Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/03/2023, 17:19

230302-vv9k4adh98 6

02/03/2023, 17:10

230302-vp7vbade4v 6

02/03/2023, 17:07

230302-vnbeqade3w 6

Analysis

  • max time kernel
    39s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 17:19

General

  • Target

    https://drive.google.com/file/d/1h4mL-IQWi6fxy7Lbw1urXpi8N9L1P15m/view

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/1h4mL-IQWi6fxy7Lbw1urXpi8N9L1P15m/view
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3128 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:264
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2260
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.0.17289273\2112154523" -parentBuildID 20221007134813 -prefsHandle 1852 -prefMapHandle 1844 -prefsLen 20812 -prefMapSize 232645 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ebe689d-a9bd-48df-8ad8-05944e60e256} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 1924 237f65eb258 gpu
        3⤵
          PID:4392
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.1.850465961\182125445" -parentBuildID 20221007134813 -prefsHandle 2304 -prefMapHandle 2300 -prefsLen 20848 -prefMapSize 232645 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9ccbf693-dd5f-4257-b7c3-c2b2a653cfd3} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 2316 237e9675558 socket
          3⤵
            PID:2428
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.2.2102563094\1109730953" -childID 1 -isForBrowser -prefsHandle 3080 -prefMapHandle 3076 -prefsLen 20996 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8afda37d-2056-445d-aa76-5e33ff0859cf} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 3092 237fa2da158 tab
            3⤵
              PID:2188
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.3.962573251\2003866675" -childID 2 -isForBrowser -prefsHandle 2932 -prefMapHandle 3304 -prefsLen 21037 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {caf2158d-6490-4d8a-9859-ff4ac2c70ba2} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 3064 237f961f058 tab
              3⤵
                PID:1000
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.4.1523891460\69098935" -childID 3 -isForBrowser -prefsHandle 3560 -prefMapHandle 3564 -prefsLen 21037 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db2b2b70-bed4-4b70-bfb5-dfade2627221} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 3284 237f97e5f58 tab
                3⤵
                  PID:3320
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.5.1344705485\1253375433" -childID 4 -isForBrowser -prefsHandle 3772 -prefMapHandle 3776 -prefsLen 21037 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {abf0d4c5-8c81-409e-9ff4-6595a771428b} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 3636 237f9bcbe58 tab
                  3⤵
                    PID:4424
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.6.1892191151\1542279339" -childID 5 -isForBrowser -prefsHandle 4808 -prefMapHandle 4804 -prefsLen 26441 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb086fdc-1f29-4a8c-a9e6-58f32c0cc588} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 4816 237fa2b3558 tab
                    3⤵
                      PID:3288
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.7.562141211\158499602" -childID 6 -isForBrowser -prefsHandle 5288 -prefMapHandle 5292 -prefsLen 26500 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c2e2c92-9646-4f52-92dc-1051a0cc7d2c} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 5300 237fad38d58 tab
                      3⤵
                        PID:5848
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.8.1608753921\1197935315" -childID 7 -isForBrowser -prefsHandle 5396 -prefMapHandle 5308 -prefsLen 26500 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6128bf0-24b9-49b7-8119-cd81ec190e4a} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 5404 237fad3a558 tab
                        3⤵
                          PID:5228
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4972.9.1629522664\257455181" -childID 8 -isForBrowser -prefsHandle 6012 -prefMapHandle 3468 -prefsLen 27093 -prefMapSize 232645 -jsInitHandle 1468 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd441a1d-f950-4e47-b824-4656d89f41cd} 4972 "\\.\pipe\gecko-crash-server-pipe.4972" 6020 237eb6b0158 tab
                          3⤵
                            PID:484
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:5904
                        • C:\Program Files\7-Zip\7zG.exe
                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap24236:108:7zEvent17651
                          1⤵
                            PID:5892
                          • C:\Users\Admin\Downloads\Areena Riverside Resort\advertising plan.scr
                            "C:\Users\Admin\Downloads\Areena Riverside Resort\advertising plan.scr" /S
                            1⤵
                              PID:2184
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                2⤵
                                  PID:2156
                              • C:\Windows\system32\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Areena Riverside Resort\advertising plan.txt
                                1⤵
                                  PID:636

