Analysis

  • max time kernel
    90s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2023 14:12

General

  • Target

    NEAS.1140c465482d7a7bd48449d91d47ffa0.exe

  • Size

    2.7MB

  • MD5

    1140c465482d7a7bd48449d91d47ffa0

  • SHA1

    0ee05901149f8cd41450397cdbee9e3656c4a063

  • SHA256

    347bc5d216ba87a4a2958bc786e5b75d35b0f7334279be80976262c18f1cc1b1

  • SHA512

    163107f6150f1568803b5f75bb7d57e9f35a66314ef6264d43e98a702f0cf1c1536144b861347dcea180b08184f508cde3fd227d662f6a0bd97f3a0bfa3a9b88

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTliCVnl0tuKIZVC:c+8X9G3vP3AMDCYfC

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 6 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 56 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.1140c465482d7a7bd48449d91d47ffa0.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.1140c465482d7a7bd48449d91d47ffa0.exe"
    1⤵
      PID:3220
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2576
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1088
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4552
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5084
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3172
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:4532
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:2516
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3076
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:2872
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3136
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:880
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1108
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:1628
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:1944
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4996
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                          • Modifies Installed Components in the registry
                          • Enumerates connected drives
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:4532
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:4060
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:1660
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:2348
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:5096
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:748
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:3704
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:2160
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:3400
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4704
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:5052
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:4156
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:1660
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:3704
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:2100

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                      Filesize

                                                      471B

                                                      MD5

                                                      d46dc26bcc4435a635020a7d4c4bf0a7

                                                      SHA1

                                                      bef86b12967f0423f8fd06d1f94d8331b290594c

                                                      SHA256

                                                      98f64514ccece5ace0c6a26fbf6477a7393135ee6e2ee2593944e7cb795ff4a3

                                                      SHA512

                                                      bc2d592b71eecfb59f7a5d0df259cc2b4f8006c9b33e4929aafa0d9145eefaed0718bffdd7a185e2e5109333eb1daa95f82f48a46d4ed009d4b2cb0a5dab3f97

                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                      Filesize

                                                      412B

                                                      MD5

                                                      aeb4d7eb0bedb82bed75aacb303f7c8f

                                                      SHA1

                                                      81d2d1738d25a7d4b104908574b97755337df52a

                                                      SHA256

                                                      7cedbab3d662bd49f115c490716b7822fbb51dc8b890888df462deef7ebd6228

                                                      SHA512

                                                      fe775c91c1643b62b7afe076c4331a008b3fdd2ce548427bd85b84f29b140e81803f211da64142723f4d6d36f045c0a97358ace815a0395d8f8f1c9fe14a4464

                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      a0560780af69da39ecedbb7fd0e53a92

                                                      SHA1

                                                      c5275172f322db91bce26ec80a7b0d62703912f2

                                                      SHA256

                                                      520dc428496b80eaa9f4835b41a2856dce1d54094b62e49ba30ed4abb3a3dac2

                                                      SHA512

                                                      e16f6bc65bcb3d928d20e2bacd62ac774c5cc2fcf9032480c87af0ee20b100c27711e8a58a55ff1290c95bf9f14b6387f2e307c6378adc1b4cd343be67324908

                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133435808018913894.txt

                                                      Filesize

                                                      74KB

                                                      MD5

                                                      0770cd8fe6784708d08860d93a5cb762

                                                      SHA1

                                                      ec3a74a70a55ac4e73f6ccaf01a7f4b86ca45cf8

                                                      SHA256

                                                      77c4ad43697c8de81a391a842311a1331fb37da159dcfe94eaa23e193479b1c2

                                                      SHA512

                                                      40c0c9f1e3a29320f68248439afe28ab00eef45b3dfbb9a3cc743a2f83374e6c2e8f36c57131a2c1b840c9f99b6c58b29f40ed453b03cd16607745fedae8e511

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\DENP3826\microsoft.windows[1].xml

                                                      Filesize

                                                      96B

                                                      MD5

                                                      da2f6534a0b18d822eafa495c037a7f4

                                                      SHA1

                                                      9a5ee14946c817ab6739bed1e22b2b5cfe742802

                                                      SHA256

                                                      e7b5b9346d1dd05e69644850e324798c30355e495e094d019973c444b6ae00a5

                                                      SHA512

                                                      d956be2de58592438cbee1b996472bea59b58245861ec4d6bbf5318efd33716047406883aefd7c4f61fe0fd23caa09d0e6efaf8abb26e982bf3f47a3073d94d3

                                                    • memory/880-61-0x00000000047A0000-0x00000000047A1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1628-71-0x00000288C00C0000-0x00000288C00E0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1628-69-0x00000288C0100000-0x00000288C0120000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1628-73-0x00000288C06E0000-0x00000288C0700000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/1660-173-0x0000000002CB0000-0x0000000002CB1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/1944-82-0x0000000003170000-0x0000000003171000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/2100-186-0x0000023835380000-0x00000238353A0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2100-180-0x0000023834D10000-0x0000023834D30000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2100-183-0x0000023834CB0000-0x0000023834CD0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2348-115-0x00000229E0D70000-0x00000229E0D90000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2348-117-0x00000229E11B0000-0x00000229E11D0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/2348-113-0x00000229E0DB0000-0x00000229E0DD0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3076-45-0x0000017061260000-0x0000017061280000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3076-52-0x0000017061630000-0x0000017061650000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3076-47-0x0000017061220000-0x0000017061240000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3704-141-0x000002269C060000-0x000002269C080000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3704-136-0x000002269BA90000-0x000002269BAB0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/3704-139-0x000002269BA50000-0x000002269BA70000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4060-105-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4156-160-0x0000023A49760000-0x0000023A49780000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4156-163-0x0000023A49720000-0x0000023A49740000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4156-165-0x0000023A49B30000-0x0000023A49B50000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4532-95-0x000002960A500000-0x000002960A520000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4532-92-0x0000029609EE0000-0x0000029609F00000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4532-89-0x0000029609F20000-0x0000029609F40000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4532-37-0x00000000041B0000-0x00000000041B1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/4552-10-0x0000023C698A0000-0x0000023C698C0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4552-23-0x0000023C7A8C0000-0x0000023C7A9C0000-memory.dmp

                                                      Filesize

                                                      1024KB

                                                    • memory/4552-17-0x0000023C69E80000-0x0000023C69EA0000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4552-14-0x0000023C69860000-0x0000023C69880000-memory.dmp

                                                      Filesize

                                                      128KB

                                                    • memory/4704-153-0x00000000046C0000-0x00000000046C1000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/5096-129-0x0000000004780000-0x0000000004781000-memory.dmp

                                                      Filesize

                                                      4KB