Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-es
  • resource tags

    arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    19-04-2023 17:11

General

  • Target

    LegacyUpdate-1.6.2.exe

  • Size

    254KB

  • MD5

    5cc23ba554f28a5e459e8592edc18c47

  • SHA1

    d3871ff26904f7b7e03474b954927adec5e91a2d

  • SHA256

    956866a9772ac07ee05e6f7cb00ae2f93d9206ea6bb992f532184e6d223208ec

  • SHA512

    58a7563e19bebc5110a101d0e6795a58ea015dd7ecaf9a5a319d7b0cde1a86dd4de33decdfb66a2437f389ec4c6b70adc501586411a48b79dcf2b01ee80d1596

  • SSDEEP

    6144:gYa6ZrHMJ+qfGyvdurQSsqT9UGsafxQ9A13JffO2aW0Wlh:gYrrsR88sTttfxQCJffO2aW0Sh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LegacyUpdate-1.6.2.exe
    "C:\Users\Admin\AppData\Local\Temp\LegacyUpdate-1.6.2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\net.exe
      "C:\Windows\system32\net.exe" user /delete LegacyUpdateTemp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 user /delete LegacyUpdateTemp
        3⤵
          PID:4792
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\LockClear.mhtml
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4924 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3512
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4452
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3228
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4180
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2692
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2848
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4292

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      2a7fc714134ae90293fce5a1d9697e16

      SHA1

      c29dab1a5e37def81a3406813587a32001925f97

      SHA256

      0145704170fb3888d08d35dcfe2941c6ead410baab0e3552d78a9a402f682aad

      SHA512

      f41495e458a8b7eac03ad9def5278553784ebe35e05a984892a0a078775c472c03a80cb9c00104da9fd18f8f7bf04dd1c1da119514923cde5a4fcb696082f2bf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      434B

      MD5

      0e301a0bb07ad4f89a0974b255a594fd

      SHA1

      ea1d69a4e436bbb4dd32ee944bfb917216f0eb89

      SHA256

      ec6309da45db1094bc8e44e695bb5968d989bc1a4a4ca1d6872864587604b1ac

      SHA512

      0d0db2a95b7eaa3313fac7f63d0745226d44b6dc17354033b8b7866f4dfa6e943aae9a3dc6fa215f74c2f64097cac8e0ca50051aa387b9ea5fc66d4938200f73

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver4F0C.tmp

      Filesize

      15KB

      MD5

      1a545d0052b581fbb2ab4c52133846bc

      SHA1

      62f3266a9b9925cd6d98658b92adec673cbe3dd3

      SHA256

      557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

      SHA512

      bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\F0WVC1MM\suggestions[1].es-ES

      Filesize

      18KB

      MD5

      e2749896090665aeb9b29bce1a591a75

      SHA1

      59e05283e04c6c0252d2b75d5141ba62d73e9df9

      SHA256

      d428ea8ca335c7cccf1e1564554d81b52fb5a1f20617aa99136cacf73354e0b7

      SHA512

      c750e9ccb30c45e2c4844df384ee9b02b81aa4c8e576197c0811910a63376a7d60e68f964dad858ff0e46a8fd0952ddaf19c8f79f3fd05cefd7dbf2c043d52c5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IV9H23MJ\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CAOSQ9BC.cookie

      Filesize

      608B

      MD5

      802e1460cfc0e5411b206efb4f2f2e66

      SHA1

      cf9c03417e64d99fe9f2ced9bab59884922cf7bd

      SHA256

      d38da43f08493343e3b3ff807f8e36a0854d19cfb351f3e7fd9c5c285dc7f8a9

      SHA512

      9003d312d09c761b6351464499b38da12da79f2ea41543d16129c8155dad2540a449f1b56c815c45402fdad0686ae2801ee63353ac7361d402771faffa40d18c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QUC47YJK.cookie

