Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    207s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 20:00

General

  • Target

    https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://media.discordapp.net/attachments/1152058724123422741/1212485299599573084/Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4?ex=65f201ee&is=65df8cee&hm=e46eef82df37ebbe9559103c0a996b2383e607cdc34cdf0de1f0c3b7adcf2004&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ba746f8,0x7ffd3ba74708,0x7ffd3ba74718
      2⤵
        PID:4892
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:3
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3216
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:3888
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:8
          2⤵
            PID:4732
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:4996
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:4856
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                2⤵
                  PID:4636
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1820
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                  2⤵
                    PID:4264
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5124 /prefetch:8
                    2⤵
                      PID:3792
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4716
                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4"
                      2⤵
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: GetForegroundWindowSpam
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:712
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:1
                      2⤵
                        PID:432
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                        2⤵
                          PID:1252
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6548 /prefetch:1
                          2⤵
                            PID:2588
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15678298169251374677,12006066191169913167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:1
                            2⤵
                              PID:4864
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4176
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4976
                              • C:\Windows\system32\AUDIODG.EXE
                                C:\Windows\system32\AUDIODG.EXE 0x38c 0x33c
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:888

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                f35bb0615bb9816f562b83304e456294

                                SHA1

                                1049e2bd3e1bbb4cea572467d7c4a96648659cb4

                                SHA256

                                05e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71

                                SHA512

                                db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                1eb86108cb8f5a956fdf48efbd5d06fe

                                SHA1

                                7b2b299f753798e4891df2d9cbf30f94b39ef924

                                SHA256

                                1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

                                SHA512

                                e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                188B

                                MD5

                                2ea2a137ab8c47d20337451e220ee9e2

                                SHA1

                                be65afcbb079d07ad4431f833ddf3fc5dadbe77f

                                SHA256

                                e56c5843fc2abc37cb8023a951b5b8151e973458d78b79d20ac02f7c98cd9718

                                SHA512

                                90802d3473fe6ca799318e88e9a1a13838ab5b8fd4add7ef1e52b4e9fe9aca3886eeb0bd82d0dfc108a156178bec952b2e3dc924195ad1012a33eff5d9470b59

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                af380fffe933778e59c1169edcad1d4d

                                SHA1

                                2b1a074181415210e4074276ea1e872744825bd1

                                SHA256

                                9b3fd0bf05240dd95ae9b32d79933df5f9c64bde9094b17b1ae2f571586cca55

                                SHA512

                                455fd9439c6c15acac128488b7edd2ad0c71a00e1a0d1509a33efb2ae966bb2537e0fbedf323ea47ccaf5fe707758607b5da106452312ae7718d098e6db5965b

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                6a1947cb62731fd5b8e85441832f6ccc

                                SHA1

                                62e48dfb4c2fa3a88bea492ed810e91835540c1f

                                SHA256

                                dffa7ca4d521f45e0cbb0c8b5d8572efa34c93998c2a4fd30bed22c16ce6d7e2

                                SHA512

                                2d707a8620fcb4af944ad6718a56e57798f0b941852e36acc3474976f05b5de212989dd30162a312c3f8e640c0517370ba95cd4e417c0fd805003812482fd9b1

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                0755f6c59f491f29c5ffb12a3db43f46

                                SHA1

                                bb48a8d318e4e79838efa7a7366d1b426e227fdd

                                SHA256

                                c64ca3b5a405a5ad34534c502b5c0e074ea68d81383e98ca0d2425eb052f9d25

                                SHA512

                                1aa91296c80ecfc6b0e2b47726c13d80b097821c5ea8d266bba7bf08f100bfee53c52860421dd4a04fd317f8f3b04decaa99389e6cd5990a1ba235a59347bc47

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                13291d9f1dd93f04f193df735c4a219f

                                SHA1

                                e04164abbf365e304629a3ae2433badf89dabd57

                                SHA256

                                8ee295e86247d2f4374a42178c5313ea58e45d1da2e345cc6360a5c06c099157

                                SHA512

                                dafc35f402d54901ab39fe99a8e1489ecb8a473214e35c30deaecea4135deb6880c34904bf4299eb8925dbe6a69f02bfbcada2943063703bd2155f99ce35cc71

