8a16

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      da5c82b0e070047f7377042d08093ff4

      SHA1

      89d05987cd60828cca516c5c40c18935c35e8bd3

      SHA256

      77a94ef8c4258445d538a6006ffadb05afdf888f6f044e1e5466b981a07f16c5

      SHA512

      7360311a3c97b73dd3f6d7179cd979e0e20d69f380d38292447e17e369087d9dd5acb66cd0cbdd95ac4bfb16e5a1b86825f835a8d45b14ea9812102cff59704b

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5x5l242j.eus.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp8A2F.tmp.bat

      Filesize

      147B

      MD5

      de11585e796aef8d00e2cddc1e1e74ca

      SHA1

      4dadb8254b3da03aa262c9f4770172dbd3ac56fb

      SHA256

      cecdf87580cc029bccbf3d13f0d2228c5cdafab7b640d59edb455e0d8c589319

      SHA512

      fa7a84602f95765ab816fab2a458d333cf39de0f1892c7587d9fe2191ca4f4c164fc5f73b9f008aaaed9d72ca7f4ea33f8d18db78d5a5e3a236ecb3111ff661b

    • C:\Users\Admin\AppData\Roaming\G160.exe

      Filesize

      25.1MB

      MD5

      ed8d8078866b64f59d97276f5725168f

      SHA1

      1195dde78e8e64b5aec5466f777a71261652e890

      SHA256

      d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b

      SHA512

      c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk

      Filesize

      665B

      MD5

      0df302235c9c0c4da70207ff67e65e07

      SHA1

      c3afc5a4067bb0b2abf931d344cce772bdd7ae30

      SHA256

      d00409773c60a198afbc9c9e861da45599433705ba450601cd7671e1a1fe7f0e

      SHA512

      1b93de9ea5cc190e94b66b06c893a7411a140d55d45cd23205418eb0e3056425d24e1a8a3712c33a6b0824ecd0c4be7d2e3d169aace9c804bfeb66de8e6a3070

    • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

      Filesize

      8B

      MD5

      cf759e4c5f14fe3eec41b87ed756cea8

      SHA1

      c27c796bb3c2fac929359563676f4ba1ffada1f5

      SHA256

      c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

      SHA512

      c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

    • C:\Users\Admin\AppData\Roaming\chrome vecom.exe

      Filesize

      187KB

      MD5

      f16744580bc9d4a51f5af484d2c3c65c

      SHA1

      729f833612d72845e4c97b42c90d126928809db4

      SHA256

      56d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a

      SHA512

      e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186

    • C:\Users\Admin\AppData\Roaming\chrome.exe

      Filesize

      176KB

      MD5

      60cb37e6977e0827cca5f5ccc7067b08

      SHA1

      c1f3b308c757552b20dfbcac77a85a09a372a526

      SHA256

      ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2

      SHA512

      ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc

    • C:\Users\Admin\AppData\Roaming\chrome1.exe

      Filesize

      174KB

      MD5

      e7be301f2c3a4b88a3fdc12c573fd515

      SHA1

      3d0a0195fbe314e3ba3c985b5614dcffb956fed5

      SHA256

      96d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541

      SHA512

      c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1

    • C:\Users\Admin\AppData\Roaming\chrome2.exe

      Filesize

      194KB

      MD5

      d24ca6b94b01c980715f202aed2afc1a

      SHA1

      e68c8f902483079def7e17ac64530c46c0d3d98e

      SHA256

      5dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a

      SHA512

      aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b

    • memory/708-68-0x00007FFA8A5E0000-0x00007FFA8A5E2000-memory.dmp

      Filesize

      8KB

    • memory/708-94-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/708-76-0x00007FFA8C640000-0x00007FFA8C642000-memory.dmp

