Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/02/2024, 14:42

240203-r28etsbgh3 6

03/02/2024, 14:38

240203-rz33bsbgd2 6

Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 14:38

General

  • Target

    ggpermV3.exe

  • Size

    62KB

  • MD5

    eac37455baace3357722d2bc5cf40be9

  • SHA1

    bfbb2b0f876a0784e5a0d78b7981b27254c0a766

  • SHA256

    e333b29fa06d2138c9a4c634fde1fe4212bd2a027c0175008001c8af60d34053

  • SHA512

    78065623e0bafa450e49c91b700da3a31536033d005a6d20126cc886bc1075788a4e5d5f7b689b47c4eea01f58f797e696f06038dd967b6143d07204048ad067

  • SSDEEP

    1536:eh4f8xsBb7KAMFYieXfRc/onjx6FXs+ceAP5w:bBbnRJfROqwFcZbP5w

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ggpermV3.exe
    "C:\Users\Admin\AppData\Local\Temp\ggpermV3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 668
      2⤵
      • Program crash
      PID:2216
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2740
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:2752
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
        2⤵
        • Modifies data under HKEY_USERS
        PID:2784
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
        2⤵
        • Suspicious use of SetWindowsHookEx
        PID:2352
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
        2⤵
          PID:2100
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef1a79758,0x7fef1a79768,0x7fef1a79778
          2⤵
            PID:1860
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:2
            2⤵
              PID:1900
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
              2⤵
                PID:1136
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                2⤵
                  PID:872
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:1
                  2⤵
                    PID:2464
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2140 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:1
                    2⤵
                      PID:2584
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1304 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:2
                      2⤵
                        PID:2744
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2440 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:1
                        2⤵
                          PID:3016
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                          2⤵
                            PID:112
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3552 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                            2⤵
                              PID:1928
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                              2⤵
                                PID:1556
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2000 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:1
                                2⤵
                                  PID:2804
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2436 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                                  2⤵
                                    PID:2096
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:8
                                    2⤵
                                      PID:1844
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2724 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:1
                                      2⤵
                                        PID:756
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:2484

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

                                        Filesize

                                        1024KB

                                        MD5

                                        e301292b79c0a03de647eea2350b68ce

                                        SHA1

                                        eefb064cf5e6a3b05b32fe308f681a5d504ebcaf

                                        SHA256

                                        d80b83dbe79107849a30c6140885c095592ecde7e48a4140d44fc20930ba489f

                                        SHA512

                                        a1b574c0f87c96aa1b13366fcbe049564b57569f7a090d632538f02235ade13923e048c0de14ee756d14093504f21145da5855e310b9ac7dafae06897b3e37db

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        65KB

                                        MD5

                                        ac05d27423a85adc1622c714f2cb6184

                                        SHA1

                                        b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                        SHA256

                                        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                        SHA512

                                        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                        Filesize

                                        1KB

                                        MD5

                                        a266bb7dcc38a562631361bbf61dd11b

                                        SHA1

                                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                                        SHA256

                                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                        SHA512

                                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        49ec491a268cc4c5d0ddbb48ce2f1569

                                        SHA1

                                        feb1f4835978d6fb3642e94f44cb45cea5fada49

                                        SHA256

                                        d84842781e2ae3f4eda75f22b43655b68ce69e589fba398d4230b178c71acdd0

                                        SHA512

                                        fcd7a6309e714837fdd292acbfda09c7abe147e25b0433819848ca13ff9d29a467e07a839e34228e954ef7a006377c698d42f54ced82a46ef24f78041f91797f

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                        Filesize

                                        344B

                                        MD5

                                        c8b6f0706df4f0628c664c2226499a35

                                        SHA1

                                        76fe3867475f01bd4bd25908e8f8820125be3a39

                                        SHA256

                                        e4da9d937413cefbbf0741e4e6eacc23bbc1dc97424a24ce63e8c4116e2e217f

                                        SHA512

                                        3e1dd46ac57560fe936bbcb55b0c52acf9e92f8ba9eabc42a8a1f6665c3431f34d846a403340e92a17e4ec1e9e59fcb35257119e17dff209d449175176c4e80a

                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                        Filesize