      Filesize

      608B

      MD5

      4050a090940bd8cdbbd3468ca76c2cb4

      SHA1

      86083bd625b6c6802ed97bbe3eb790999b077c58

      SHA256

      5ee379bcabeac031a024aa0274ace7b77c02ff4f19f1e095e1f8da09611b53cd

      SHA512

      5a67a950d00412bf2eba574b0bcb316aa6ee64cf5a478ebe5506d8ebece38d677f17c36baefb3b364f9f604354485d72527d1bb0d1be493293d03a6476b462cc

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cache\SI2FNMNA\kernel-e08e67f3[1].js

      Filesize

      291KB

      MD5

      dd7e2dc937ff9a689913227613c4d0bf

      SHA1

      8e9038f87093458dc80ef022525c21a83090f5e4

      SHA256

      18e2e2f4a9644f7dda598a04ce4f655e2b689088eef9ce8b306de6ae1c3cabc5

      SHA512

      9da01fef5d19163c7274be23b4408a00106341b06f0c7fe25f759c9f8c644dfaf0d1c25b9b33bb8139a5b9781fe15467727de75a8d2df9d3e683baf207b37767

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cache\YR9HYHJP\kernel-a9509dac[1].css

      Filesize

      103KB

      MD5

      2211f04dd3ab3eeb333a8dccb4e1a712

      SHA1

      08227978725bbde9fa66078ad5a1783e82ad522a

      SHA256

      601f40fe6f0bbca2d003d07162b3409b0213f4de5727f21169e0858c286b56c4

      SHA512

      b2122bf8375179a8dcf4cced4532136fccf03abb04d7aec72e371f72798b22a91e2f67dfa5b7ba03dffb9cc0648bae5248b72fcd2ff4ff00be7cb96cc131b662

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\AppCache\DRS79PMN\1\jquery-2.1.1.min[1].js

      Filesize

      82KB

      MD5

      9a094379d98c6458d480ad5a51c4aa27

      SHA1

      3fe9d8acaaec99fc8a3f0e90ed66d5057da2de4e

      SHA256

      b2ce8462d173fc92b60f98701f45443710e423af1b11525a762008ff2c1a0204

      SHA512

      4bbb1ccb1c9712ace14220d79a16cad01b56a4175a0dd837a90ca4d6ec262ebf0fc20e6fa1e19db593f3d593ddd90cfdffe492ef17a356a1756f27f90376b650

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\16LL15JX\www.bing[1].xml

      Filesize

      96B

      MD5

      139263408a268277beac6e791e4a295b

      SHA1

      65a335107113cb67587903ae28dca748ea30c786

      SHA256

      ca7e1b643af7928ca9489fc2ebd2d947d6121006b6e2ba3affceb2528542848c

      SHA512

      2e1fd9eb0b300e4a7c3e14debf57cd3ff10cf2e25393716f623cd167c204d58a915ae93c50c8dc4721d1d2387438cc660b04b55460e2fc117eccfeea3d2b4e14

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\16LL15JX\www.bing[1].xml

      Filesize

      1KB

      MD5

      ba53dfa05c20a5f6dc07162ab05a5c82

      SHA1

      d26fea2aa22fcd99453e0ad54228eb5857bf7ece

      SHA256

      46f0cd9b4c25d19fc458b135500efdc2b4689c7f5c341278970e5786a6b56f2b

      SHA512

      e006c0a5345eb9c6ddd1b26389ef269a60f211777b7172b1d5f2e2a50526d6c080a6eacec591a64c311e973f0a1375489ba817a185b4738dedf063b69c8880e2

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\3CRT47NQ\www.msn[1].xml

      Filesize

      4KB

      MD5

      872fa43171c3eaa5019c14b9ea7f15e4

      SHA1

      12fb227f055c9199d13942c2a9565a49d670432a

      SHA256

      6956c824896fc04fb06ca204951dc21c148b92feab953d16da9085d601651b08

      SHA512

      42287238a9ca1384019e7a6d0e3cb951551a0783dbc0a57bd0645354f4069b96e1f889db3dcffa1e32e31f1038018e32cd79c10f9b15b62854a0bdb3a8c6c3b2

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\Windows\3720402701\2219095117.pri

