Analysis

  • max time kernel
    1209s
  • max time network
    1172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    17/02/2024, 17:05

General

  • Target

    Remove-Edge.exe

  • Size

    7.7MB

  • MD5

    1d966f5a33ae6612e313c6dd6913c25c

  • SHA1

    117434104215609d07ef50ee39c12fa6f29fa093

  • SHA256

    b6fab3f62e29a08e0ca648b84a99e8144e80e320c626175e995d9b1ac78d7b1f

  • SHA512

    5967a2b6da51631f1d5bd18025f94a21a6f1e1237bb5fcd35788464801e2b8828a0c4cf603e2cd88beeba6bb9d9a14a61e0dfe02033f0ead51d7d28dcc06a5e3

  • SSDEEP

    196608:y/8Olb2w9+L0YFqQxA10++MvJHDO6D3U/7F1g:yplq5L0HQK1HnEzFa

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Registers COM server for autorun 1 TTPs 2 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 57 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remove-Edge.exe
    "C:\Users\Admin\AppData\Local\Temp\Remove-Edge.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\Remove-Edge.exe
      "C:\Users\Admin\AppData\Local\Temp\Remove-Edge.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe
        C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe --uninstall --system-level --force-uninstall
        3⤵
        • Modifies Installed Components in the registry
        • Checks computer location settings
        • Executes dropped EXE
        • Registers COM server for autorun
        • Drops desktop.ini file(s)
        • Installs/modifies Browser Helper Object
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4560
        • C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe
          C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 --annotation=exe=C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x21c,0x220,0x224,0x1f4,0x228,0x7ff6020deb10,0x7ff6020deb20,0x7ff6020deb30
          4⤵
          • Executes dropped EXE
          PID:2692
        • C:\Windows\system32\wermgr.exe
          "C:\Windows\system32\wermgr.exe" "-outproc" "0" "4560" "2120" "1960" "2124" "0" "0" "0" "0" "0" "0" "0" "0"
          4⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          PID:4404
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell "(New-Object System.Security.Principal.NTAccount($env:USERNAME)).Translate([System.Security.Principal.SecurityIdentifier]).Value"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -NoProfile -Command "Get-AppxPackage -AllUsers | Where-Object {$_.PackageFullName -like \"*microsoftedge*\"} | Select-Object -ExpandProperty PackageFullName"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1880
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdgeDevToolsClient_1000.19041.1023.0_neutral_neutral_8wekyb3d8bbwe 2>$null"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdgeDevToolsClient_1000.19041.1023.0_neutral_neutral_8wekyb3d8bbwe -AllUsers 2>$null"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdge_44.19041.1266.0_neutral__8wekyb3d8bbwe 2>$null"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Remove-AppxPackage -Package Microsoft.MicrosoftEdge_44.19041.1266.0_neutral__8wekyb3d8bbwe -AllUsers 2>$null"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c "rmdir /q /s "C:\ProgramData\Microsoft\EdgeUpdate""
        3⤵
          PID:2724
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /query /fo csv
          3⤵
            PID:3676
          • C:\Windows\SysWOW64\reg.exe
            reg delete "HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{9459C573-B17A-45AE-9F64-1857B5D58CEE}" /f
            3⤵
              PID:3700
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.MicrosoftEdge.Stable_8wekyb3d8bbwe
          1⤵
            PID:5088
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k UnistackSvcGroup
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3000

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                  Filesize

                  1KB

                  MD5

                  4280e36a29fa31c01e4d8b2ba726a0d8

                  SHA1

                  c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                  SHA256

                  e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                  SHA512

                  494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  16KB

                  MD5

                  2bd88289d27472ccb69f23c7ef1f9f09

                  SHA1

                  35c0cf75d359d5d566351add09ce68e5894b95ad

                  SHA256

                  f293dd8c96ac54734a2c05ab3faad87b1f0ac25345113ba8d9222e46d88333b4

                  SHA512

                  949b11770b423930e98deba2bc51edd8cc6d72dcb9ba792aa47e98c23429b7cc9a091d6d6808e81805b927a347fbba1c9d75ac3bedac496a1091ac3994c53638

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  17KB

                  MD5

                  d5b65db3ad90584193bbf33e35961e99

                  SHA1

                  b4886ba9ff018e6e5c44f4d635332244f1ddb373

                  SHA256

                  6c262dee8c3ce9fb7334b08b634a947ad389d5762a9cd1311e01da88b14440f8

                  SHA512

                  afd8e875f2dbd94923d0eb2e214485cb4ad2e6f78841a159e926023316d36889ba3a30f792648612652d976c5dd30045c12a63ff19471571942d3de8387c1c3f

