Analysis

  • max time kernel
    89s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 18:18

General

  • Target

    6fcdb2325aa8f698b6fc0488b5d56e91d9d19c3b62f6219b96aad1a5573f1b01.exe

  • Size

    3.4MB

  • MD5

    10611bb37d89f23e24dfbb199d5af770

  • SHA1

    6f1926727d896065eace1dfda22a4e5fe934f78b

  • SHA256

    6fcdb2325aa8f698b6fc0488b5d56e91d9d19c3b62f6219b96aad1a5573f1b01

  • SHA512

    147115a4faee60dfa0b9b392bcd6a1cc2c64a7dd17c5bf86f50112138cb3be99de40628e857092763e3f6e22159944baf97e74793d0223eafd7147da4d52ec8b

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlPkRfj2zt5zuAZb4rF1UGw/9IgrmLP+0V:c+8X9G3vP3AMdkR7oPzuAheFeM5Pn

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Enumerates connected drives 3 TTPs 14 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fcdb2325aa8f698b6fc0488b5d56e91d9d19c3b62f6219b96aad1a5573f1b01.exe
    "C:\Users\Admin\AppData\Local\Temp\6fcdb2325aa8f698b6fc0488b5d56e91d9d19c3b62f6219b96aad1a5573f1b01.exe"
    1⤵
      PID:3936
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2916
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3032
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2976
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3436
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:736
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3432
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4952
    • C:\Windows\system32\werfault.exe
      werfault.exe /hc /shared Global\22eab631e19742269d6d41005c74892f /t 212 /p 4104
      1⤵
        PID:468
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3300
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:3740
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4108
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:3264
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3528
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1380
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4060
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3956
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:4696
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:3876
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3484
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:2704
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3444
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:4568
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:4924
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:1292
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3772
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:1524
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:3396
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:4656
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:3044
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:3608
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:4444
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:4108
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:2704
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:2916

                                        Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                Filesize

                                                471B

                                                MD5

                                                56f8fa6aa59f3ee1aa24361d930a52d4

                                                SHA1

                                                2b43132dcfbedcd28adb4e03c2c90290f81816b8

                                                SHA256

                                                066a23f715a61c55ba3c4cae2e214a473fa4c3cf3a4bf963f323c62bba98e0d2

                                                SHA512

                                                46312236d22521e8e7d96ba38f411420a6e231d029a09bcfe57154fe670526ea36159572cca9c8fd2b43c7b2948e3a05b09f3fc98a5734079dfd7bc2db5ec15a

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                Filesize

                                                412B

                                                MD5

                                                46a3c8ee89ee6c56db20f722c0e2e860

                                                SHA1

                                                80543bcd588fddba5869362d3c7708ba0f5600fe

                                                SHA256

                                                7b36865943986e5596269f6d18ae7502aa28079702c4855f0bbf31565628902d

                                                SHA512

                                                ba3aab5b881cf0121e2a1c8591aab366701b6a67b47a432952ace52daca97106ef8553731df11e8b1bfba593b8a6ab3da81c0af98e1f703cef76a67b710d49fa

                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133392360043310004.txt

                                                Filesize

                                                75KB

                                                MD5

                                                62d81c2e1e8b21733f95af2a596e4b18

                                                SHA1

                                                91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                SHA256

                                                a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                SHA512

                                                c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133416947901513856.txt

                                                Filesize

                                                75KB

                                                MD5

                                                62d81c2e1e8b21733f95af2a596e4b18

                                                SHA1

                                                91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                SHA256

                                                a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                SHA512

                                                c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ANTV7B43\microsoft.windows[1].xml

                                                Filesize

                                                96B

                                                MD5

                                                4114b63fafc98d9307dc8bfae1c379cd

                                                SHA1

                                                8959adf99facaf14c6be813470286c448b0e0b44

                                                SHA256

                                                f93f1cffd4688bc4cd9e3dfb2ee84a1f53f40d966cab8542c5863906faaf197f

                                                SHA512

                                                51eb95339b914b6674922ad2635a193ae1fb1d008c35f03cc8664c46e4f124389a884d7854268c90ac7883102f9a98483e0019a269070b7d6a96fcc70c937723

                                              • memory/736-42-0x0000018D84580000-0x0000018D845A0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/736-39-0x0000018D83EA0000-0x0000018D83EC0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/736-35-0x0000018D83EE0000-0x0000018D83F00000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/1380-60-0x000001AEC03B0000-0x000001AEC03D0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/1380-64-0x000001AEC0780000-0x000001AEC07A0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/1380-62-0x000001AEC0370000-0x000001AEC0390000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/1524-145-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2704-100-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2916-198-0x00000241EADC0000-0x00000241EADE0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/2916-193-0x00000241EAE00000-0x00000241EAE20000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/2916-200-0x00000241EB1D0000-0x00000241EB1F0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/2916-203-0x00000241EB190000-0x00000241EB1B0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3044-166-0x0000000004190000-0x0000000004191000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3264-53-0x0000000004780000-0x0000000004781000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3484-88-0x000001F4D9430000-0x000001F4D9450000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3484-86-0x000001F4D8F90000-0x000001F4D8FB0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3484-84-0x000001F4D8FD0000-0x000001F4D8FF0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3772-134-0x0000017944150000-0x0000017944170000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3772-136-0x0000017944560000-0x0000017944580000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/3772-130-0x0000017944190000-0x00000179441B0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4108-186-0x0000000003E90000-0x0000000003E91000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4444-173-0x0000017559690000-0x00000175596B0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4444-179-0x0000017559AE0000-0x0000017559B00000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4444-176-0x0000017559640000-0x0000017559660000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4568-109-0x000001F69F8C0000-0x000001F69F8E0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4568-112-0x000001F69FEE0000-0x000001F69FF00000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4568-107-0x000001F69F900000-0x000001F69F920000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4656-158-0x00000268C56C0000-0x00000268C56E0000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4656-156-0x00000268C5200000-0x00000268C5220000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4656-153-0x00000268C5240000-0x00000268C5260000-memory.dmp

                                                Filesize

                                                128KB

                                              • memory/4696-76-0x0000000004420000-0x0000000004421000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4924-123-0x0000000004580000-0x0000000004581000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4952-28-0x0000000004550000-0x0000000004551000-memory.dmp

                                                Filesize

                                                4KB