      Filesize

      207KB

      MD5

      e2b88765ee31470114e866d939a8f2c6

      SHA1

      e0a53b8511186ff308a0507b6304fb16cabd4e1f

      SHA256

      523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

      SHA512

      462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\0L82TYNW\instrument22[1].htm

      Filesize

      2KB

      MD5

      ec098d4e1a36718ea29833d4af0f011b

      SHA1

      938c8a202fd2710c4f1d0792375c47149aa64b98

      SHA256

      bc4163aabf74b8fd1eb2cbb57255869c815f9bf9f01ea1da5b3b66adaed34dca

      SHA512

      837bbd530eb2d1e75d6048abfc15c398016a8032331fd8740634b3d7cd67bcb7d9a11e78b6bad6496678639fc816223bf9c90695e3e81fc11683bf65f0bc07d4

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\WGQAV3V8\rules[1].xml

      Filesize

      1.2MB

      MD5

      a87271512937a308ca9442032a0029e9

      SHA1

      bc5fd38d28683bfdf4556a499bd8184159d29301

      SHA256

      70e8f749d63636609f3d60d85c00e7a1230faccc59adcc9ead0bb9101e7d53a6

      SHA512

      d60944a41ff8969de33eecb68dbb02e09005922b5eae87e39e28e52669edbc65c605f181a82f4eac58b4fa9b0f64669d9dfc3a6e052a9d873c02bd52a821ec83

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XCO3BZKT\Favicon_EdgeStart[1].ico

      Filesize

      33KB

      MD5

      7fb4a1f2d92cec689e785fd076ae7281

      SHA1

      f3477f75f8d14dd3bcf5f50176f8cdfdcd3944f5

      SHA256

      8ffb08e22d8848b0dc64e13ef43a5db913a3b4c112f67b0346f1508f2811aeb1

      SHA512

      bfc68283080028dd1b93bf28600f2abd8cb3c375c6433649972485e027b6d72e81535221ff2c89c2e5b255dc24ef3a1db28129a95eb872f236ca624f1ca9d02c

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\eoyoh0b\imagestore.dat

      Filesize

      34KB

      MD5

      51b23d4eba253a5cc75b3b42e6f8094a

      SHA1

      839ae96824c142b2115706ff5e3e887c7f17ad32

      SHA256

      047474f269e821debf11cafb5ea25c072d6bd93e44845e8e506c0e10c7607dac

      SHA512

      15f54387106de89ec92afee2964ad7851836b65e26dc3bdf112ac5a3824ced9b6551fb50a87914da19dafeaadc746ff72dc845ca9300dfb48d31f2a0f9eef279

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      f7dcb24540769805e5bb30d193944dce

      SHA1

      e26c583c562293356794937d9e2e6155d15449ee

      SHA256

      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

      SHA512

      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

    • \Users\Admin\AppData\Local\Temp\nsh99F5.tmp\System.dll

      Filesize

      12KB

      MD5

      cff85c549d536f651d4fb8387f1976f2

      SHA1

      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

      SHA256

      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

      SHA512

      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

    • \Users\Admin\AppData\Local\Temp\nsh99F5.tmp\UserInfo.dll

      Filesize

      4KB

      MD5

      2f69afa9d17a5245ec9b5bb03d56f63c

      SHA1

      e0a133222136b3d4783e965513a690c23826aec9

      SHA256

      e54989d2b83e7282d0bec56b098635146aab5d5a283f1f89486816851ef885a0

      SHA512

      bfd4af50e41ebc56e30355c722c2a55540a5bbddb68f1522ef7aabfe4f5f2a20e87fa9677ee3cdb3c0bf5bd3988b89d1224d32c9f23342a16e46c542d8dc0926

    • \Users\Admin\AppData\Local\Temp\nsh99F5.tmp\w7tbp.dll

      Filesize

      2KB

      MD5

      9a3031cc4cef0dba236a28eecdf0afb5

      SHA1

      708a76aa56f77f1b0ebc62b023163c2e0426f3ac

      SHA256

      53bb519e3293164947ac7cbd7e612f637d77a7b863e3534ba1a7e39b350d3c00

      SHA512

      8fddde526e7d10d77e247ea80b273beae9dde1d4112806f1f5c3e6a409247d54d8a4445ab5bdd77025a434c3d1dcfdf480dac21abbdb13a308d5eb74517fab53