                                        242B

                                        MD5

                                        d2555d184bc86645bd5ac60a9b56da9c

                                        SHA1

                                        02d8f74c7e76cb148160ee05717e26b4df6421ca

                                        SHA256

                                        07b5ee1fa9a9825afe2279c77d7e55e839a725388d08be0d22eb63405a7a8164

                                        SHA512

                                        eb6ea372d86f956fcf61fe97b786d36a85679140274b558a2476d6fae5777006c82877b777e8cb2dd427af5ac68af71e9b893adaeb18ec692bba85ff677e8984

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        aefd77f47fb84fae5ea194496b44c67a

                                        SHA1

                                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                        SHA256

                                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                        SHA512

                                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        111B

                                        MD5

                                        285252a2f6327d41eab203dc2f402c67

                                        SHA1

                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                        SHA256

                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                        SHA512

                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        526B

                                        MD5

                                        0b5ee65c9a31ea75272582a933a9abc1

                                        SHA1

                                        3880d8364724b845c5cf88b0db3ddb0cb64c008f

                                        SHA256

                                        843f626cd6786e377981e6ccf27f615a2643c813ba3311136dda78b211c84e0c

                                        SHA512

                                        3f1a2242dd31b8a877344a39c4c95123b75986a6c102397b7a365e87e0be33b7354a276f0eaa6a2a34bf94628d566e637419921ceca8fff70ef564603a3791c9

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        54890443420c0df08c28f0a48c7f623b

                                        SHA1

                                        281fd8ac91e58a78ad452e3c82950b638ea53ab6

                                        SHA256

                                        500e6920cf25afdd5deea71788a0ac826619b09caefff0d4fc8e05a6924290e9

                                        SHA512

                                        1d848368c515afaa5afec83b96ff5760c557eeb04c2168a4a7a173b0b9774eaf5e5b2217ff434925c7350fef76d5626deb6f82fda29b131797c623be991628ff

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        b74b9249a37cf84f8d2e743b0e088521

                                        SHA1

                                        b47c065cf5054f6864ee7e7320188a6f889c2713

                                        SHA256

                                        b61b17a7ab1b2e5450a08964514d996cc2669f55fc52d3788020393776021c55

                                        SHA512

                                        9deca6da178bb1d43315ba3c15f25f373b6d9ede8796341c58362d516f9e0c9ccf1651412600fd3e4e955173b330d46510c1ec09a92a3d1eb35ed16bc3b37d32

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                        Filesize

                                        16B

                                        MD5

                                        18e723571b00fb1694a3bad6c78e4054

                                        SHA1

                                        afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                        SHA256

                                        8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                        SHA512

                                        43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                      • C:\Users\Admin\AppData\Local\Temp\TarA9DB.tmp

                                        Filesize

                                        171KB

                                        MD5

                                        9c0c641c06238516f27941aa1166d427

                                        SHA1

                                        64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                        SHA256

                                        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                        SHA512

                                        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                      • memory/2372-0-0x0000000000880000-0x0000000000896000-memory.dmp

                                        Filesize

                                        88KB

                                      • memory/2372-3-0x00000000742F0000-0x00000000749DE000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2372-2-0x0000000004A80000-0x0000000004AC0000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/2372-1-0x00000000742F0000-0x00000000749DE000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2456-55-0x0000000002EC0000-0x0000000002EC8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-208-0x0000000001220000-0x0000000001221000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2456-4-0x0000000001A10000-0x0000000001A20000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2456-20-0x0000000001B10000-0x0000000001B20000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2456-129-0x0000000003860000-0x0000000003868000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-88-0x0000000003830000-0x0000000003838000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-197-0x0000000003920000-0x0000000003928000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-82-0x0000000003820000-0x0000000003821000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2456-207-0x0000000001240000-0x0000000001248000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-130-0x0000000003850000-0x0000000003851000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2456-43-0x0000000002EC0000-0x0000000002EC8000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-49-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2456-72-0x0000000003650000-0x0000000003658000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-66-0x0000000002F20000-0x0000000002F28000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/2456-57-0x0000000002E70000-0x0000000002E71000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2784-75-0x000007FEF2950000-0x000007FEF2A93000-memory.dmp

                                        Filesize

                                        1.3MB

                                      • memory/2784-76-0x000007FF212D0000-0x000007FF212DA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2784-133-0x000007FF212D0000-0x000007FF212DA000-memory.dmp

                                        Filesize

                                        40KB

                                      • memory/2784-132-0x000007FEF2950000-0x000007FEF2A93000-memory.dmp

                                        Filesize

                                        1.3MB