Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/08/2023, 11:07

230803-m8ec4sch93 4

03/08/2023, 11:04

230803-m6e7mach86 1

03/08/2023, 11:00

230803-m4czgseb6t 1

Analysis

  • max time kernel
    153s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/08/2023, 11:00

General

  • Target

    1click.cmd

  • Size

    2KB

  • MD5

    a53a00da8b89ce467a121613cd56d4e4

  • SHA1

    e7a50d4f41b500d6066a6f3dc1c310102e6a6c85

  • SHA256

    53f4d37cbea19d5d15b5db048414c368dac0787500db12418a78662d33a92cb7

  • SHA512

    84addbd6375e186c1abc828a99a2cb852a8d744734096c952add127439ef1066036a3ba501bbe5288e8bc791b4c9391e1b39831d69051fb1407237a091d1551a

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1click.cmd"
    1⤵
      PID:5008
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SyncEnter.ods"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4308
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\New Microsoft Excel Worksheet.xlsx"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3920
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
      1⤵
        PID:5028
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffe35d59758,0x7ffe35d59768,0x7ffe35d59778
          2⤵
            PID:5032
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
            2⤵
              PID:4256
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:2
              2⤵
                PID:2188
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2052 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                2⤵
                  PID:4112
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2972 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:1
                  2⤵
                    PID:4512
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3100 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:1
                    2⤵
                      PID:4036
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4460 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:1
                      2⤵
                        PID:4464
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4632 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                        2⤵
                          PID:420
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4736 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                          2⤵
                            PID:4712
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                            2⤵
                              PID:660
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5036 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                              2⤵
                                PID:3644
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 --field-trial-handle=1892,i,3518427955585606103,5980927407453749328,131072 /prefetch:8
                                2⤵
                                  PID:4980
                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                1⤵
                                  PID:4260

                                Network

                                MITRE ATT&CK Matrix

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  371B

                                  MD5

                                  1470fa6de54d3396ae00fd8e379573ff

                                  SHA1

                                  3891791ec3bb2eab3d05d19d756bfdebadd06529

                                  SHA256

                                  9c70964540e04ac955937912a8b11e6a8f780b828c1c61efa2544862799ae86e

                                  SHA512

                                  ce63336d976908d53fbfe8e74e9f43d2f0843ae1ec248916f9a36726e3c450bbe0294570fe078e101b9da6de10cbffa6c7e063b36d92597d433f05cbc38900a5

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  84b66de384aecd43cd68c98fd493fd4d

                                  SHA1

                                  bcfc1c19bc656223a0a5613979dba39b13104d8a

                                  SHA256

                                  0edf6566ca3588db371b040e81c12cacde20a9e94b39fc75d95439d457361585

                                  SHA512

                                  116def801f568f21695b18a5d25392a8ee5cf033f1703ec6f2333f94b2d37fa86836ebac19a34a702d3bd2c5e6e8e374ffcf134459d30bf5d89e2f54ff9fc108

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  12KB

                                  MD5

                                  a2a88a021dd00becf98c4e12869ffb8f

                                  SHA1

                                  38e3f57401a64b5d930838135a06a4cc644797e5

                                  SHA256

                                  eb3b86b377203e7f06af53c7a8ef92207cf763a01acc40231290cdcaa26aceb6

                                  SHA512

                                  52ed8e7212eaa581e68fcb1d6ad1a2392411b0e9ceb12fe4586e46e655da518ded9f8880eb8a6837461cb2f99bc7b8805e9c818c9850248b5b18ce985af890fe

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  176KB

                                  MD5

                                  3096758deda9f2e1856b94f48c859832

                                  SHA1

                                  368ee765e8ea8ebc177412bbf3098569a20f7283

                                  SHA256

                                  46256324fa21057a68b65bb01c67e9cb17e32d4f09e3ace1a79a399e2a1d87a6

                                  SHA512

                                  50667d6d78fd2903bbd55b0106e211f61b4786076d7bc454b9dd7227e8d10ec7b51eb319867001a1cc049edd4c4ea9cb0d8dab716aaf5b579310e12c78c53bc3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                  Filesize

                                  2B

                                  MD5

                                  99914b932bd37a50b983c5e7c90ae93b

                                  SHA1

                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                  SHA256

                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                  SHA512

                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\9F077590-BED9-4434-820A-D29DE5657E05

