Analysis

  • max time kernel
    119s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 09:02

General

  • Target

    eb21733ee3462e3bbc51eff626cfde9ac612550ec97bb15a788094f5365c2422.exe

  • Size

    3.3MB

  • MD5

    005f7ac1310d273ac6e11480ece168bd

  • SHA1

    a2d3811066c26c68d2dbbcfd6576d72ea4e0db6f

  • SHA256

    eb21733ee3462e3bbc51eff626cfde9ac612550ec97bb15a788094f5365c2422

  • SHA512

    ca8479f25285c2d7f50426210651d98c589cd1573c3a4f6f13a6d8ba9a839891d7863a016a47322f109ac3616657265275c43b4edadada339c03027dcb1c8ff5

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlb3vl67v+oAFEYAyKImTbl4p9i1:c+8X9G3vP3AMJl6ZAFmIKlci1

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb21733ee3462e3bbc51eff626cfde9ac612550ec97bb15a788094f5365c2422.exe
    "C:\Users\Admin\AppData\Local\Temp\eb21733ee3462e3bbc51eff626cfde9ac612550ec97bb15a788094f5365c2422.exe"
    1⤵
      PID:2580
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3584
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1900
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3280
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:208
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2924
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4952
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4812
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:5040
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4132
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3872
    • C:\Windows\system32\werfault.exe
      werfault.exe /hc /shared Global\a38c00f7f4b14ddba79d4ee9bd170700 /t 4680 /p 2424
      1⤵
        PID:2692
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2708
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:3356
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:5020
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:1132
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:3828
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:3468
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:4884
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:1432
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:2148
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:624
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4668
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:1228
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4740
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:3064
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:3980
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:2724
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:552
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:3444
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:4808
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:3016
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:3992
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:872
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:804
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:3016
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:1980

                                                      Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                              Filesize

                                                              471B

                                                              MD5

                                                              0085711bef17acad9eacf0bbf9bf3906

                                                              SHA1

                                                              20041eb81473c406da0ebfd7717231c0852ba344

                                                              SHA256

                                                              98c31705ae2dbde79cc8916db28c40c875597004ae24d94ac42433e0989d70a1

                                                              SHA512

                                                              3354239703701d843124bc466fd9794dd65ed766e4a1df64f784250292be3f24239a9e7156738d07a1c12316952cc1ee71ae9feba9b8fdbfb545e273ae871a6e

                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                              Filesize

                                                              412B

                                                              MD5

                                                              434e3cb9c6e38d7f87db125dbe062630

                                                              SHA1

                                                              f82af31116c1cb46bf4de0ec7da52bd648e23eea

                                                              SHA256

                                                              ea023fb2d59875c2e0790e6eb88157f35057f833fa8f6846c19a3e1b67a86837

                                                              SHA512

                                                              4203e6c46c37071db7f2b3bbd5a3d73ab2dd67f74eae3ea1529ff1c5da36a412ea77ffc882805e25f4257b9f294a701e040cd6340956258e7bff370ed8f34d9f

                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QVHQQQV3\microsoft.windows[1].xml

                                                              Filesize

                                                              97B

                                                              MD5

                                                              e403893cb1eff096a3a681a4e18bfc57

                                                              SHA1

                                                              2b77a9b05a98def1630f2d224077297c5aa719bc

                                                              SHA256

                                                              5a67e1471e50d3e01653afe33268399829528a3d7c0e41dcd2d1e0c66670d066

                                                              SHA512

                                                              c8da1987035c0ee26cf94ecac9436d2e4abe7a512471231666e7e1e25b48b9aa033ad4a68075e7f4a83c9a5229718906a15dec6a15c57d39a7e6d3bd99ecd564

                                                            • memory/552-115-0x000002D710B60000-0x000002D710B80000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/552-108-0x000002D710790000-0x000002D7107B0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/552-111-0x000002D710750000-0x000002D710770000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/552-118-0x000002D720F10000-0x000002D720F30000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/804-149-0x00000228B34A0000-0x00000228B34C0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/804-152-0x00000228B3460000-0x00000228B3480000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/804-154-0x00000228B3A80000-0x00000228B3AA0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/1228-80-0x0000000003600000-0x0000000003601000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/2924-10-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3016-127-0x000002729DB80000-0x000002729DBA0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3016-132-0x000002729DF50000-0x000002729DF70000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3016-130-0x000002729DB40000-0x000002729DB60000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3064-94-0x00000189ADC50000-0x00000189ADC70000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3064-92-0x00000189AD840000-0x00000189AD860000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3064-88-0x00000189AD880000-0x00000189AD8A0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3356-43-0x00000145BC960000-0x00000145BC980000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3356-45-0x00000145BCF80000-0x00000145BCFA0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3356-41-0x00000145BC9A0000-0x00000145BC9C0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/3444-120-0x0000000004C60000-0x0000000004C61000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3828-57-0x0000000004B10000-0x0000000004B11000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3872-34-0x00000000049B0000-0x00000000049B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3980-100-0x0000000003020000-0x0000000003021000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3992-141-0x0000000004710000-0x0000000004711000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/4812-23-0x000002255B030000-0x000002255B050000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/4812-20-0x000002255AB90000-0x000002255ABB0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/4812-17-0x000002255ABD0000-0x000002255ABF0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/4884-70-0x0000026973F10000-0x0000026973F30000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/4884-65-0x00000269738B0000-0x00000269738D0000-memory.dmp

                                                              Filesize

                                                              128KB

                                                            • memory/4884-67-0x0000026973870000-0x0000026973890000-memory.dmp

                                                              Filesize

                                                              128KB