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\7GHZP9XA\drive.google[1].xml

                                  Filesize

                                  13B

                                  MD5

                                  c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                  SHA1

                                  35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                  SHA256

                                  b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                  SHA512

                                  6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

                                  Filesize

                                  1021B

                                  MD5

                                  f958209a0ffb84803b57b90f80966133

                                  SHA1

                                  9d4c1e32b60e884287829e7722f608fe39b74453

                                  SHA256

                                  35619add7e6aa245a763c8bdd65fbfc02bc3fbe450c5c833c6e81e768a6ad7e7

                                  SHA512

                                  065022a445183ed83f61dea10bd39f75ddc5ff57216a4e92e22aa584a502853ffa02969569df4ed67868cd3b712be87162fa6fb974838666d1b4af37695dd69f

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\cb=gapi[2].js

                                  Filesize

                                  70KB

                                  MD5

                                  7c5be8bd74fa69afcbf7d14bfa057a19

                                  SHA1

                                  167cced15add6eaada7a1e677bde55208a1608d2

                                  SHA256

                                  1cc44005ab735a11fccc1f38e4a6937a355a50ae0c7ab1e9bae9d9f7ca726c05

                                  SHA512

                                  e979100027ad447422fbd9a707cb5072ef7fe523bf00159a0f48d6ad0b12a838591bdaf2cd64f3a25aab1d1afb288bf4908033ac64d67336b8e1867c9401dd13

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\suggestions[1].en-US

                                  Filesize

                                  17KB

                                  MD5

                                  5a34cb996293fde2cb7a4ac89587393a

                                  SHA1

                                  3c96c993500690d1a77873cd62bc639b3a10653f

                                  SHA256

                                  c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                  SHA512

                                  e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\drive_2020q4_32dp[1].png

                                  Filesize

                                  831B

                                  MD5

                                  916c9bcccf19525ad9d3cd1514008746

                                  SHA1

                                  9ccce6978d2417927b5150ffaac22f907ff27b6e

                                  SHA256

                                  358e814139d3ed8469b36935a071be6696ccad7dd9bdbfdb80c052b068ae2a50

                                  SHA512

                                  b73c1a81997abe12dba4ae1fa38f070079448c3798e7161c9262ccba6ee6a91e8a243f0e4888c8aef33ce1cf83818fc44c85ae454a522a079d08121cd8628d00

                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\jesyn8dv.default-release\activity-stream.discovery_stream.json.tmp

                                  Filesize

                                  141KB

                                  MD5

                                  718887c994c5546e394b76cd33c5b3b1

                                  SHA1

                                  3b3bc49bee4c955c4dfb83f41b88b5fe0a0866f7

                                  SHA256

                                  ac02e2e4bf00ffe3f21f903dca4083fa754e18daac562d401d4e477ee70f6cd2

                                  SHA512

                                  b21838dab9094a636a67b761d37d2a5f37ee2bb62b7f3793ddab5f74886f6e791e18f99185a7e310d78b3fedb61b52ef51a5a517caee6304013b0d4a47836747

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  837327b594eec3314d13bc0f2148f523

                                  SHA1

                                  46152177ab4d4c054add393e3c10526cc791b88b

                                  SHA256

                                  8db8141584eb4c6017eb522540ffffea852bc10d7dcc247bc8a2025c4156ad87

                                  SHA512

                                  04605ae32586c9d623f60a8cfb4924e5201afd9bfa8a6012ca4e2000f7c7f8a6a599d0cdfb99113f6f1a2ef8475b1ebe4bf9d7f7e053f30a51ff227589ca9b3e

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  7fa67ef5fae1e1c4917a8797d31175a7

                                  SHA1

                                  f23ad246fb00d7da4f76d3f97eea51489e1a9915

                                  SHA256

                                  2af5451aa1e6ee86d581dfb8907170fd28d4a4313fa8cec602a02ffa9c1b7bbd

                                  SHA512

                                  44b3fc6ffb44dccd67a51fbc72450867944a551d2f364c1fb29b256ed62e0401a6becf13ef9ccde75769fa386229be9a36db3469c54b01f12e4cae8b0b093b25