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  17KB

                  MD5

                  5e088d55ead779f3819c81f50eba2b83

                  SHA1

                  95d0ba2ee67155eb907d527b6f0c4498efc0d97c

                  SHA256

                  d9fbec90cfcab90331f3375d337196fc5b14628ac5f5d2705856b8f4f8d0c813

                  SHA512

                  17cb422c7ebda3e5b13b9620437d00e8028b3eb443e92e08471ea76a41541e861053994a83f6cbb6972bc2481e1698364eb7d28a11c576f30f39f015caa9e24e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  19KB

                  MD5

                  e8c4ef88b28f9a13b8f8d8d29f8f7122

                  SHA1

                  45510069d6302d067f6c9cb9a4be0ee2bd00be68

                  SHA256

                  bb7be6ece4c82ad888b1c44731e3a3b898d6579cf4be223b265b5579e70cd235

                  SHA512

                  119b78356711b9348bddb00ecc210d8baa8a6d88255b0047db80307bb726b242b45ae38837b63801124485fffe92fdf16a9ad8663184b6ed9ae49cab4d5cb44e

                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                  Filesize

                  17KB

                  MD5

                  6526657870dc2417eb5fb8f91860e032

                  SHA1

                  9056f6578211dabdf2bfefd8a8d74c4099ccd967

                  SHA256

                  8051f563e9bb79297aa30cf0ed3ca81d044238acd715c1fde1d90acc7c63f8d3

                  SHA512

                  f78cf57f88891476e49234fc4abc2c1e4ecf178b27e0b068e2349cef50fcd9a6a90990d3dcb36a7c9ae45ce531af159e788c253ae874df255a0d741d1dbef0f6

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\VCRUNTIME140.dll

                  Filesize

                  88KB

                  MD5

                  17f01742d17d9ffa7d8b3500978fc842

                  SHA1

                  2da2ff031da84ac8c2d063a964450642e849144d

                  SHA256

                  70dd90f6ee01854cecf18b1b6d1dfbf30d33c5170ba07ad8b64721f0bdcc235e

                  SHA512

                  c4e617cd808e48cc803343616853adf32b7f2e694b5827392219c69145a43969384d2fc67fa6fa0f5af1ca449eb4932004fbcdd394a5ba092212412b347586f0

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_bz2.pyd

                  Filesize

                  79KB

                  MD5

                  e4519f30e22cd8d4bfe7059d60183ce0

                  SHA1

                  40fb4def438aa07738961a9f25e7ea1be0c60e7f

                  SHA256

                  580f42dedd0e70bd7431916ee27db3202b822712af03f418546da89a4c0ad0b1

                  SHA512

                  5271a99202c9a1e5266a0deaf58c65f0a8fced8b2f1019e80260a79f64b3afdaf22dca72c218c9b3253afe12ac803c5d1ca955b8b29f1c481eff1d584352b02b

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_ctypes.pyd

                  Filesize

                  105KB

                  MD5

                  9c2163d73a2ecdaf34a613c703a13440

                  SHA1

                  f4fcb291c311695d1f5da95020583ecc2aa18ec6

                  SHA256

                  3bdb7150ad0304035a5f25c69ec6d6ea25c87d056b6713f29a8be96f2b17d057

                  SHA512

                  fd1f96220421a3b63a6b6046cb985093aa41a17ea24adc114c9c54a80d7558be90fcfe56032787ab653ed340b3c8c5b75bd334875d68c85e9a725595cd53779f

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_decimal.pyd

                  Filesize

                  194KB

                  MD5

                  75f984ae9e97d34293aa1b452baeb15d

                  SHA1

                  5d6de679ed6fd1155f997bdd2b686ec5d1be4f13

                  SHA256

                  edc9caa73ae4e606012152a6531336c667092cd14a1f03f3166ec8e0b25b48a7

                  SHA512

                  34a7c72ac5f3f9a28c3a64e6e7d318a5ec81c6e22e03a0e173d65745ba6d8eb1eb3bc411d43678345448977d078849171c506814f0b96f650024a51082b50fe4