    • memory/2848-620-0x000001E45EA30000-0x000001E45EA50000-memory.dmp

      Filesize

      128KB

    • memory/2848-541-0x000001E4604C0000-0x000001E4604C2000-memory.dmp

      Filesize

      8KB

    • memory/2848-275-0x000001E45E100000-0x000001E45E200000-memory.dmp

      Filesize

      1024KB

    • memory/2848-764-0x000001E44D440000-0x000001E44D450000-memory.dmp

      Filesize

      64KB

    • memory/2848-763-0x000001E44D440000-0x000001E44D450000-memory.dmp

      Filesize

      64KB

    • memory/2848-264-0x000001E460700000-0x000001E460702000-memory.dmp

      Filesize

      8KB

    • memory/2848-261-0x000001E4605E0000-0x000001E4605E2000-memory.dmp

      Filesize

      8KB

    • memory/2848-257-0x000001E4605B0000-0x000001E4605B2000-memory.dmp

      Filesize

      8KB

    • memory/2848-402-0x000001E471DA0000-0x000001E471DC0000-memory.dmp

      Filesize

      128KB

    • memory/2848-252-0x000001E460570000-0x000001E460572000-memory.dmp

      Filesize

      8KB

    • memory/2848-243-0x000001E45DEC0000-0x000001E45DEE0000-memory.dmp

      Filesize

      128KB

    • memory/2848-494-0x000001E460430000-0x000001E460432000-memory.dmp

      Filesize

      8KB

    • memory/2848-496-0x000001E460450000-0x000001E460452000-memory.dmp

      Filesize

      8KB

    • memory/2848-498-0x000001E460460000-0x000001E460462000-memory.dmp

      Filesize

      8KB

    • memory/2848-514-0x000001E460490000-0x000001E460492000-memory.dmp

      Filesize

      8KB

    • memory/2848-308-0x000001E4609C0000-0x000001E4609C2000-memory.dmp

      Filesize

      8KB

    • memory/2848-545-0x000001E461150000-0x000001E461152000-memory.dmp

      Filesize

      8KB

    • memory/2848-233-0x000001E45E360000-0x000001E45E380000-memory.dmp

      Filesize

      128KB

    • memory/2848-627-0x000001E474100000-0x000001E474200000-memory.dmp

      Filesize

      1024KB

    • memory/2848-628-0x000001E474100000-0x000001E474200000-memory.dmp

      Filesize

      1024KB

    • memory/2848-222-0x000001E44D480000-0x000001E44D482000-memory.dmp

      Filesize

      8KB

    • memory/2848-220-0x000001E44D460000-0x000001E44D462000-memory.dmp

      Filesize

      8KB

    • memory/2848-217-0x000001E44D430000-0x000001E44D432000-memory.dmp

      Filesize

      8KB

    • memory/4452-191-0x00000141065A0000-0x00000141065A2000-memory.dmp

      Filesize

      8KB

    • memory/4452-327-0x0000014109690000-0x0000014109691000-memory.dmp

      Filesize

      4KB

    • memory/4452-328-0x00000141096A0000-0x00000141096A1000-memory.dmp

      Filesize

      4KB

    • memory/4452-190-0x0000014106530000-0x0000014106532000-memory.dmp

      Filesize

      8KB

    • memory/4452-188-0x00000141063F0000-0x00000141063F2000-memory.dmp

      Filesize

      8KB

    • memory/4452-186-0x00000141062A0000-0x00000141062A1000-memory.dmp

      Filesize

      4KB

    • memory/4452-167-0x0000014101CC0000-0x0000014101CD0000-memory.dmp

      Filesize

      64KB

    • memory/4452-149-0x0000014101820000-0x0000014101830000-memory.dmp

      Filesize

      64KB