Analysis

  • max time kernel
    88s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2023, 11:00

General

  • Target

    0051eb54e0f89f291730231edc2a7494f867ed1ac73bc8878a4cedadcf888ec3.exe

  • Size

    3.2MB

  • MD5

    7273321af5172d76f3f2e31fa337e220

  • SHA1

    fcf3a62880379fc7e8509d5a0db3f431a4651fe3

  • SHA256

    0051eb54e0f89f291730231edc2a7494f867ed1ac73bc8878a4cedadcf888ec3

  • SHA512

    6202097222750dd6e8aa84f333280daf6fc2c56092c401bb7ab4e3928b783fc831142923d800d9abe40cc64bddca62f1ee504a612942303dd6aef230284a10e7

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlnF+/4xOpOqZq1UHF0yLzpNKg4jmwTkG4:Q+8X9G3vP3AMi/4xOkRs0y5Ig4jUV

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 9 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0051eb54e0f89f291730231edc2a7494f867ed1ac73bc8878a4cedadcf888ec3.exe
    "C:\Users\Admin\AppData\Local\Temp\0051eb54e0f89f291730231edc2a7494f867ed1ac73bc8878a4cedadcf888ec3.exe"
    1⤵
      PID:1840
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1820
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4840
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1160
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3288
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2012
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:2728
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3784
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:4596
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4628
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2484
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:1404
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4376
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:4700
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3704
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4400
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:436
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3644
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      PID:1916
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:4100
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3388
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1068
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:1764
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:4784
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:2468
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:4356
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:2084
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:656
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:4076
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:4728
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:1272
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:4316
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:656
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:4128
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:2300
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:2836

                              Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                      Filesize

                                      471B

                                      MD5

                                      d46dc26bcc4435a635020a7d4c4bf0a7

                                      SHA1

                                      bef86b12967f0423f8fd06d1f94d8331b290594c

                                      SHA256

                                      98f64514ccece5ace0c6a26fbf6477a7393135ee6e2ee2593944e7cb795ff4a3

                                      SHA512

                                      bc2d592b71eecfb59f7a5d0df259cc2b4f8006c9b33e4929aafa0d9145eefaed0718bffdd7a185e2e5109333eb1daa95f82f48a46d4ed009d4b2cb0a5dab3f97

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                      Filesize

                                      412B

                                      MD5

                                      53aa2613c8f646572422bbf1e07eb03a

                                      SHA1

                                      f9bb759db3d19cfd7cc8f7426f6da57db39b8474

                                      SHA256

                                      d63470aedc439d03322ec1cf415bca8b0954d7488f23512cbfc22a8ec7345e53

                                      SHA512

                                      fb111fd9337ad4062142e7e695d55ee50bf554b902e1976242d51f8fa0d473f05500ec50504ec073ac6585192f4bba42b944ff7a67efe8bf8241710cc55f603c

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                      Filesize

                                      2KB

                                      MD5

                                      5aed7ae5f9520a8b3d9c7531dd021bd0

                                      SHA1

                                      4ba823a2a460dc671274521f44eea300bca0ad52

                                      SHA256

                                      98d37761fd80ac18999dbdf27c27bcfb492e7b8fa718de36311e635035185806

                                      SHA512

                                      d924cd437620e68e0d840accdb7b114c4c3b9d7089bed9b13a01240dbebdb89df27c79bbe47ea886216cbb08ba19143e027ee765360ef1b3e137c9b24f175147

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133435693932314112.txt

                                      Filesize

                                      74KB

                                      MD5

                                      858607c91d7e8bd081cde8374c322ca2

                                      SHA1

                                      c999d4818f64d30ca2de163674eb48000841ee3c

                                      SHA256

                                      f4d36020e28833a6cc7002c0dad1089637cbeaa65c7e7c0e64561c50d0832dfb

                                      SHA512

                                      c42187298415c8168378b8f164dbcce7c752b1f58219dbea02619021da5bb270b2d784d3d8bf3e26aae2ace8b77cece9a91d4faa9c08d71b605a3706bc55fbb4

                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133435693932314112.txt

                                      Filesize

                                      74KB

                                      MD5

                                      858607c91d7e8bd081cde8374c322ca2

                                      SHA1

                                      c999d4818f64d30ca2de163674eb48000841ee3c

                                      SHA256

                                      f4d36020e28833a6cc7002c0dad1089637cbeaa65c7e7c0e64561c50d0832dfb

                                      SHA512

                                      c42187298415c8168378b8f164dbcce7c752b1f58219dbea02619021da5bb270b2d784d3d8bf3e26aae2ace8b77cece9a91d4faa9c08d71b605a3706bc55fbb4

                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                      Filesize

                                      97B

                                      MD5

                                      8d6e57645a3894c78fedfd96931fb799

                                      SHA1

                                      8fa46e487e762948f191626bc0e39bdf52b4a367

                                      SHA256

                                      9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                      SHA512

                                      14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                    • memory/436-80-0x00000000041A0000-0x00000000041A1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/656-114-0x00000000041B0000-0x00000000041B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1068-92-0x0000026266B40000-0x0000026266B60000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1068-98-0x0000026266F10000-0x0000026266F30000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1068-95-0x0000026266B00000-0x0000026266B20000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/1160-7-0x00000000049F0000-0x00000000049F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1916-81-0x00000259BF250000-0x00000259BF29B000-memory.dmp

                                      Filesize

                                      300KB

                                    • memory/2012-14-0x000001E4D4A10000-0x000001E4D4A30000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2012-17-0x000001E4D49D0000-0x000001E4D49F0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2012-20-0x000001E4D4DE0000-0x000001E4D4E00000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2468-139-0x00000223A7520000-0x00000223A7540000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2468-132-0x00000223A7160000-0x00000223A7180000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2468-136-0x00000223A7120000-0x00000223A7140000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2484-40-0x00000210B0470000-0x00000210B0490000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2484-38-0x00000210B04B0000-0x00000210B04D0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/2484-42-0x00000210B0A80000-0x00000210B0AA0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4100-84-0x0000000004480000-0x0000000004481000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4316-156-0x0000028691300000-0x0000028691320000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4316-159-0x00000286912C0000-0x00000286912E0000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4316-163-0x00000286918E0000-0x0000028691900000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4400-71-0x0000015780240000-0x0000015780260000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4400-67-0x0000015FFFE20000-0x0000015FFFE40000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4400-64-0x0000015FFFE60000-0x0000015FFFE80000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4596-31-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4700-57-0x0000000000B60000-0x0000000000B61000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4728-148-0x0000000004DF0000-0x0000000004DF1000-memory.dmp

                                      Filesize

                                      4KB