Analysis

  • max time kernel
    39s
  • max time network
    40s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23/01/2025, 04:25

General

  • Target

    HorionInjector (1).exe

  • Size

    147KB

  • MD5

    6b5b6e625de774e5c285712b7c4a0da7

  • SHA1

    317099aef530afbe3a0c5d6a2743d51e04805267

  • SHA256

    2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d

  • SHA512

    104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08

  • SSDEEP

    3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 19 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 55 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe
    "C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Windows\explorer.exe
      explorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App
      2⤵
        PID:3520
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2096
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /0
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3576
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4540
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe"
        1⤵
        • Drops file in Windows directory
        • Enumerates system info in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd2491cc40,0x7ffd2491cc4c,0x7ffd2491cc58
          2⤵
            PID:3432
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1868 /prefetch:2
            2⤵
              PID:3216
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1780,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:3
              2⤵
                PID:4616
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:8
                2⤵
                  PID:792
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                  2⤵
                    PID:2736
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:1
                    2⤵
                      PID:2960
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4368,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4380 /prefetch:1
                      2⤵
                        PID:816
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4724,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:8
                        2⤵
                          PID:2196
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:8
                          2⤵
                            PID:1016
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:8
                            2⤵
                              PID:3148
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5072,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:8
                              2⤵
                                PID:1756
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:8
                                2⤵
                                  PID:2612
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:8
                                  2⤵
                                    PID:1008
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5144,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5100 /prefetch:2
                                    2⤵
                                      PID:2552
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                    1⤵
                                      PID:3132
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                      1⤵
                                        PID:4060

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                        Filesize

                                        649B

                                        MD5

                                        7ca7c969a6b664f4248a0783fc734649

                                        SHA1

                                        60352bfa0cd65bbbdf2fa3414981a3392a44f0c1

                                        SHA256

                                        ee6b5e0650ca2b4e52f07fc85b05e3695fdf433435c143be20650dce9a2e0381

                                        SHA512

                                        44824aaaabbe2da21d06e027a734fa9018fb486d42a2911bf8bf240f79b8bdd37cfe476c728d585674fa5d96a2fb1de94c74951fa3f36633e8ed7f90e6c2ea97

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json

                                        Filesize

                                        851B

                                        MD5

                                        07ffbe5f24ca348723ff8c6c488abfb8

                                        SHA1

                                        6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                        SHA256

                                        6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                        SHA512

                                        7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json

                                        Filesize

                                        854B

                                        MD5

                                        4ec1df2da46182103d2ffc3b92d20ca5

                                        SHA1

                                        fb9d1ba3710cf31a87165317c6edc110e98994ce

                                        SHA256

                                        6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                        SHA512

                                        939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        d6aa7ffdc088ad7dea199713acb254d3

                                        SHA1

                                        26c2f3730cb7da98733e5e1577b80cee4e9cadf8

                                        SHA256

                                        8e6db142fffcc02974228640da4ba0a724f71fdf49f73bb21a0badc89608cda1

                                        SHA512

                                        5c835d010e01a19d79884ab4f6ec017c0771a75696bf2a40c6acb8f1ee849b98bd98e79405c8400ddd699b964fe40730d9ee0a320e7eb3f6983265a8b357387e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        356B

                                        MD5

                                        84fa4cc6bed86b2a2a5ded3af5acdd61

                                        SHA1

                                        e9ed32e5fad7abfead1b58dca095966d8b130443

                                        SHA256

                                        833bdeafb1d9273f8103668eee4075e6b4fe6342364c1d6b21184d428effa5f9

                                        SHA512

                                        c4e6226d486d2238ad88122e57961e9e4ceb9062238c4d7f3c4b210ba4aa3265bf64f74a64e684f54613ff49b2f9ef4b0f3a20574f56eaa35ce5f1db00ae42f4

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        9KB

                                        MD5

                                        b5958bdf1043ae35bfab55d22323c7fd

                                        SHA1

                                        7f483e79dadf1183c195e58e35620e116f6fbfe8

                                        SHA256

                                        b719739300b6e72ee4bc6b643ca23a1dac6879680cfb892041c9e534bc0ef478

                                        SHA512

                                        ca7dee3116f4123f9532e0bdb5f9b0888d5d2a93f54368dd2d72c32978ce9a62928601ec261fe1a4bb1802d1c5f73d329baf0c7870155e723a78ea62e8a15d29

