Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 11:02

General

  • Target

    fpsboost.bat

  • Size

    3KB

  • MD5

    daf8781483794fb6ea664524850aeba7

  • SHA1

    808363cb9e17b9dce6c9ce537f3bce37d4aa7545

  • SHA256

    22f5ffbd24783a93321c6f5a3d659028990e024a798063349fcd21e9300f7c96

  • SHA512

    c00f2e6b6cf27cf6b0045184228f538a6bf99b246f77febc0065e37489fc0599a5c664a2b77ea7095b7ad6a9e68a379288340bc02c3849e904a0de6347f66919

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 4 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs

    Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 31 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fpsboost.bat"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Boot or Logon Autostart Execution: Print Processors
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Modifies termsrv.dll
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:4792
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
      1⤵
        PID:4064
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:3080
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
        1⤵
          PID:2248
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
          1⤵
            PID:944
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
            1⤵
              PID:3620
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
              1⤵
                PID:1048
              • C:\Windows\system32\rundll32.exe
                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                1⤵
                  PID:4516
                • C:\Windows\system32\rundll32.exe
                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                  1⤵
                    PID:3920
                  • C:\Windows\system32\rundll32.exe
                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                    1⤵
                      PID:1036
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                      1⤵
                        PID:3456
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                        1⤵
                          PID:4724
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                          1⤵
                            PID:2600
                          • C:\Windows\system32\rundll32.exe
                            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                            1⤵
                              PID:4968
                            • C:\Windows\system32\rundll32.exe
                              "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                              1⤵
                                PID:216
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                1⤵
                                  PID:4696
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                  1⤵
                                    PID:2304
                                  • C:\Windows\system32\rundll32.exe
                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                    1⤵
                                      PID:4784
                                    • C:\Windows\system32\rundll32.exe
                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                      1⤵
                                        PID:2656
                                      • C:\Windows\system32\rundll32.exe
                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                        1⤵
                                          PID:5008

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\HUORGX07\microsoft.windows[1].xml

                                          Filesize

                                          97B

                                          MD5

                                          599bd389c60e256a62e47f33d2a7f3d6

                                          SHA1

                                          9f25d2d8022bfd86f3cd457bb4b9a4ee54f0b2bb

                                          SHA256

                                          2f6d64585866db940e3b5c4178cdbd15cf3934bebd3ac93b5f7afb5bd80d4812

                                          SHA512

                                          16de3141a774d61a6faa6df8b6d6f0dc3a9a4e24bd4b49901c90bd5f9ca0a96ac18d707bd456ff40b4dddc8a2f0511e44e0d7b398541e09e51d27e21a1c15023

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_help

                                          Filesize

                                          36KB

                                          MD5

                                          bad093419be1135cfe9694ea77088c78

                                          SHA1

                                          76204c7ca72cf666add9c9931389d635c82e8af0

                                          SHA256

                                          136808af50ee73df9befd76f7aca21765782565b0095227c5a287f3be0b5ef3c

                                          SHA512

                                          3b5cb7f80d7cbc557b5a32a995cd607257ac8e56af935ce6f64c54ba1f311a65ef00c69c69047b6eb7bb678c2b1bc0a3c37548aef417ea49e414e1a34bcf651d

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe

                                          Filesize

                                          36KB

                                          MD5

                                          406347732c383e23c3b1af590a47bccd

                                          SHA1

                                          fae764f62a396f2503dd81eefd3c7f06a5fb8e5f

                                          SHA256

                                          e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e

                                          SHA512

                                          18905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{6D809377-6AF0-444B-8957-A3773F02200E}_7-Zip_7-zip_chm

                                          Filesize

                                          36KB

                                          MD5

                                          a62d519be58c4ec079cd825e04c1f4bf

                                          SHA1

                                          91c59ff74e1911d942cdb7a68ebba42f10dc3510

                                          SHA256

                                          9af30e079cc36bdf17fb5fffebbe68b2275616f9513b07e99f15f7065a2d99c6

                                          SHA512

                                          637a0dced1a940af17c47abcdf30dc1a2ab2c1a1f70b9199789670398e87d2c9ad445f82e05fd1ea84cccfb62d25c8253218426c1fd9784b14dd5c7bae881b69