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_hashlib.pyd

                  Filesize

                  48KB

                  MD5

                  61ff2a1a01d6dcd0626441c6888f2bf3

                  SHA1

                  ecacdb63666d539c03d2a0efdf4b30b24824d3cb

                  SHA256

                  ae886b9bf59f27bbe4f846972bc22baf550cae46dc6dbc820eafad523ae7da04

                  SHA512

                  6c089ac9299efb84f6e48259726be799c51b0a2a6cd67104ca8b43cf1aaa6e838ec34c5cfc09c484c93efb59b24bd85aa3a83f098d3e95b6bc01a1fd09943638

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_lzma.pyd

                  Filesize

                  145KB

                  MD5

                  e40cbb898cb17b0f60a67216a6b5cc4d

                  SHA1

                  dc724af9e03a02e1121697a94603bda9d4cff345

                  SHA256

                  ceb38183cc7f2b513588f9d6d1713d115cee127ad06d146de5b230504e126538

                  SHA512

                  5646ecbf555d8ab369c2c03dca720aa738d1af515fb7302ceffbfcfa65661083c009d6a5aa723d09bb330e10b10ec8509450f4c1b90733c4aeb85c895d4d63bd

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\_socket.pyd

                  Filesize

                  67KB

                  MD5

                  943124d117b6e9548f6a9d0c34009b52

                  SHA1

                  1acacb610ed41ab78eea2d093a35f48284698bd0

                  SHA256

                  5a60284ec53036fedad0057a564f709ab328c8ac77084191d6350d2001004fe2

                  SHA512

                  89eb4b4163fc3ae29dce7cdd7ca28392c378e5858bbd43a3f556c836284c067406d67eb228047767202c955539cbeaef4228bd2aa8c25627f96d56c35877e89d

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\base_library.zip

                  Filesize

                  1.4MB

                  MD5

                  81cd6d012885629791a9e3d9320c444e

                  SHA1

                  53268184fdbddf8909c349ed3c6701abe8884c31

                  SHA256

                  a18892e4f2f2ec0dee5714429f73a5add4e355d10a7ba51593afc730f77c51dd

                  SHA512

                  d5bf47fad8b1f5c7dcaa6bef5d4553e461f46e6c334b33d8adc93689cf89365c318f03e961a5d33994730b72dc8bde62209baca015d0d2d08a081d82df7dfd73

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\libcrypto-3.dll

                  Filesize

                  3.3MB

                  MD5

                  9a76997e6836c479c5e1993cbb3cefae

                  SHA1

                  6747a82434daa76239c68e1f75c26f4420f4832d

                  SHA256

                  bdbf2ff122354b0e219df81293de186cecfd966fce64e3831b798ffd7c3fc815

                  SHA512

                  5fb3f7eeb770f1bdcb06558081441e9fc9bbc618059e33f6864afeb3474033ec1be036cbc5503b74cb56b82894976f03f87e15f1ef5e5bf779de78e15a0c2cdf

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\libffi-8.dll

                  Filesize

                  34KB

                  MD5

                  74d2b5e0120a6faae57042a9894c4430

                  SHA1

                  592f115016a964b7eb42860b589ed988e9fff314

                  SHA256

                  b982741576a050860c3f3608c7b269dbd35ab296429192b8afa53f1f190069c0

                  SHA512

                  f3c62f270488d224e24e29a078439736fa51c9ac7b0378dd8ac1b6987c8b8942a0131062bd117977a37046d4b1488f0f719f355039692bc21418fdfbb182e231

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\python311.dll

                  Filesize

                  4.7MB

                  MD5

                  9c83364db2337cedb50cefce5772bf28

                  SHA1

                  6a65ce4bec369e2e2f6aa19e52ac556ceb3445fc

                  SHA256

                  89b71fca8d164d6e7a98967036212aa1fb28f5554e2a1b1042556c22c514ac16

                  SHA512

                  e3608ced277fce1e64a0d371b928a5bfc0e00d93a3f020a56f698b1aa2f18a80fc726a9f7c25b8d8d98a2b95ca49a03a254b3c704c08772abaadee0b01f8aa48

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\select.pyd

                  Filesize

                  26KB

                  MD5

                  e64bdec75ee2e467343742db636c6105

                  SHA1

                  32645de632215f6410abc1e7102a98cac127ae95

                  SHA256

                  109146def651028ad4d788a7c6712558f246417410248e2cbcdf0e8c11efad77

                  SHA512

                  7219b52f4f71048ce1c96aeba4b14d12e8366f7265bc06292f036511ee4b47df7be56e438d88915d92772879ec4d25bb1217e34dfea427b391334edc16705f60

