Resubmissions

11-12-2024 18:37

241211-w9f3rstpez 10

11-12-2024 18:28

241211-w4jayatnat 10

Analysis

  • max time kernel
    1688s
  • max time network
    1693s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-12-2024 18:37

General

  • Target

    Fiddler.exe

  • Size

    3.5MB

  • MD5

    87bc17f56e744e74408e6ae8bb28b724

  • SHA1

    3aa572388083ff00a95405d34d1189c99c7ff5be

  • SHA256

    ffb24fc36ade87988f9908e848d0333ce7ffb2b4e4d0ffb43f6556246069d057

  • SHA512

    cbeee155c97b87a22b92b808f86fee25c18db51ab43a36b657d532d2d47d3a7db2f4507a699b72af904bf6d5ed851d1ae1fcfb4833a57096e6c7787211c0f35d

  • SSDEEP

    49152:cbvLSgf+VOdx3Vw5+mbSgwJKI0Qpvs3c2KTn4Xj9Bh:cTmgf+VOdc5vbSgwJKDP24Rf

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fiddler.exe
    "C:\Users\Admin\AppData\Local\Temp\Fiddler.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://api.getfiddler.com/r/?Win8EL
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffca9d43cb8,0x7ffca9d43cc8,0x7ffca9d43cd8
        3⤵
          PID:3368
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1872 /prefetch:2
          3⤵
            PID:3864
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:572
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
            3⤵
              PID:2112
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              3⤵
                PID:576
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                3⤵
                  PID:4220
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:1
                  3⤵
                    PID:2208
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4120 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2100
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:8
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2120
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                    3⤵
                      PID:2580
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                      3⤵
                        PID:4324
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                        3⤵
                          PID:3508
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:1
                          3⤵
                            PID:4372
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,17228562099184347047,10870408560424859030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2096 /prefetch:2
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4612
                        • C:\Users\Admin\AppData\Local\Temp\EnableLoopback.exe
                          "C:\Users\Admin\AppData\Local\Temp\EnableLoopback.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:976
                      • C:\Windows\system32\wbem\WmiApSrv.exe
                        C:\Windows\system32\wbem\WmiApSrv.exe
                        1⤵
                          PID:4932
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4824
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:244

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              a28bb0d36049e72d00393056dce10a26

                              SHA1

                              c753387b64cc15c0efc80084da393acdb4fc01d0

                              SHA256

                              684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1

                              SHA512

                              20940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              554d6d27186fa7d6762d95dde7a17584

                              SHA1

                              93ea7b20b8fae384cf0be0d65e4295097112fdca

                              SHA256

                              2fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb

                              SHA512

                              57d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              144B

                              MD5

                              3762575fecdc42643b73733441993068

                              SHA1

                              7d1636ef23eacb77b417d52ff7a7f237e35d9a6d

                              SHA256

                              e7076e688b33b659b4b6158ea83c95b177e2cc30fd8f89e0ca73c7ec47ad5534

                              SHA512

                              f424b3fe3ce9ff74462768fab91314af6e84eaf79662a89f506b4af09f86769b24526a9ec54de0c2d60f012c39ec6b76a2018c93e2d0b73a52f831ec17cf3dfa

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              595B

                              MD5

                              71cebabc1e80c4739046127b6a2e93a1

                              SHA1

                              10f10fa243012807248b3c6bfa832439de4e3126

                              SHA256

                              be9e174e336200b5249c9cd19b05fe3b38f4e2888b5727c6204a8f7c017df6b6

                              SHA512

                              e9c9749978dbbccf3ca071f7754170380826d02ab0f6bd89b5c87f37fe0d29175a7998f3c82dda773643b91596ccc55d8045a8d077de790c844dbfa8e3b95823

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              285252a2f6327d41eab203dc2f402c67

                              SHA1

                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                              SHA256

                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                              SHA512

                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              890772b89065106700868972cda04d91

