Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    23s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/02/2024, 15:13

General

  • Target

    AnyDesk (1).exe

  • Size

    5.0MB

  • MD5

    a21768190f3b9feae33aaef660cb7a83

  • SHA1

    24780657328783ef50ae0964b23288e68841a421

  • SHA256

    55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047

  • SHA512

    ca6da822072cb0d3797221e578780b19c8953e4207729a002a64a00ced134059c0ed21b02572c43924e4ba3930c0e88cd2cdb309259e3d0dcfb0c282f1832d62

  • SSDEEP

    98304:NzTZ3cINQscs0m++LNkT6OpwDGUUH57yvZ/49Mr8EO3QhA9Kq:Nzt3cINQscNmvLCwDkHEvZ/4R79x

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe
    "C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe
      "C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe" --local-service
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe
      "C:\Users\Admin\AppData\Local\Temp\AnyDesk (1).exe" --local-control
      2⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1816
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6d59758,0x7fef6d59768,0x7fef6d59778
      2⤵
        PID:2452
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:2
        2⤵
          PID:2768
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:8
          2⤵
            PID:2720
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:8
            2⤵
              PID:1860
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
              2⤵
                PID:2300
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                2⤵
                  PID:2384
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1264 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:2
                  2⤵
                    PID:2692
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2872 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                    2⤵
                      PID:1624
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2752 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:8
                      2⤵
                        PID:2344
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3100 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                        2⤵
                          PID:2100
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4028 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                          2⤵
                            PID:2240
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3396 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                            2⤵
                              PID:1280
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=828 --field-trial-handle=1252,i,15362477168738658951,2677938216835250921,131072 /prefetch:1
                              2⤵
                                PID:2684
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:2336

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                Filesize

                                65KB

                                MD5

                                ac05d27423a85adc1622c714f2cb6184

                                SHA1

                                b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                SHA256

                                c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                SHA512

                                6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                Filesize

                                1KB

                                MD5

                                a266bb7dcc38a562631361bbf61dd11b

                                SHA1

                                3b1efd3a66ea28b16697394703a72ca340a05bd5

                                SHA256

                                df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                SHA512

                                0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                579d39697ec8dc392bf915d469ab3d88

                                SHA1

                                70fff768a8e0cb9e3bcf7fbb321d564ab40c31e8

                                SHA256

                                6a791757da220d527e163847a7ddace06b351e9b4437c551c456d31dc4718161

                                SHA512

                                72ab6defd0f992f9140fc6679942e2ceb8cdcdd252a8efe1a9c3b2c04454ee98306625d65be3621b5afbd7a0b2a10b6c4185cb132829649c7f115daaf0de35a9

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                beec08b367caace524c04cf0a93109f8

                                SHA1

                                83f956559b62fcfc20f208212fc9770294de3b5d

                                SHA256

                                74c10476f9dea76eefbf35fe83fffcc38f17f59b68aec1bb5acf8694a40a91ba

                                SHA512

                                ec6c3f629cb9ace99a030f435d75422349e0ada3e450fe6fe58ce3c133d0f74c15be307e15fe99aa03e4c35211115edce57b15e278aa75ef05d27f9610906eb2

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                72be71ac3ad580f9eb4d0253a6bd4e32

                                SHA1

                                27288153d4fa34ad22989c2ddc8eb54c3ff4e533

                                SHA256

                                21418e8aea7f240467f0ad5fc667a14f27d085b5843f23e4c9e8cf6c1c73cacd

                                SHA512

                                dbabc140be844292ff4c919b09f026500005f0ae92598621972231648405f1a3c6eb2e366448196599853be0252dab479cba1b9ff77751b72e7faafec0a9aec5

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                24a10f6ee6815c87730020a0d732ea32