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\setup.exe

                  Filesize

                  3.6MB

                  MD5

                  593b7497327222d69048f7f6204b1886

                  SHA1

                  56ee397b91b5235ad5fb3259e35676c633b46022

                  SHA256

                  4963532e63884a66ecee0386475ee423ae7f7af8a6c6d160cf1237d085adf05e

                  SHA512

                  45999be23e1ae2229575e6f32e56b57a732f51f015b2edb31653837a5592d6ed0edb29783eb21a18a42585ea5c0a50a8a996732233a2202f66eb1242d2a56fc1

                • C:\Users\Admin\AppData\Local\Temp\_MEI17922\unicodedata.pyd

                  Filesize

                  1.1MB

                  MD5

                  53f8f7e0caaece4a0977a1a6a4663197

                  SHA1

                  37a259658c970c3aaf527e32454c208cd19331a7

                  SHA256

                  cb85c4932833fc0f5606c6e774a4b9661adcd1a0f8146294eca7ff27418de26c

                  SHA512

                  a3ffa42bc0c7c0529e7936397a4b644f38fec3fae13ac4890f23dd905ce33fe81fe208e0d7f2fcb6f34515f6c95dd030f457d2725bae5b6d4f58646fd84ebf6d

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wrldd0e5.prx.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Microsoft Edge.lnk

                  Filesize

                  2KB

                  MD5

                  920e801028de933069fc2c20ab7ed39d

                  SHA1

                  85ab3a907f818dfcc5c8f92cf86c5e90ae4e5347

                  SHA256

                  53551f4d876a940d5190abbcbd0e478934c0d02ce1cb9d12042a091e1afd303c

                  SHA512

                  b510dae771b5d6f70dec42150e27dc78770f8c5e08e737e4ef6dbce9cc17751a1d05829355c28eab36f6d85a21a20f5689c04be6fea21a2775666aa3565509bd

                • memory/936-255-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/936-231-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/936-257-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/936-233-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/936-232-0x0000000004E90000-0x0000000004EA0000-memory.dmp

                  Filesize

                  64KB

                • memory/936-244-0x000000007F9C0000-0x000000007F9D0000-memory.dmp

                  Filesize

                  64KB

                • memory/936-245-0x00000000700D0000-0x000000007011C000-memory.dmp

                  Filesize

                  304KB

                • memory/1520-281-0x0000000003380000-0x0000000003390000-memory.dmp

                  Filesize

                  64KB

                • memory/1520-271-0x00000000700D0000-0x000000007011C000-memory.dmp

                  Filesize

                  304KB

                • memory/1520-282-0x0000000003380000-0x0000000003390000-memory.dmp

                  Filesize

                  64KB

                • memory/1520-259-0x0000000003380000-0x0000000003390000-memory.dmp

                  Filesize

                  64KB

                • memory/1520-260-0x0000000003380000-0x0000000003390000-memory.dmp

                  Filesize

                  64KB

                • memory/1520-258-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1520-284-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1880-197-0x0000000006090000-0x000000000609A000-memory.dmp

                  Filesize

                  40KB

                • memory/1880-177-0x0000000006160000-0x00000000064B4000-memory.dmp

                  Filesize

                  3.3MB

                • memory/1880-167-0x0000000005050000-0x0000000005060000-memory.dmp

                  Filesize

                  64KB

                • memory/1880-166-0x0000000005050000-0x0000000005060000-memory.dmp

                  Filesize

                  64KB

                • memory/1880-165-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/1880-180-0x0000000007680000-0x00000000076B2000-memory.dmp

                  Filesize

                  200KB

                • memory/1880-181-0x00000000700D0000-0x000000007011C000-memory.dmp

                  Filesize

                  304KB

                • memory/1880-179-0x000000007FD50000-0x000000007FD60000-memory.dmp

                  Filesize

                  64KB

                • memory/1880-191-0x0000000005050000-0x0000000005060000-memory.dmp

                  Filesize

                  64KB

                • memory/1880-192-0x00000000076C0000-0x00000000076DE000-memory.dmp

                  Filesize

                  120KB

                • memory/1880-193-0x0000000005050000-0x0000000005060000-memory.dmp

                  Filesize

                  64KB

                • memory/1880-194-0x00000000079A0000-0x0000000007A43000-memory.dmp

                  Filesize

                  652KB

                • memory/1880-195-0x0000000007AE0000-0x0000000007AF6000-memory.dmp

                  Filesize

                  88KB

                • memory/1880-196-0x0000000007CB0000-0x0000000007CC6000-memory.dmp

                  Filesize

                  88KB

                • memory/1880-198-0x0000000007D10000-0x0000000007D36000-memory.dmp

                  Filesize

                  152KB

                • memory/1880-200-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3000-86-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-102-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-47-0x000001FA3FE40000-0x000001FA3FE50000-memory.dmp