                              SHA1

                              95ae0a5987673b1976a3a01cd6d049413cc72629

                              SHA256

                              26d2b311f3b3e9dd8b3379c2840f57044bc5a4ab1ba2a80bcb0dc3a28ff5ce7f

                              SHA512

                              0edc68c0b5881c9a1a9a71f8a580b0b6d9a8e2b5a8381c77b5cc763ee70a945fe7c37109a26ed694b823f64d75b7b748e217666600a2716d0537edeb2d229e5e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              9e1e9d88331d449056e4cb1e6c672457

                              SHA1

                              016af7a13386769f2750c612eb975b673a2006d4

                              SHA256

                              2491cf81722f29c7ba1897f6e34271f6d6998560f121da94a1de4eeb7ca9f7d6

                              SHA512

                              035aa5b4352c2c5ea606de7553fd42ea63648dd0db533c608ddda78f9a9c42930f26314a9b0fadb0ef39ffedbfb15480b16ba79d35c80e171ff8377ce04e0122

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              539B

                              MD5

                              d312c9e7c52ff271c773f767ff720c2e

                              SHA1

                              8a9a6ade71823d254a0304973a3d7710c4de2848

                              SHA256

                              c75b833ebb732b9ead83a2125b158f5f9dc823ab70e3b558fd9ee569b1908608

                              SHA512

                              22dfd915747de2e13015b2e49e6c50713e9ec1c9a3d6007f6b4255db0bf8420e99ab68e5b011b5996433021daaeef6aacfdead51b321b9b46de549fb9293f940

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe583227.TMP

                              Filesize

                              539B

                              MD5

                              21c608020c79063e31de623c94a18e7d

                              SHA1

                              158b903c79f8137afaf8b5b06703537f02aa1211

                              SHA256

                              4c5540807db6394f53ceb61b3626d729ecd37540de2c43c4eb8450c08fa4af3e

                              SHA512

                              ef735f9d421b70fdb70661e22ea832c60e3be2b6ec574b0db1bc58a0bab516f1caad3b9798047aa30f9425b07f3ceb0da6defbc0cf0be4d08bc71f9659ed440f

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              8f014f0da208f8b910e12593b60d9ff6

                              SHA1

                              3633c881d9829a9d95e1dd45cfbf9446f0ad90cc

                              SHA256

                              764520d8dd02a77579d2e0e88c6e7a64fabb9de9b292f2ca22876f9c2059b4b1

                              SHA512

                              f8ca6e02f74e135c19b53efb5e439eefd0e64dd09b98ac0798bbed47af5e78901c27d12cb5c2ed7963c8d9fc01d70783b78c36d221fd107b42e489a7838ba3df

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              4a9e6ad0e979ce3c2eac7765842ae805

                              SHA1

                              4d25786567a0f6d0166b055e8ec53d045ef18aeb

                              SHA256

                              b093dde905c6560cad9fb3ff12fef3a26716c486454c070d5d96d31d96a1d758

                              SHA512

                              6b2890c687ec7211625cc1e68325ee9c8b6604a88ef55c3f2c724c3abf056543d006e56b29c887086168720686e4f51182019728d509bf7c36b1b5f38f8ffbe5

                            • C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\dduzaazg.newcfg

                              Filesize

                              1KB

                              MD5

                              8a49925b2ed0098f1709a1298f886f4b

                              SHA1

                              9679c057d1b110624dd4534759d724a4431cdbbf

                              SHA256

                              8654d616f450e62306ccbfbe08e9194f1c14df799fdd0b6d7378e8d247b51b63

                              SHA512

                              9e5ed87255e34a9df45e45a4d3c495a95640c737f698b7253e6dee3f3aa1f5cb3b158a2125d5abb480be7e196b1f9162097ba713f19451a4634b71d8e40dcb14

                            • C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\gl0xuuzi.newcfg

                              Filesize

                              1KB

                              MD5

                              8be0891196af8c12401496fed708db13

                              SHA1

                              9427cfc1691dc71bf560fa3100a5f31e66e32690

                              SHA256

                              68a6a4f13debd20c958bd5f5115a119fac6aa55b573442e02521e511101a3ea0

                              SHA512

                              255e5cf5340d250a8fef7b6a72bd8f308ec559178ea9f930d5dd57dfdde00e6c572b2369266930da546a574c196e79c1809a83f5bdbde0feceb2642a32974935