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  77deb0f50b65ecc067feda24ec336822

                                  SHA1

                                  b9c8f27279a112294722c32913a838deadf60aab

                                  SHA256

                                  c81442a643e25edbc72d41c3952610c2b37070dd68fd29a1a7d3584f412378f4

                                  SHA512

                                  8bceaa361b6fe2c30bb953155557149f6ba8af3364bfcde218c375f0399b14d3ca9191aad12b1526c16ed733e8a1c62f448ab71cfe064e070a848bff126f4325

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\prefs-1.js

                                  Filesize

                                  6KB

                                  MD5

                                  5dab4475e5c27df8ba14f3b41ff0dc59

                                  SHA1

                                  2633a2ee123c602e8d8e9583117c328eb267502e

                                  SHA256

                                  518ec67194bcd20b42db5a065b35eb5e1b04b21f33c13f1cee9df082bba1bbea

                                  SHA512

                                  8a2a2e1eec22fb7682cecec68bc8c17dfe55898180cbe464f57fd276ca6b0f9ec0f6b0fafcface2b4fc0886998546181c73c2313ff77dd52f12677009e8f059c

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\prefs.js

                                  Filesize

                                  6KB

                                  MD5

                                  9971fa8fa89a208685d3e30835832fb5

                                  SHA1

                                  5d9972a3bdbd4c18b3648597d2fd9f9fd6e30300

                                  SHA256

                                  13417a67a65fecc73ad5acc94d17d8a6fac3b0a343daf12d1cd2d126b9198084

                                  SHA512

                                  02b107e0d9449fa2d4d3655a880fbdeea4477205fa6c21aaf641c3d358353aa437cf040ec842107f973253bef767e48b9a0267dea5ed2d331aa192ef540e3b1f

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\sessionstore-backups\recovery.jsonlz4

                                  Filesize

                                  1KB

                                  MD5

                                  2700eb370c7a67804e8d4c82ded38f5f

                                  SHA1

                                  7352e21a3c19a186ec526e8993d1141b8a5953b3

                                  SHA256

                                  558ba85796bbb8c2ed5522a839ddfe20ecf30c4b11bdd2b33ca0f1cdc17832f9

                                  SHA512

                                  aa1cfee00235b99a2f7179df3f10a481ebe3efac2f6baef5478d1d2afee4938fd2909435f003f053c5d87ddc4b04abc1e7b11e93ccdff0700bea2e20ce46098b

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\sessionstore-backups\recovery.jsonlz4

                                  Filesize

                                  1KB

                                  MD5

                                  6002ce82c10f4f760e7c65826f99b9e9

                                  SHA1

                                  93f34c6cb4e21ae46290f72f2272a3c329b6ac5c

                                  SHA256

                                  158f60a1c2bcf4dcdede0add5d70feb0fdd9ff6f49ebc9857ecfe07c503b9285

                                  SHA512

                                  1231a34f3c32cacd483c0e7ac377917f765476e4cd441a8ebf78802650720ad3adfbc4bf5d03ee93f5b975e03e5c329334aeeeb18a39a1183de090fb75ee8b6f

                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\jesyn8dv.default-release\storage\default\https+++www.virustotal.com\cache\morgue\221\{39a1402b-b018-4995-9c2c-06620e8420dd}.final

                                  Filesize

                                  38KB

                                  MD5

                                  89337791b6fc019098a41200e671fcca

                                  SHA1

                                  80f31de6cbdcc1883748be19f127a4b882714975

                                  SHA256

                                  11c6e8b56af52d85c22f84e97662378344cee6ac69d83f6cad4803753102f1de

                                  SHA512

                                  dd6051f75719b2f0cd239d6622c0e9aa638a6a94b8288d7f9c9fdaefe17fca0bad47dcaa49ebdcddc8603b6f37109b9f69b0537d5caf02c5bbef325c403f36e2