                  Filesize

                  64KB

                • memory/3000-63-0x000001FA3FF40000-0x000001FA3FF50000-memory.dmp

                  Filesize

                  64KB

                • memory/3000-79-0x000001FA48250000-0x000001FA48251000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-125-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-118-0x000001FA482A0000-0x000001FA482A1000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-121-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-81-0x000001FA48280000-0x000001FA48281000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-117-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-82-0x000001FA48280000-0x000001FA48281000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-115-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-83-0x000001FA48390000-0x000001FA48391000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-112-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-84-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-111-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-110-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-109-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-106-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-103-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-100-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-126-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-98-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-97-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-95-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-94-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-93-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-92-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-91-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-90-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-89-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-88-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-87-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3000-85-0x000001FA48290000-0x000001FA48291000-memory.dmp

                  Filesize

                  4KB

                • memory/3276-311-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3276-309-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

                  Filesize

                  64KB

                • memory/3276-299-0x00000000700D0000-0x000000007011C000-memory.dmp

                  Filesize

                  304KB

                • memory/3276-298-0x000000007FD50000-0x000000007FD60000-memory.dmp

                  Filesize

                  64KB

                • memory/3276-287-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

                  Filesize

                  64KB

                • memory/3276-286-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

                  Filesize

                  64KB

                • memory/3276-285-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4408-153-0x0000000005390000-0x00000000053A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4408-139-0x00000000053F0000-0x0000000005456000-memory.dmp

                  Filesize

                  408KB

                • memory/4408-113-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4408-116-0x0000000002160000-0x0000000002170000-memory.dmp

                  Filesize

                  64KB

                • memory/4408-114-0x00000000020E0000-0x0000000002116000-memory.dmp

                  Filesize

                  216KB

                • memory/4408-120-0x0000000004B50000-0x0000000005178000-memory.dmp

                  Filesize

                  6.2MB

                • memory/4408-119-0x0000000002160000-0x0000000002170000-memory.dmp

                  Filesize

                  64KB

                • memory/4408-132-0x0000000004940000-0x00000000049C6000-memory.dmp

                  Filesize

                  536KB

                • memory/4408-136-0x0000000004B00000-0x0000000004B22000-memory.dmp

                  Filesize

                  136KB

                • memory/4408-140-0x0000000005460000-0x00000000054C6000-memory.dmp

                  Filesize

                  408KB

                • memory/4408-148-0x00000000054D0000-0x0000000005824000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4408-163-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4408-160-0x0000000006130000-0x000000000614A000-memory.dmp

                  Filesize

                  104KB

                • memory/4408-159-0x0000000007210000-0x000000000788A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/4408-158-0x0000000005C10000-0x0000000005C5C000-memory.dmp

                  Filesize

                  304KB

                • memory/4408-157-0x0000000005BD0000-0x0000000005BEE000-memory.dmp

                  Filesize

                  120KB

                • memory/4408-156-0x0000000005A70000-0x0000000005B74000-memory.dmp

                  Filesize

                  1.0MB

                • memory/5112-201-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB

                • memory/5112-202-0x00000000050A0000-0x00000000050B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5112-228-0x0000000007F40000-0x0000000007F48000-memory.dmp

                  Filesize

                  32KB

                • memory/5112-203-0x00000000050A0000-0x00000000050B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5112-213-0x0000000006190000-0x00000000064E4000-memory.dmp

                  Filesize

                  3.3MB

                • memory/5112-215-0x000000007FA20000-0x000000007FA30000-memory.dmp

                  Filesize

                  64KB

                • memory/5112-216-0x00000000700D0000-0x000000007011C000-memory.dmp

                  Filesize

                  304KB

                • memory/5112-217-0x00000000050A0000-0x00000000050B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5112-227-0x00000000050A0000-0x00000000050B0000-memory.dmp

                  Filesize

                  64KB

                • memory/5112-230-0x00000000742B0000-0x0000000074A60000-memory.dmp

                  Filesize

                  7.7MB