                            • C:\Users\Admin\AppData\Local\Progress_Software_Corpora\Fiddler.exe_Url_sblwdlp4jxb3bmuxfbi1zl1jd5acanau\5.0.20245.10105\user.config

                              Filesize

                              966B

                              MD5

                              67ee6dd965dc6c692dd0f810affbb09b

                              SHA1

                              e93ec78d1dd0d066e92f2ed9b4bee25046811b55

                              SHA256

                              14c7fcbe71449c51a23fab4ccd661f5bc53fe9d0aba633f0e1dbcf3492574d70

                              SHA512

                              1a880967daa9f8f6f6c15d9bdd67b60a058fa61693519da9059ead7a266979a41456e72a2d3558c26052eb610eb9c264369db8ec39f7edf42ebca778c29a5417

                            • memory/976-207-0x00000000056C0000-0x00000000056CA000-memory.dmp

                              Filesize

                              40KB

                            • memory/976-206-0x00000000055F0000-0x0000000005682000-memory.dmp

                              Filesize

                              584KB

                            • memory/976-205-0x0000000005CE0000-0x0000000006286000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/976-204-0x0000000000AA0000-0x0000000000AB8000-memory.dmp

                              Filesize

                              96KB

                            • memory/4804-81-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-12-0x0000023FED0B0000-0x0000023FED0C0000-memory.dmp

                              Filesize

                              64KB

                            • memory/4804-26-0x0000023FED370000-0x0000023FED3C0000-memory.dmp

                              Filesize

                              320KB

                            • memory/4804-27-0x00007FFCAE873000-0x00007FFCAE875000-memory.dmp

                              Filesize

                              8KB

                            • memory/4804-30-0x0000023FEDCD0000-0x0000023FEDD82000-memory.dmp

                              Filesize

                              712KB

                            • memory/4804-0-0x00007FFCAE873000-0x00007FFCAE875000-memory.dmp

                              Filesize

                              8KB

                            • memory/4804-18-0x0000023FED320000-0x0000023FED346000-memory.dmp

                              Filesize

                              152KB

                            • memory/4804-19-0x0000023FED2C0000-0x0000023FED2CE000-memory.dmp

                              Filesize

                              56KB

                            • memory/4804-21-0x0000023FEE0E0000-0x0000023FEE686000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4804-13-0x0000023FED490000-0x0000023FED66A000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/4804-56-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-70-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-80-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-17-0x0000023FED2B0000-0x0000023FED2BC000-memory.dmp

                              Filesize

                              48KB

                            • memory/4804-82-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-22-0x0000023FED2F0000-0x0000023FED2F8000-memory.dmp

                              Filesize

                              32KB

                            • memory/4804-11-0x0000023FED0C0000-0x0000023FED0D2000-memory.dmp

                              Filesize

                              72KB

                            • memory/4804-10-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-9-0x0000023FED0F0000-0x0000023FED132000-memory.dmp

                              Filesize

                              264KB

                            • memory/4804-8-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-7-0x0000023FEC6B0000-0x0000023FEC6BC000-memory.dmp

                              Filesize

                              48KB

                            • memory/4804-6-0x0000023FED000000-0x0000023FED04A000-memory.dmp

                              Filesize

                              296KB

                            • memory/4804-5-0x0000023FEC6A0000-0x0000023FEC6AC000-memory.dmp

                              Filesize

                              48KB

                            • memory/4804-4-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-3-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-2-0x00007FFCAE870000-0x00007FFCAF332000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4804-20-0x0000023FEDA70000-0x0000023FEDB2A000-memory.dmp

                              Filesize

                              744KB

                            • memory/4804-14-0x0000023FED2D0000-0x0000023FED2EA000-memory.dmp

                              Filesize

                              104KB

                            • memory/4804-15-0x0000023FED0E0000-0x0000023FED0EA000-memory.dmp

                              Filesize

                              40KB

                            • memory/4804-16-0x0000023FED140000-0x0000023FED148000-memory.dmp

                              Filesize

                              32KB

                            • memory/4804-1-0x0000023FE6B30000-0x0000023FE6EB4000-memory.dmp

                              Filesize

                              3.5MB