                                  Filesize

                                  156KB

                                  MD5

                                  708c2c0ea13587d3206523e7afc79098

                                  SHA1

                                  9c00b81fcfdbb78479a184f34dcd31859f01e48e

                                  SHA256

                                  20e7175e05de75f5e2e8ad343c6328b917fad4e95f18f1a880a2246aa619b7f2

                                  SHA512

                                  97d93668035d14060afc44638cce98392faa8c393b039bb124a0286df2176be3d5154b0815afb6379b50adb35c04e703c4942298e2d80517ce5410de1f4dcddb

                                • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

                                  Filesize

                                  323KB

                                  MD5

                                  9727b1893f4a4adc3107a50a77813c8e

                                  SHA1

                                  93f76aa52461deeeb49672f7dd497cef15470186

                                  SHA256

                                  a5faca4539374a78a69ef31163e96a358c49014fb3e1fa413f4463b008499d51

                                  SHA512

                                  acf7309e548ba621e94c32b9062149670012bea2eaf280b97359f2ece6d61e7d60eabeb295c7690b42ed3c52982b317d96aa6205cb58fa44dcd553d8468751d5

                                • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db

                                  Filesize

                                  24KB

                                  MD5

                                  8665de22b67e46648a5a147c1ed296ca

                                  SHA1

                                  b289a96fee9fa77dd8e045ae8fd161debd376f48

                                  SHA256

                                  b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

                                  SHA512

                                  bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                  Filesize

                                  271B

                                  MD5

                                  ca2c45371cfe178adda23376b7b9f04a

                                  SHA1

                                  4a71b5b9c1c4b52adb61a41b48c34df078d033cb

                                  SHA256

                                  f67722a4083f0cd3b18c6cab562462b66ed644234e6eb23dff02df6a716a966c

                                  SHA512

                                  46395dadc4e07e651c6d513920750d74703b887da40a9a1b1401da616b7ab0bf378a2d558e705659c2707e94ed1c371d839e7753fbdc379b2b6d9f63c5aba428

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                  Filesize

                                  24B

                                  MD5

                                  4fcb2a3ee025e4a10d21e1b154873fe2

                                  SHA1

                                  57658e2fa594b7d0b99d02e041d0f3418e58856b

                                  SHA256

                                  90bf6baa6f968a285f88620fbf91e1f5aa3e66e2bad50fd16f37913280ad8228

                                  SHA512

                                  4e85d48db8c0ee5c4dd4149ab01d33e4224456c3f3e3b0101544a5ca87a0d74b3ccd8c0509650008e2abed65efd1e140b1e65ae5215ab32de6f6a49c9d3ec3ff

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

                                  Filesize

                                  725B

                                  MD5

                                  42d114095db9293cb8f9e04f3e890292

                                  SHA1

                                  1edc7d6da59441d32e97e2c82f647a6e4f2b0c4a

                                  SHA256

                                  fe50b1d49b1173418b78cabf5c861a456259afc01370a6ff5ba25fdb72dab3bb

                                  SHA512

                                  04ebbf76d56b84598fbfa48779c2ef20fcff0acdfe9ce72cbb6e2cf8fd66f070f76d362293eac5589d0af116321c0eb64aefb73f735eeaaeef4b88acf612ba7f

                                • memory/3920-520-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-340-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-585-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/3920-584-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-581-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-582-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-583-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-580-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-524-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-523-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-522-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/3920-521-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-322-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-321-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-323-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-325-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-324-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-327-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-328-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-326-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-331-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-332-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-333-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-334-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-335-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/3920-336-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-338-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-337-0x00007FFDFF8F0000-0x00007FFDFF900000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3920-339-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-519-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-341-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-342-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/3920-343-0x00007FFDFF8F0000-0x00007FFDFF900000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-316-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-121-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-136-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-135-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-287-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-117-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-320-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/4308-319-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-318-0x000001D055AA0000-0x000001D055ACF000-memory.dmp

                                  Filesize

                                  188KB

                                • memory/4308-317-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-133-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/4308-129-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-137-0x00007FFDFF8F0000-0x00007FFDFF900000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-314-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-138-0x00007FFDFF8F0000-0x00007FFDFF900000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-290-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-289-0x00007FFE3FE00000-0x00007FFE3FEAE000-memory.dmp

                                  Filesize

                                  696KB

                                • memory/4308-288-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-126-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-124-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB

                                • memory/4308-122-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-315-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-120-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-119-0x00007FFE02440000-0x00007FFE02450000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4308-118-0x00007FFE423B0000-0x00007FFE4258B000-memory.dmp

                                  Filesize

                                  1.9MB