Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    65s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 02:03

General

  • Target

    Infami/Metagaster/Brnehaveklasserne.ps1

  • Size

    53KB

  • MD5

    2a4402450d6e37b4c5f6434e8e2548ae

  • SHA1

    29b0d015b4c7420b576f3ce745b95f16f416045e

  • SHA256

    05e03c9da534face56a3181a98e7194ce73a4638f713523d26aa97486f427eea

  • SHA512

    e5a69a27041b0c1f8592861e820da036edc41cf3b0d630a6eea8e1cb8935ff88a5aec6a231e240c2c3fa52c47c64608ea84924cb6165170e3ee144335fbb4387

  • SSDEEP

    1536:7uclUIfUW1MRADKnHPiRLeZ1/3pJ45WhfDntzBZ:7unW1MBnaFeZ1/3pJ40Rz

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Infami\Metagaster\Brnehaveklasserne.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:956
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2612
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3612
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3664
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4956
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4068
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:1920
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4108
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1872
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5408
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:5844
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5188
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:5628
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3660
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1028 --field-trial-handle=3016,i,1323102786462900035,7687994236215859601,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:5860
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:5544
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:5964
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:5556
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:624
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:6052
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:6136
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:5784
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:4496
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:860
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:5920
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:1364
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:5488
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:1568
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:5472
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:2448
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:5432
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:2952
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:6028
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:4876
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:5140
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:2584
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:5356
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4088
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:5416
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:5112
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:3168
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:5488
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:5620
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:3576
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:5496
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:5652
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:6120
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:624
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:6020
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:372
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:5892

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      471B

                                                                      MD5

                                                                      cdea1f58b6bd44e16ffa4bd31e694ad2

                                                                      SHA1

                                                                      34f1bfaaf9203ab1869343902eea864310b7e66f

                                                                      SHA256

                                                                      84fc5c908b88e3dfac6aee39ada5a2ddd82e311071e2d2bb4c3b84bfc2d838c0

                                                                      SHA512

                                                                      92d887e2a7546b96fb2091b28c866bf9ece0d12f706cf9e6049c18f6813c8aebfa2b4379704f606541a57d7d5eaba01f2ee23a9d31c2925eae073c401483d05d

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      412B

                                                                      MD5

                                                                      021b2b94b26475ad4fb191b04b7a802f

                                                                      SHA1

                                                                      567466cad5d34ecb797511251c3dcc2a54698c27

                                                                      SHA256

                                                                      438c858b9c1a483a521e39b9f72fe3a647028a39a1d3acb9246b0227637f84ee

                                                                      SHA512

                                                                      3c03ae3c1eff3422eadb3782722f7f3ecbbd90785575045388eaa18f6ef9738707df7e825681188090ec375392d3fd8161167fa29461b3296710502061078928

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TV3VV50F\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      5b984c298841d3dc3a3a0f8a819790bc

                                                                      SHA1

                                                                      27ec8f9f31d80734493d88e29e639b7562276867

                                                                      SHA256

                                                                      c9bc2d8c025943515a1412a4cb84dd9c184b73031125619bf2cd2d2d2efc2d66

                                                                      SHA512

                                                                      884209f3ea5207c6ad508975e139b2a16a6b861152c6861a3c1f1459973c896387e92407230ee1c90a6d4a9a49c52aa18d9d292b281a5b906f219280b7f15a93

                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1zolw2ym.2ny.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • memory/624-277-0x000001883D7D0000-0x000001883D7F0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/624-273-0x000001883D400000-0x000001883D420000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/624-275-0x000001883D3C0000-0x000001883D3E0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1364-123-0x00000000044F0000-0x00000000044F1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1568-133-0x0000029EC7980000-0x0000029EC79A0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1568-131-0x0000029EC79C0000-0x0000029EC79E0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1568-136-0x0000029EC7D90000-0x0000029EC7DB0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1872-60-0x000001EBFEC20000-0x000001EBFEC40000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1872-58-0x000001EBFE820000-0x000001EBFE840000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1872-56-0x000001EBFE860000-0x000001EBFE880000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1920-48-0x0000000004F40000-0x0000000004F41000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1980-17-0x0000018B9D430000-0x0000018B9D434000-memory.dmp

                                                                      Filesize

                                                                      16KB

                                                                    • memory/1980-0-0x0000018B9D370000-0x0000018B9D392000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/1980-12-0x0000018B9D4C0000-0x0000018B9D4D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1980-11-0x0000018B9D4C0000-0x0000018B9D4D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1980-13-0x0000018B9D4C0000-0x0000018B9D4D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1980-22-0x00007FFE227E0000-0x00007FFE232A1000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/1980-10-0x00007FFE227E0000-0x00007FFE232A1000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/1980-16-0x0000018B9D4C0000-0x0000018B9D4D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/1980-15-0x0000018B9D4C0000-0x0000018B9D4D0000-memory.dmp

                                                                      Filesize

                                                                      64KB

                                                                    • memory/2952-169-0x0000000004550000-0x0000000004551000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3664-27-0x0000000004770000-0x0000000004771000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4068-33-0x000002CCDFF90000-0x000002CCDFFB0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4068-36-0x000002CCDFF50000-0x000002CCDFF70000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4068-38-0x000002CCE0360000-0x000002CCE0380000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4496-101-0x0000000004850000-0x0000000004851000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4876-179-0x000001A4080E0000-0x000001A408100000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4876-177-0x000001A408120000-0x000001A408140000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4876-181-0x000001A408700000-0x000001A408720000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5112-216-0x00000000046C0000-0x00000000046C1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5140-193-0x0000000004900000-0x0000000004901000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5356-200-0x0000017ED6800000-0x0000017ED6820000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5356-204-0x0000017ED6BC0000-0x0000017ED6BE0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5356-202-0x0000017ED65B0000-0x0000017ED65D0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5408-71-0x000001D498E00000-0x000001D49A72F000-memory.dmp

                                                                      Filesize

                                                                      25.2MB

                                                                    • memory/5432-157-0x000001E074090000-0x000001E0740B0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5432-159-0x000001E0746A0000-0x000001E0746C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5432-154-0x000001E0740D0000-0x000001E0740F0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5472-146-0x0000000004460000-0x0000000004461000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5488-230-0x00000208E4630000-0x00000208E4650000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5488-224-0x00000208E4260000-0x00000208E4280000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5488-226-0x00000208E4220000-0x00000208E4240000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5496-247-0x0000026B032D0000-0x0000026B032F0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5496-249-0x0000026B03290000-0x0000026B032B0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5496-252-0x0000026B038A0000-0x0000026B038C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5620-239-0x0000000004740000-0x0000000004741000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5652-265-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5784-87-0x0000021549C90000-0x0000021549CB0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5784-89-0x000002154A0A0000-0x000002154A0C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5784-85-0x0000021549CD0000-0x0000021549CF0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5920-108-0x00000226C17A0000-0x00000226C17C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5920-110-0x00000226C1760000-0x00000226C1780000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5920-113-0x00000226C1B70000-0x00000226C1B90000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/6052-77-0x0000000004120000-0x0000000004121000-memory.dmp

                                                                      Filesize

                                                                      4KB