                                • C:\Users\Admin\Downloads\Areena Riverside Resort.rar.7cydib4.partial

                                  Filesize

                                  4.5MB

                                  MD5

                                  8754ea8695bc5db00924af50b9306e2b

                                  SHA1

                                  e5cf4c79e1378d09b68c767bf06b173b44df1134

                                  SHA256

                                  fcb7a445c40ba527b888301826881c447ba9cce7360f282db8327fba558a451b

                                  SHA512

                                  a77b4463571d5973edad0700375364fd57326fa145928d77ef105fda77d11dd3209e691bf36ed0a1ec4f3d00350e74dc63427b4903672d2dec46deb90025a81b

                                • C:\Users\Admin\Downloads\Areena Riverside Resort.rar.7cydib4.partial

                                  Filesize

                                  4.5MB

                                  MD5

                                  8754ea8695bc5db00924af50b9306e2b

                                  SHA1

                                  e5cf4c79e1378d09b68c767bf06b173b44df1134

                                  SHA256

                                  fcb7a445c40ba527b888301826881c447ba9cce7360f282db8327fba558a451b

                                  SHA512

                                  a77b4463571d5973edad0700375364fd57326fa145928d77ef105fda77d11dd3209e691bf36ed0a1ec4f3d00350e74dc63427b4903672d2dec46deb90025a81b

                                • C:\Users\Admin\Downloads\Areena Riverside Resort\advertising plan.scr

                                  Filesize

                                  455.3MB

                                  MD5

                                  82520419060bb249de424c437214c25c

                                  SHA1

                                  7e12cae458bc38efc8d9b4f18c7f218e775fce9c

                                  SHA256

                                  f7cc4e66e94ab882729c6b78ac2746f7eb9e82c813a89f6e781ef177eba939a3

                                  SHA512

                                  ea89839fbcd308429c228cc9b39019ed32ee7417de5ea4c33f9b5e9b336f978c02962f13022a0828108a6fa5b02893a2e9228f35cc9f26afe54437571726c170

                                • C:\Users\Admin\Downloads\Areena Riverside Resort\advertising plan.scr

                                  Filesize

                                  154.5MB

                                  MD5

                                  4717c2a342ebf5a5ec9a5da8ff363bce

                                  SHA1

                                  1313e2f7b66c69a74f75009c1fb2e4917a58ea21

                                  SHA256

                                  4d80bbceb7e5678e6cfa6c0f46bcff4897e5f8d8f7e49db313f8d135787a9f00

                                  SHA512

                                  55b0f0de2104b45e2e1cb3e9ac5b1885bc03dfc6180fd8fa3d73747df8f03d00bcf320db166fb537930aae2b910270b1e5280fb51654e052b2d9cce7548d5df1

                                • memory/2156-5834-0x0000000004D50000-0x0000000004D8C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/2156-5855-0x0000000005050000-0x00000000050B6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/2156-5935-0x0000000004D40000-0x0000000004D50000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2156-5929-0x00000000077C0000-0x0000000007CEC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/2156-5818-0x0000000000400000-0x0000000000446000-memory.dmp

                                  Filesize

                                  280KB

                                • memory/2156-5825-0x0000000005320000-0x0000000005938000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/2156-5826-0x0000000002860000-0x0000000002872000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/2156-5827-0x0000000004E10000-0x0000000004F1A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/2156-5928-0x00000000069B0000-0x0000000006B72000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/2156-5833-0x0000000004D40000-0x0000000004D50000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/2156-5887-0x0000000005DA0000-0x0000000005DBE000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/2156-5868-0x0000000005BE0000-0x0000000005C72000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/2156-5874-0x0000000006230000-0x00000000067D4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/2156-5880-0x0000000005D50000-0x0000000005DA0000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/2156-5881-0x0000000006040000-0x00000000060B6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/2184-5812-0x0000000005EC0000-0x0000000005F5C000-memory.dmp

                                  Filesize

                                  624KB

                                • memory/2184-5801-0x00000000008C0000-0x000000000142E000-memory.dmp

                                  Filesize

                                  11.4MB

                                • memory/3320-5087-0x00007FFEC9CD0000-0x00007FFEC9CD1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3320-5088-0x00007FFECAC10000-0x00007FFECAC11000-memory.dmp

                                  Filesize

                                  4KB