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                37a0755a72cdaa642b32112b5a9c11d5

                                SHA1

                                46209bbcb4d4763eb725df3480284d0918ca1708

                                SHA256

                                05643d5fc7a8c98df7d59e542e5a8b0fccefcdca075691ab0e00f215d2e992a2

                                SHA512

                                8ca3cf6c12abc08e18f98fbe94e7a1822c1e5921cdd41009211bbba3e33db25d7cef791f9086c7cc80def0e03fdabe767ea67454cc01cd7d6d9cc5b09986f71e

                              • C:\Users\Admin\Downloads\Trimming_PUBES_And_TESTICLES_-_A_Visual_Guide.mp4

                                Filesize

                                23.8MB

                                MD5

                                6d243d097ae4c9eed88d468cd16449f4

                                SHA1

                                6598cc164351beb7e6c51e50ec7612bec5aec546

                                SHA256

                                19c1abef651f6e6cf0d6e78e76f286f3bd9032fd06e6d82728c4cd040a2958a7

                                SHA512

                                11b9e184802d14e841ea306fbfa5018c9373ba9d6c8bad00ed036b8f3f8bb317b14b33f6945d17262f8da1d74cc6a0304c84b281c5d8f2fd05f1750b06f5f03f

                              • memory/712-95-0x00007FFD28290000-0x00007FFD282E7000-memory.dmp

                                Filesize

                                348KB

                              • memory/712-82-0x00007FFD2C8D0000-0x00007FFD2C8E8000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-68-0x00007FFD40090000-0x00007FFD400A7000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-67-0x00007FFD400B0000-0x00007FFD400C1000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-70-0x00007FFD37590000-0x00007FFD375AD000-memory.dmp

                                Filesize

                                116KB

                              • memory/712-71-0x00007FFD32880000-0x00007FFD32891000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-69-0x00007FFD3B7F0000-0x00007FFD3B801000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-73-0x00007FFD32840000-0x00007FFD3287F000-memory.dmp

                                Filesize

                                252KB

                              • memory/712-72-0x00007FFD2C970000-0x00007FFD2CB70000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/712-66-0x00007FFD400D0000-0x00007FFD400E7000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-65-0x00007FFD400F0000-0x00007FFD40108000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-74-0x00007FFD28670000-0x00007FFD2971B000-memory.dmp

                                Filesize

                                16.7MB

                              • memory/712-75-0x00007FFD322B0000-0x00007FFD322D1000-memory.dmp

                                Filesize

                                132KB

                              • memory/712-76-0x00007FFD32290000-0x00007FFD322A8000-memory.dmp

                                Filesize

                                96KB

                              • memory/712-77-0x00007FFD32270000-0x00007FFD32281000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-78-0x00007FFD2C950000-0x00007FFD2C961000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-81-0x00007FFD2C8F0000-0x00007FFD2C901000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-83-0x00007FFD2C8A0000-0x00007FFD2C8D0000-memory.dmp

                                Filesize

                                192KB

                              • memory/712-84-0x00007FFD2C830000-0x00007FFD2C897000-memory.dmp

                                Filesize

                                412KB

                              • memory/712-87-0x00007FFD2AAD0000-0x00007FFD2AB26000-memory.dmp

                                Filesize

                                344KB

                              • memory/712-88-0x00007FFD2A950000-0x00007FFD2AAC8000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/712-86-0x00007FFD2C810000-0x00007FFD2C821000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-90-0x00007FFD28500000-0x00007FFD28670000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/712-92-0x00007FFD284B0000-0x00007FFD284F2000-memory.dmp

                                Filesize

                                264KB

                              • memory/712-94-0x00007FFD282F0000-0x00007FFD2845B000-memory.dmp

                                Filesize

                                1.4MB

                              • memory/712-64-0x00007FFD29720000-0x00007FFD299D4000-memory.dmp

                                Filesize

                                2.7MB

                              • memory/712-93-0x00007FFD28460000-0x00007FFD284AC000-memory.dmp

                                Filesize

                                304KB

                              • memory/712-91-0x00007FFD374F0000-0x00007FFD37502000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-96-0x00007FFD28040000-0x00007FFD2828B000-memory.dmp