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{c2dc695d-4cf0-4c26-9d23-5e462ba6bf10}\0.0.filtertrie.intermediate.txt

                                          Filesize

                                          28KB

                                          MD5

                                          ab6db363a3fc9e4af2864079fd88032d

                                          SHA1

                                          aa52099313fd6290cd6e57d37551d63cd96dbe45

                                          SHA256

                                          373bb433c2908af2e3de58ede2087642814564560d007e61748cdb48d4e9da3f

                                          SHA512

                                          d3d13d17df96705d0de119ad0f8380bfe6b7bc44c618e2fcd0233061a0ab15beae44d38c48a880121b35f90f56c1529e5f4cf1a19acb9e2cbba5d1c402c749c0

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{c2dc695d-4cf0-4c26-9d23-5e462ba6bf10}\0.1.filtertrie.intermediate.txt

                                          Filesize

                                          5B

                                          MD5

                                          34bd1dfb9f72cf4f86e6df6da0a9e49a

                                          SHA1

                                          5f96d66f33c81c0b10df2128d3860e3cb7e89563

                                          SHA256

                                          8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                                          SHA512

                                          e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{c2dc695d-4cf0-4c26-9d23-5e462ba6bf10}\0.2.filtertrie.intermediate.txt

                                          Filesize

                                          5B

                                          MD5

                                          c204e9faaf8565ad333828beff2d786e

                                          SHA1

                                          7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                                          SHA256

                                          d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                                          SHA512

                                          e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{c2dc695d-4cf0-4c26-9d23-5e462ba6bf10}\Apps.ft

                                          Filesize

                                          38KB

                                          MD5

                                          84ac0c242b77b8fc326db0a5926b089e

                                          SHA1

                                          cc6b367ae8eb38561de01813b7d542067fb2318f

                                          SHA256

                                          b1557167a6df424f8b28aabd31d1b7e8a469dd50d2ae4cbbd43afd8f9c62cf92

                                          SHA512

                                          8f63084bd5a270b7b05e80454d26127b69bcb98ec93d9fad58d77203934f46b677a3aaf20f29e73dcd7035deb61f4c0aa3b10acbc4c0fc210632c1d74f705d2f

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{c2dc695d-4cf0-4c26-9d23-5e462ba6bf10}\Apps.index

                                          Filesize

                                          1.0MB

                                          MD5

                                          f4514c93191e0efc0f61036e4ebb341a

                                          SHA1

                                          c80478e9a734790c18584f67a43518aa4a7dcf58

                                          SHA256

                                          43da4fa5f62affe399ceaac2d489b7cde610963a48e72d445bebe6f2c63a3600

                                          SHA512

                                          8aecb3491767e040a52f351908004db2c8f2f083397744585c2832212ec8aa288d3492be941a48b04774e16b43672ab167209776cbdef6692fef684fc54666a6

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3d9802d1-2fb8-4f4a-a392-090ed06b6c6d}\apps.csg

                                          Filesize

                                          444B

                                          MD5

                                          5475132f1c603298967f332dc9ffb864

                                          SHA1

                                          4749174f29f34c7d75979c25f31d79774a49ea46

                                          SHA256

                                          0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

                                          SHA512

                                          54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3d9802d1-2fb8-4f4a-a392-090ed06b6c6d}\apps.schema

                                          Filesize

                                          150B

                                          MD5

                                          1659677c45c49a78f33551da43494005

                                          SHA1

                                          ae588ef3c9ea7839be032ab4323e04bc260d9387

                                          SHA256

                                          5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

                                          SHA512

                                          740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3d9802d1-2fb8-4f4a-a392-090ed06b6c6d}\appsconversions.txt

                                          Filesize

                                          1.4MB

                                          MD5

                                          2bef0e21ceb249ffb5f123c1e5bd0292

                                          SHA1

                                          86877a464a0739114e45242b9d427e368ebcc02c

                                          SHA256

                                          8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

                                          SHA512

                                          f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3d9802d1-2fb8-4f4a-a392-090ed06b6c6d}\appsglobals.txt

