Analysis

  • max time kernel
    60s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 01:00

General

  • Target

    Kursusplans.ps1

  • Size

    59KB

  • MD5

    867b6e69eaf64d49c92a00efe2f3484a

  • SHA1

    57e409c3c4ec17f05de4b6900300c6ffb22447c7

  • SHA256

    554a9d36104f6fe2c57ebef379f96adb5205f4652780c0459db40e676f5efa1c

  • SHA512

    3d075d6850562b2f68503e48f9349a50dcf65e69626b85b5312bf0bd6938b3b433cafb3ed4f885b392c4157b6997613ea551729a35028f5be1151ac3feda1856

  • SSDEEP

    1536:oKohIDhrU/xqIsVWUQ7IQp0lYmDc+m4PsrHLc:oJhI5U/xKWLpwon4Ps7Lc

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 6 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 56 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Kursusplans.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
      2⤵
        PID:4960
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2284
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2988
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2036
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4016
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3576
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3816
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1776
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:8
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3728 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1472
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:3412
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:4056
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3628
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:4484
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3136
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:4364
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:940
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:2144
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:3976
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:1776
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:1988
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:2252
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:676
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:4836
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:3320
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:2324
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:220
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:2812
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:1100
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:4036
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:4872
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:4776
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:4148
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:2392
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:4464
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:4412
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2864
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:4256
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:532
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:4528
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:3628

                                                                  Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                          Filesize

                                                                          471B

                                                                          MD5

                                                                          f3945b57f0f3c105bd40af2901e4822a

                                                                          SHA1

                                                                          93dabbe9a560f3d59ad8ce8d5dc941909fe21ec1

                                                                          SHA256

                                                                          60ede5fc5d4e90f27afe2e8c8a14ebb0cf75df70ad29f8524f4b748a04203d39

                                                                          SHA512

                                                                          212a88efd8a79e9b20aa86c83cb3f05e093a9233e4eb7e2d1064c599c8bbb5085b8ef45433d4d6266f80604af3d1e0a29dbbfbe124c5e18710ddb76b1ad2de0f

                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                          Filesize

                                                                          412B

                                                                          MD5

                                                                          d496472436bbdcfa1976c4a2624507a8

                                                                          SHA1

                                                                          c934a8c93f1257d637fb60d8f31d4bf3a38939e1

                                                                          SHA256

                                                                          692150be5429d1356b26792080817e7820b824fb6afdb55e9089c41d72f04f1f

                                                                          SHA512

                                                                          4802ab8d54727a5a9327f4ba61efb5341489f9a50d72f0e8d992dae529b6958bbfd680e1072652f50b79e409c879fa533327f8d7980d48d008be6c9ea34cc2e4

                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          df8c5984de430f538df0bf175d1e65b1

                                                                          SHA1

                                                                          03db1a006f0f583819fa71d9382b9fa13d32a86f

                                                                          SHA256

                                                                          8e30ee2254934163cfd75116f00a25757840c0cb1184db1672a7c4e9e07e024e

                                                                          SHA512

                                                                          7732066952a56933744b79714a4b3b02747de60427cc27a8793fe6a77ab9d5454933c85bf341532f82e57493a34869b5adbc4fd323277c7daf78bf7ff87f03a5

                                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5MIHM5LV\microsoft.windows[1].xml

                                                                          Filesize

                                                                          96B

                                                                          MD5

                                                                          84209e171da10686915fe7efcd51552d

                                                                          SHA1

                                                                          6bf96e86a533a68eba4d703833de374e18ce6113

                                                                          SHA256

                                                                          04d6050009ea3c99cc718ad1c07c5d15268b459fcfb63fcb990bc9761738907b

                                                                          SHA512

                                                                          48d2524000911cfb68ef866dedac78ee430d79aa3f4b68399f645dc2066841e6962e11a3362cbcec46680357dcd3e58cfef9994450fed1d8af04df44f76b0dfd

                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b113lcgj.ebi.ps1

                                                                          Filesize

                                                                          60B

                                                                          MD5

                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                          SHA1

                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                          SHA256

                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                          SHA512

                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                        • memory/8-44-0x0000020246230000-0x0000020246250000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/8-41-0x0000020245E20000-0x0000020245E40000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/8-37-0x0000020245E60000-0x0000020245E80000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/676-102-0x00000000042E0000-0x00000000042E1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/1100-144-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2324-124-0x0000000004E40000-0x0000000004E41000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2392-166-0x00000000046F0000-0x00000000046F1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/2812-136-0x000001F761FD0000-0x000001F761FF0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/2812-132-0x000001F762320000-0x000001F762340000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/2812-138-0x000001F7626E0000-0x000001F762700000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3320-109-0x00000298BBED0000-0x00000298BBEF0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3320-112-0x00000298BBE90000-0x00000298BBEB0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3320-115-0x00000298BC4A0000-0x00000298BC4C0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3412-55-0x0000000004820000-0x0000000004821000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/3628-65-0x0000027CE7420000-0x0000027CE7440000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3628-62-0x0000027CE7460000-0x0000027CE7480000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3628-69-0x0000027CE7830000-0x0000027CE7850000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/3816-30-0x0000000003720000-0x0000000003721000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4156-10-0x00007FFD774B0000-0x00007FFD77F71000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/4156-20-0x000001BB00C90000-0x000001BB00CA0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4156-9-0x000001BB1B450000-0x000001BB1B472000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/4156-12-0x000001BB00C90000-0x000001BB00CA0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4156-25-0x00007FFD774B0000-0x00007FFD77F71000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/4156-24-0x000001BB00C90000-0x000001BB00CA0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4156-23-0x000001BB00C90000-0x000001BB00CA0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4156-22-0x000001BB1B5F0000-0x000001BB1B5F4000-memory.dmp

                                                                          Filesize

                                                                          16KB

                                                                        • memory/4156-21-0x00007FFD774B0000-0x00007FFD77F71000-memory.dmp

                                                                          Filesize

                                                                          10.8MB

                                                                        • memory/4156-11-0x000001BB00C90000-0x000001BB00CA0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/4364-83-0x000001A4C2FC0000-0x000001A4C2FE0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4364-87-0x000001A4C3590000-0x000001A4C35B0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4364-85-0x000001A4C2F80000-0x000001A4C2FA0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4412-174-0x000001ED9BCF0000-0x000001ED9BD10000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4412-177-0x000001ED9BCB0000-0x000001ED9BCD0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4412-179-0x000001ED9C2C0000-0x000001ED9C2E0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4484-76-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

                                                                          Filesize

                                                                          4KB

                                                                        • memory/4872-152-0x000001DF4AE10000-0x000001DF4AE30000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4872-154-0x000001DF4ADD0000-0x000001DF4ADF0000-memory.dmp

                                                                          Filesize

                                                                          128KB

                                                                        • memory/4872-158-0x000001DF4B250000-0x000001DF4B270000-memory.dmp

                                                                          Filesize

                                                                          128KB