      Filesize

      8KB

    • memory/708-67-0x00007FFA8A5D0000-0x00007FFA8A5D2000-memory.dmp

      Filesize

      8KB

    • memory/708-75-0x00007FFA8C630000-0x00007FFA8C632000-memory.dmp

      Filesize

      8KB

    • memory/708-74-0x00007FFA8C620000-0x00007FFA8C622000-memory.dmp

      Filesize

      8KB

    • memory/708-73-0x00007FFA8C610000-0x00007FFA8C612000-memory.dmp

      Filesize

      8KB

    • memory/708-72-0x00007FFA8C600000-0x00007FFA8C602000-memory.dmp

      Filesize

      8KB

    • memory/708-71-0x00007FFA8C5F0000-0x00007FFA8C5F2000-memory.dmp

      Filesize

      8KB

    • memory/708-79-0x00007FFA8C670000-0x00007FFA8C672000-memory.dmp

      Filesize

      8KB

    • memory/708-81-0x00007FFA8C690000-0x00007FFA8C692000-memory.dmp

      Filesize

      8KB

    • memory/708-80-0x00007FFA8C680000-0x00007FFA8C682000-memory.dmp

      Filesize

      8KB

    • memory/708-82-0x00007FFA8C6A0000-0x00007FFA8C6A2000-memory.dmp

      Filesize

      8KB

    • memory/708-83-0x00007FFA8C6B0000-0x00007FFA8C6B2000-memory.dmp

      Filesize

      8KB

    • memory/708-88-0x00007FFA8C6E0000-0x00007FFA8C6E2000-memory.dmp

      Filesize

      8KB

    • memory/708-85-0x00007FFA8C6D0000-0x00007FFA8C6D2000-memory.dmp

      Filesize

      8KB

    • memory/708-84-0x00007FFA8C6C0000-0x00007FFA8C6C2000-memory.dmp

      Filesize

      8KB

    • memory/708-92-0x00007FFA8C700000-0x00007FFA8C702000-memory.dmp

      Filesize

      8KB

    • memory/708-100-0x0000000000400000-0x0000000000418000-memory.dmp

      Filesize

      96KB

    • memory/708-77-0x00007FFA8C650000-0x00007FFA8C652000-memory.dmp

      Filesize

      8KB

    • memory/708-93-0x00007FFA8C710000-0x00007FFA8C712000-memory.dmp

      Filesize

      8KB

    • memory/708-89-0x00007FFA8C6F0000-0x00007FFA8C6F2000-memory.dmp

      Filesize

      8KB

    • memory/708-101-0x0000000140000000-0x0000000142E28000-memory.dmp

      Filesize

      46.2MB

    • memory/708-78-0x00007FFA8C660000-0x00007FFA8C662000-memory.dmp

      Filesize

      8KB

    • memory/708-105-0x00000000020E0000-0x00000000021F5000-memory.dmp

      Filesize

      1.1MB

    • memory/708-65-0x00007FFA8C5D0000-0x00007FFA8C5D2000-memory.dmp

      Filesize

      8KB

    • memory/708-64-0x00007FFA8C5C0000-0x00007FFA8C5C2000-memory.dmp

      Filesize

      8KB

    • memory/708-63-0x00007FFA8C5B0000-0x00007FFA8C5B2000-memory.dmp

      Filesize

      8KB

    • memory/708-66-0x00007FFA8C5E0000-0x00007FFA8C5E2000-memory.dmp

      Filesize

      8KB

    • memory/708-70-0x00007FFA8A120000-0x00007FFA8A122000-memory.dmp

      Filesize

      8KB

    • memory/708-69-0x00007FFA8A110000-0x00007FFA8A112000-memory.dmp

      Filesize

      8KB

    • memory/1752-59-0x0000000000ED0000-0x0000000000F02000-memory.dmp

      Filesize

      200KB

    • memory/3732-61-0x0000000000940000-0x0000000000974000-memory.dmp

      Filesize

      208KB

    • memory/3856-0-0x00007FFA6E083000-0x00007FFA6E085000-memory.dmp

      Filesize

      8KB

    • memory/3856-1-0x0000000000190000-0x0000000001B76000-memory.dmp

      Filesize

      25.9MB

    • memory/3900-106-0x00000247F3B10000-0x00000247F3B32000-memory.dmp

      Filesize

      136KB

    • memory/4508-26-0x0000000000DA0000-0x0000000000DD2000-memory.dmp

      Filesize

      200KB

    • memory/4948-58-0x0000000000E40000-0x0000000000E76000-memory.dmp

      Filesize

      216KB