                                          Filesize

                                          343KB

                                          MD5

                                          931b27b3ec2c5e9f29439fba87ec0dc9

                                          SHA1

                                          dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

                                          SHA256

                                          541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

                                          SHA512

                                          4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{3d9802d1-2fb8-4f4a-a392-090ed06b6c6d}\appssynonyms.txt

                                          Filesize

                                          237KB

                                          MD5

                                          06a69ad411292eca66697dc17898e653

                                          SHA1

                                          fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

                                          SHA256

                                          2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

                                          SHA512

                                          ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133687981749935582.txt

                                          Filesize

                                          73KB

                                          MD5

                                          4c036314f080c753345c8481caf9ae5f

                                          SHA1

                                          c90add2903b9de1bfac12a139e2551af8ec71745

                                          SHA256

                                          ca7a49706055df15b0d7f15795ca9846c18f76f20ce135c039f99096bf164b71

                                          SHA512

                                          2c42b710436c2153a935fdbee7399177deca03c9c877cff99ef2dfa237fc7da5cc0dfbd93129122b268f8eda79f34e41ea5f9c901e5dee35861a2c9dce09bc38

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json

                                          Filesize

                                          220KB

                                          MD5

                                          e22311efc15379a9595c7d469b5d3014

                                          SHA1

                                          518fcbf4e6cddad03bd4c69f38fb19d3c8f5d352

                                          SHA256

                                          8adb83278dc6ecf7f5a9e5782e2771ab6981ff642cd0eff02f6cebd51762edfc

                                          SHA512

                                          60ec0bc0071d73c12ae1c8b267e0d49a6f717d1766cd264fed722e82ed2f1bc86af7758d18c78a15bce21cc9e9bef716e952b27f690645d97ca6a7ea873b35d8

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                          Filesize

                                          9KB

                                          MD5

                                          4ba9567cc0be72e00331a50db30fd588

                                          SHA1

                                          9b1f41be311bfb3a54944f8ed119f4cc48ec8bb6

                                          SHA256

                                          c2aab0894b7dd33486c63ae4047bdf006a085fb1918c5a05918dbfa089baaa08

                                          SHA512

                                          676d32db0e791b322d9dafebfea06f8f6df50151ac5f57e028f8d1bff2c6f9250690afd381b91e1faa59e718b6305d6a353c7f499dcfd84f4b9aebfb13d8e8f8

                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                          Filesize

                                          10KB

                                          MD5

                                          ef50e0b29ea2073794c049bdfff35c72

                                          SHA1

                                          51924496e1aea1af2a3a85e129bdc62127855c05

                                          SHA256

                                          cd7c0180f5f1de4b5d20b24458b95a5add548be9b896704a5b2f490f165654df

                                          SHA512

                                          114621e286475f7060a9464f3a991e20163e9be49035ff00775b55a8395f0a0f05b2c324c76f7857b4f02e6961a83e9a9574e3299e6a7aa347382d1fc82296a2

                                        • memory/3080-70-0x000001A7C4000000-0x000001A7C4100000-memory.dmp

                                          Filesize

                                          1024KB

                                        • memory/4560-49-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-53-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-61-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-59-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-60-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-63-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-62-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-64-0x0000027FFCDD0000-0x0000027FFCDD1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-65-0x0000027FFCDD0000-0x0000027FFCDD1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-66-0x0000027FFCDE0000-0x0000027FFCDE1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-68-0x0000027FFE620000-0x0000027FFE621000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-67-0x0000027FFE620000-0x0000027FFE621000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-56-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-57-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-52-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-58-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-54-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-55-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-51-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-19-0x0000027FF8A40000-0x0000027FF8A50000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/4560-50-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-48-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-47-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-45-0x0000027FFCDA0000-0x0000027FFCDA1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-46-0x0000027FFCDC0000-0x0000027FFCDC1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-44-0x0000027FFCDA0000-0x0000027FFCDA1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-42-0x0000027FFCD90000-0x0000027FFCD91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-43-0x0000027FFCDA0000-0x0000027FFCDA1000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-40-0x0000027FFCD90000-0x0000027FFCD91000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-38-0x0000027FFCC50000-0x0000027FFCC51000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/4560-3-0x0000027FF8940000-0x0000027FF8950000-memory.dmp

                                          Filesize

                                          64KB