                                Filesize

                                2.3MB

                              • memory/712-89-0x00007FFD2C7F0000-0x00007FFD2C807000-memory.dmp

                                Filesize

                                92KB

                              • memory/712-85-0x00007FFD2AB30000-0x00007FFD2AB9F000-memory.dmp

                                Filesize

                                444KB

                              • memory/712-63-0x00007FFD34B40000-0x00007FFD34B74000-memory.dmp

                                Filesize

                                208KB

                              • memory/712-80-0x00007FFD2C910000-0x00007FFD2C92B000-memory.dmp

                                Filesize

                                108KB

                              • memory/712-79-0x00007FFD2C930000-0x00007FFD2C941000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-97-0x00000249CFA10000-0x00000249D11C0000-memory.dmp

                                Filesize

                                23.7MB

                              • memory/712-98-0x00007FFD43260000-0x00007FFD43270000-memory.dmp

                                Filesize

                                64KB

                              • memory/712-99-0x00007FFD26860000-0x00007FFD2688F000-memory.dmp

                                Filesize

                                188KB

                              • memory/712-100-0x00007FFD374D0000-0x00007FFD374E1000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-101-0x00007FFD26840000-0x00007FFD26856000-memory.dmp

                                Filesize

                                88KB

                              • memory/712-103-0x00007FFD266F0000-0x00007FFD26765000-memory.dmp

                                Filesize

                                468KB

                              • memory/712-104-0x00007FFD26680000-0x00007FFD266E2000-memory.dmp

                                Filesize

                                392KB

                              • memory/712-105-0x00007FFD26610000-0x00007FFD2667D000-memory.dmp

                                Filesize

                                436KB

                              • memory/712-102-0x00007FFD26770000-0x00007FFD26835000-memory.dmp

                                Filesize

                                788KB

                              • memory/712-106-0x00007FFD265F0000-0x00007FFD26603000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-107-0x00007FFD265D0000-0x00007FFD265E4000-memory.dmp

                                Filesize

                                80KB

                              • memory/712-108-0x00007FFD26580000-0x00007FFD265D0000-memory.dmp

                                Filesize

                                320KB

                              • memory/712-109-0x00007FFD26560000-0x00007FFD26575000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-111-0x00007FFD25D50000-0x00007FFD25D65000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-115-0x00007FFD25BD0000-0x00007FFD25BFA000-memory.dmp

                                Filesize

                                168KB

                              • memory/712-117-0x00007FFD25B90000-0x00007FFD25BAB000-memory.dmp

                                Filesize

                                108KB

                              • memory/712-118-0x00007FFD25B70000-0x00007FFD25B81000-memory.dmp

                                Filesize

                                68KB

                              • memory/712-116-0x00007FFD25BB0000-0x00007FFD25BC3000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-122-0x00007FFD25AF0000-0x00007FFD25B03000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-121-0x00007FFD25B10000-0x00007FFD25B25000-memory.dmp

                                Filesize

                                84KB

                              • memory/712-120-0x00007FFD25B30000-0x00007FFD25B42000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-123-0x00007FFD25970000-0x00007FFD25AEA000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/712-119-0x00007FFD25B50000-0x00007FFD25B62000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-125-0x00007FFD25930000-0x00007FFD25942000-memory.dmp

                                Filesize

                                72KB

                              • memory/712-124-0x00007FFD25950000-0x00007FFD25964000-memory.dmp

                                Filesize

                                80KB

                              • memory/712-113-0x00007FFD25D00000-0x00007FFD25D13000-memory.dmp

                                Filesize

                                76KB

                              • memory/712-112-0x00007FFD25D20000-0x00007FFD25D43000-memory.dmp

                                Filesize

                                140KB

                              • memory/712-62-0x00007FF6FE080000-0x00007FF6FE178000-memory.dmp

                                Filesize

                                992KB

                              • memory/712-114-0x00007FFD25C00000-0x00007FFD25CF4000-memory.dmp

                                Filesize

                                976KB

                              • memory/712-110-0x00007FFD26340000-0x00007FFD2655D000-memory.dmp

                                Filesize

                                2.1MB