                                SHA1

                                04b3b655be3914bb0471b380cbb948e0d71e52af

                                SHA256

                                8f51accad7c35234705f98ab7fa351553c2017b08b17ccf67ef022f3464fa73e

                                SHA512

                                a2ee971c387bd9772ab7cec1b06558c1379a729a2b64313375b8262cebd2e63948ffc16b14a4d6a98859d41356ccd0615a1ba57a0b75ee97f83e54d61ad799fe

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                3abc1e8979e716129b30fa4f6f48de07

                                SHA1

                                93de303762aa96415b4cc123407dae3c4d3f866c

                                SHA256

                                a7355177b9c5d2828881c6207b91cc2327f206798a4cc221d4636d97989b67e6

                                SHA512

                                e94bbf39042adadf085adc2cd0efe6cc8289623037c2f2e35948eb1e6b057b686b9ca21157a81440519d179ecbb9a1b80ac6f9ea00b16a44c0420a04d3acc36c

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                Filesize

                                344B

                                MD5

                                96826df7f1e743ed0105b29dfefcc41b

                                SHA1

                                9c67142af3671041d7ff29372f98f628af183dc9

                                SHA256

                                1eaa8caff2435cc78b621c83b10d7d6685a4f00bcbc32a18da03f19fcab9ba3b

                                SHA512

                                25a7815748de70cd27213f4d28108bc46eb537f1516648a6112507bcc144bc9f7fd0242eea4db25e82e1eac5a220d106ec4d51efa4ab5743b1366f69b9d5bc43

                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                Filesize

                                242B

                                MD5

                                0879d90ff03843d19ab706247ac7608e

                                SHA1

                                63caf1133b4bb591b35d18a5745190ce58b93360

                                SHA256

                                0f17587d26e63e0676be4373d239a9adb731cbb0c6410e99c8d29298baa78c5c

                                SHA512

                                ff1c004ffd034c6b4f4e3a92afaf4c0977fb3300818742cd828dfb090edce08aa8b659328bb97c967a12095ee7adcbd25c0f899b0aaf181cafcb46923319f16f

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                Filesize

                                16B

                                MD5

                                aefd77f47fb84fae5ea194496b44c67a

                                SHA1

                                dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                SHA256

                                4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                SHA512

                                b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                Filesize

                                264KB

                                MD5

                                f50f89a0a91564d0b8a211f8921aa7de

                                SHA1

                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                SHA256

                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                SHA512

                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State~RFf77c8ac.TMP

                                Filesize

                                866B

                                MD5

                                1d4fc2506f1a5b2f868cd453b2df3c94

                                SHA1

                                036c65783b34311b4f84f847f200f9c572e86958

                                SHA256

                                0312c9fda6ffab3ceea42dd36f8412bd93f402b36e06de9b597d414344290743

                                SHA512

                                28cc6ad9553dbcac6337451c9e0a11074dea19f35d49e761c072fd5f9226c5912d46ebcd9aea97df6c165e41d2a7b91d1557420107007e2a82f3319cac2fa2f0

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                ddf74f0dedff8301e9fd4242ebfd89e4

                                SHA1

                                b28cbcad73436bd1af534263133e85553863383d

                                SHA256

                                9c5e5fe9ceda0771ed63eba3a005d1d3ec28a9e6a849d10528745b16b431ab0a

                                SHA512

                                4772985447d2c504e401e59a6e30dd2b0be639bedb84d1195ef6338fc4f8e98b00b669b49129c352950f832b833d9bdab1f802b0526846ca44b1563517dc8da9

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences~RFf7743c4.TMP

                                Filesize

                                5KB

                                MD5

                                ecbede29169a4ce656fe99dd432c9ae5

                                SHA1

                                7947ffe6fa64199a41a4028e5024329310196396

                                SHA256

                                81d48935b26cdfa5949645ee8bad1e47f66d1f6bf9f8d7b473c6e6bbdd548a5f

                                SHA512

                                3095b91112227cd9c5a0c117492879f6dc877508c1587323ab58e35434ed8b0467d3faf543dab1a319a551f61897cda8414ede8cba115cc1149913fd52976c36