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        15KB

                                        MD5

                                        d3f75aa0b57acd93e8215a77ac78aa27

                                        SHA1

                                        d68fe88b7d63ac17ec2d8808bc583da360f30c0e

                                        SHA256

                                        9a68734f65039c3a2fb4b3baff2227f71262324124364ca01dd7b2a533a132cf

                                        SHA512

                                        8ab8fbf7ebdc7228e8ba905d0981054a237bec59ca6a3af897663ea16278543bcdc4d4330c9ef45ba8efbfb41193774ffcac25f793ec4adf473d538a7fb63e83

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                        Filesize

                                        72B

                                        MD5

                                        62a7d902c84d31c6daa9f04b50a99134

                                        SHA1

                                        8699b1bf0eeb5fe693f88380feb41cbf19ea91ea

                                        SHA256

                                        01db90a8448a21f9a6b52811345fb1f356a994d61c54cd266b3a4f5bfb497d49

                                        SHA512

                                        d3e114b398642a26c6f6b8a8cb3e6801318be1234a38457913b7f2e5ce0cb0aec80e50cd77dd83f99e8613b04faf1ad93dfd330eef928883114c67dd778469ec

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        231KB

                                        MD5

                                        af1775a840c18aa094c9a335c4422f28

                                        SHA1

                                        66ca2ac097d43334f58a69f2f05923c9d6944de3

                                        SHA256

                                        e44eb2dbb5873bf43f2a9de09a5b68928dc8139487b3309c8c1b14ebc7fedcea

                                        SHA512

                                        eb64d19c54b417e01785cdbc25048d6d40621078484449dd9d55133672dc1c66a2b1679fcd8dfb28a715052ee80a229f87d5ff90df42cb952402640c6695de22

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

                                        Filesize

                                        14KB

                                        MD5

                                        6152423819f52978b849b5be671236e4

                                        SHA1

                                        a4ee38d4cca5e990bed0d199f603477e87030fc8

                                        SHA256

                                        feb05555b6830da7aa01e6dceae23f1e4f676b174eb57d713b986217c8b2166f

                                        SHA512

                                        3f06752f38a10a299c0ebe4a2d605b2980c8841d728903a3da8de6c64c45d49dc84c2deb62274b0c2513bd388aa1510cb5589afc07278c9318d566d83a193108

                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5020_874805514\4c22efbc-3161-40c3-9865-e3274c277582.tmp

                                        Filesize

                                        150KB

                                        MD5

                                        14937b985303ecce4196154a24fc369a

                                        SHA1

                                        ecfe89e11a8d08ce0c8745ff5735d5edad683730

                                        SHA256

                                        71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff

                                        SHA512

                                        1d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c

                                      • C:\Users\Admin\AppData\Local\Temp\scoped_dir5020_874805514\CRX_INSTALL\_locales\en\messages.json

                                        Filesize

                                        711B

                                        MD5

                                        558659936250e03cc14b60ebf648aa09

                                        SHA1

                                        32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                        SHA256

                                        2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                        SHA512

                                        1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                      • memory/3576-27-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-29-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-21-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-23-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-22-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-28-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-33-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-32-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-31-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3576-30-0x0000026F9E7C0000-0x0000026F9E7C1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4536-17-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-9-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-18-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-19-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-16-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-15-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-14-0x00007FFD24533000-0x00007FFD24535000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/4536-0-0x00007FFD24533000-0x00007FFD24535000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/4536-8-0x000001305EFD0000-0x000001305EFDE000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/4536-7-0x000001305F000000-0x000001305F038000-memory.dmp

                                        Filesize

                                        224KB

                                      • memory/4536-6-0x000001305EF80000-0x000001305EF88000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/4536-5-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-4-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-3-0x00007FFD24530000-0x00007FFD24FF2000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/4536-2-0x000001305F160000-0x000001305F21A000-memory.dmp

                                        Filesize

                                        744KB

                                      • memory/4536-1-0x0000013044840000-0x0000013044868000-memory.dmp

                                        Filesize

                                        160KB