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                Filesize

                                16B

                                MD5

                                18e723571b00fb1694a3bad6c78e4054

                                SHA1

                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                SHA256

                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                SHA512

                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                              • C:\Users\Admin\AppData\Local\Temp\Tar982F.tmp

                                Filesize

                                171KB

                                MD5

                                9c0c641c06238516f27941aa1166d427

                                SHA1

                                64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                SHA256

                                4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                SHA512

                                936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                              • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

                                Filesize

                                4KB

                                MD5

                                9dc3382cf32481ca4bb55bc19836f398

                                SHA1

                                10bb116f4509c39c33cff65df72cb2cdaec7620a

                                SHA256

                                ff5549235ba6d8df769168a2556ec4664ea68960c9fecf2739196b872e465659

                                SHA512

                                05aa9c9a2a4a36cd0c1c2197d785813bcc6d42cadf6aec28adac981f45e4338e78589cede6b134e868391147b5b90195ce628064beda0821ea61caaa90d9d41b

                              • C:\Users\Admin\AppData\Roaming\AnyDesk\ad.trace

                                Filesize

                                9KB

                                MD5

                                6bf7ffd93193b90b3de74bfdf0f70fae

                                SHA1

                                629cbb3dea293daeac57c9529b3ac288b63dfe1d

                                SHA256

                                6f3d2bd75600e392d5819b67e8e5ce6797651bc7d840aac66022fea7536a6e96

                                SHA512

                                7ebddc608dfa617c949f1ad374f78f039d60bd89561a50ee8a8b0c3ae956a8a77f61bbf1708d2ff0c0d2c277705bf38654d5b7cf3c2e1488c1028ed9b4ba74d6

                              • C:\Users\Admin\AppData\Roaming\AnyDesk\system.conf

                                Filesize

                                424B

                                MD5

                                79dd517ca79671a2052d2947c7e4dc35

                                SHA1

                                cd33deda2f82aea2773c61768e51be496c48ad78

                                SHA256

                                27309a38d86f9c6b2083294d88a19965028741013a14791f5dd9b8f6384a597e

                                SHA512

                                fd8f21df3617821842b843cd9529e1e7f07c65aecbb5ad18c7849d97a84e21d4a0cac09a0b966437f74a06f449f17924d18e4834cd8dcab93a171a24ef4f2095

                              • C:\Users\Admin\AppData\Roaming\AnyDesk\user.conf

                                Filesize

                                1KB

                                MD5

                                45cbba04ef0e05b1b0b96042a1e25dad

                                SHA1

                                4421032042777dceb8cb9c3ebd522e0f68ded881

                                SHA256

                                211fe4cf517824be3fde8e4a56734f68238954e16a3729a0b066149650d5ce09

                                SHA512

                                5f983630f95014a383f0fac11f8195d9415d470689e93945c59c9386ff6d0f3a69511804a0169e5249dd21d7a588a9cedc567f201d13deadc3593003cc5b16ad

                              • memory/1816-101-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/1816-43-0x0000000000140000-0x0000000000141000-memory.dmp

                                Filesize

                                4KB

                              • memory/1816-14-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/2712-32-0x00000000001B0000-0x00000000001B1000-memory.dmp

                                Filesize

                                4KB

                              • memory/2712-100-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/2712-11-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/3036-41-0x0000000004220000-0x0000000004221000-memory.dmp

                                Filesize

                                4KB

                              • memory/3036-1-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/3036-48-0x0000000004210000-0x0000000004211000-memory.dmp

                                Filesize

                                4KB

                              • memory/3036-49-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB

                              • memory/3036-4-0x0000000000150000-0x0000000000151000-memory.dmp

                                Filesize

                                4KB

                              • memory/3036-0-0x0000000000B20000-0x0000000002257000-memory.dmp

                                Filesize

                                23.2MB