Analysis

  • max time kernel
    299s
  • max time network
    255s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/04/2024, 23:15

General

  • Target

    ea60a360bb85f11344e5c62d44b19fb5c7f9efe79c39f57a6d4c2cc759ed3400.exe

  • Size

    896KB

  • MD5

    039c36e04ac22e5fab3d34f9b4fd7fd0

  • SHA1

    115d90d18ed1d1e9e508f1a0f94a5466bdff7ddb

  • SHA256

    ea60a360bb85f11344e5c62d44b19fb5c7f9efe79c39f57a6d4c2cc759ed3400

  • SHA512

    6e061523ebc2afeefb84fce177024c297511cbdd8ea5a75fe24824af55f0568296fce9225db1383d278e25f5fc49acee607b38f401cb606b180c3a79c1dd5d36

  • SSDEEP

    12288:aqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga2T7:aqDEvCTbMWu7rQYlBQcBiT6rprG8aO7

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea60a360bb85f11344e5c62d44b19fb5c7f9efe79c39f57a6d4c2cc759ed3400.exe
    "C:\Users\Admin\AppData\Local\Temp\ea60a360bb85f11344e5c62d44b19fb5c7f9efe79c39f57a6d4c2cc759ed3400.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3496
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5004
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1904
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:196
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1684
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2212
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3824
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1916
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1540
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3632
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1228
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3692
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
      PID:4136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\3HONFD4R\edgecompatviewlist[1].xml

      Filesize

      74KB

      MD5

      d4fc49dc14f63895d997fa4940f24378

      SHA1

      3efb1437a7c5e46034147cbbc8db017c69d02c31

      SHA256

      853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

      SHA512

      cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\40UICDDR\4Kv5U5b1o3f[1].png

      Filesize

      610B

      MD5

      a81a5e7f71ae4153e6f888f1c92e5e11

      SHA1

      39c3945c30abff65b372a7d8c691178ae9d9eee0

      SHA256

      2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

      SHA512

      1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\GI3E9IBQ\favicon[1].ico

      Filesize

      5KB

      MD5

      f3418a443e7d841097c714d69ec4bcb8

      SHA1

      49263695f6b0cdd72f45cf1b775e660fdc36c606

      SHA256

      6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

      SHA512

      82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\XT2JA7TF\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\92PHZ4WQ.cookie

      Filesize

      132B

      MD5

      d772249d034b7092b20a8487d0eddfd7

      SHA1

      1dcb2554af74874331d6a1cdb1f05e85d9cec3b8

      SHA256

      f5cd9f626551d6badb651e90fb91403eff34ebb89285c8d3a9fad43d704ae02c

      SHA512

      1a2acf178c0d931a5275784072c899acc68fabd5f258ded5b3a12d1015f1e0d0801f4f4b3b503be0a8b2b68bb4c3dcdbd64d0a7be52d5710a1817217301f8977

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MJKS2CNA.cookie

      Filesize

      314B

      MD5

      abe2b72d6e53c1a6292b0382162aeee3

      SHA1

      5d6c25f1130b118c0c0e110099ee812c3f5f465b

      SHA256

      4661d1541086548fb90e8e5440e82c109225a147a1db949685460d98b6b5e7fc

      SHA512

      df428fa6c22c5a342bef5a6559fff52f4abf987c99586e2623a61b6a1eec5d7205e142d6c1c52880e3b9a0c69b6ad14fdd826bccb4b7b7c8eb00bc0f1c39dd50

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\XSHS40CW.cookie

      Filesize

      132B

      MD5

      1117ee7e46c7328e558c6a529eed88ee

      SHA1

      d837b245a1594729f216e257205ff03c9c3a1391

      SHA256

      77d956a9bfffa2ee2e02913b427b3173a17cab6ad8c11b2a839a8a3508442d6d

      SHA512

      9983531484ba15bd2dbe045e679e7b46db294ecdbc6694c9f76ba67659ea531e4b2c2cdaf1af90586076741edd00ef90efaead5591f50b6fb971519a63169fa5

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      e4631530ca2d3fdd6a35f596669e54e7

      SHA1

      68d9ab4969b7609ee8a93fa2ae766c9781748d37

      SHA256

      9e7216e6a933186a53c67090fe23f1849f1b3036897eddfed00313bef9370fb7

      SHA512

      dd58af9d8cb5e508e4d04872cb477f1cf9c04c68db87ccae04820fe351362296c5572b45ab416c08d41cb97374ceec3b0b0d28dfed750267622c5bf4dd79dad2

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      4KB

      MD5

      1bfe591a4fe3d91b03cdf26eaacd8f89

      SHA1

      719c37c320f518ac168c86723724891950911cea

      SHA256

      9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

      SHA512

      02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_C0E9A060DFB4E460CC3576DA89FF9A7C

      Filesize

      471B

      MD5

      bc281a09d3e949376c8e2dbdb0f82a3f

      SHA1

      c87b2987c450a8b07484d7772f3a0a5c52e99818

      SHA256

      674a69dd0079032ff724774bb9427aca3210977262c1ea0c5fe2bfdc8f1a3052

      SHA512

      96615636865ce92f856c476f84664fd81b8fdd6b87c10bc9ad1a99c5f98213bc57db9c31bec747cfcdfc9afc4115dade8eb8bbbf64b8c0bf45b341517bf8f58d

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      724B

      MD5

      ac89a852c2aaa3d389b2d2dd312ad367

      SHA1

      8f421dd6493c61dbda6b839e2debb7b50a20c930

      SHA256

      0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

      SHA512

      c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_9E23C1D3BC042F285396F92A9773D1F3

      Filesize

      471B

      MD5

      7d7e784f655eb849f188f2ff7b62513b

      SHA1

      0cab55085edd877b2f4fb48c6c5c02a45d3f2e7d

      SHA256

      d5af2542ad112462b260c73499fa73845e28df8ba121a9751fb1ae436b3d0f0a

      SHA512

      85c5c9b9b5c8fe99c721b754ec5dcb9de93439e8063ce6d9eee60fe8a5ac5e1b464ee60d95976c923313833770de9c14bbdf35fb67cdfcdb0abb9b1cedd68196

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      d58b900e7f7750a09ebd884d98a59e20

      SHA1

      1e6fca3696e07031f32542c6d2bdf5601cbdbd9a

      SHA256

      b13bac6bd2e5f90b9c3fde8d417dcffdeb27d4a3597c0218040b1e444e36d5aa

      SHA512

      0cd2b656efafe55dfa66197ecdf2e623f03456fd7e99e3ad11c1434903d0881ec1f01cfb8c2102af9a88ea565df08371a0035ecf8a36b0285a34cb020030e89a

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

      Filesize

      338B

      MD5

      ae88b1e34d531802aba157297605141a

      SHA1

      5f204b37220605dba4b269addfbc135cddcf602f

      SHA256

      4211d453732518f8ef64088a98f2f4eae8f9c92aca96cfa6c6c3f21437e7dde0

      SHA512

      4c48976e328a1d2063b5a2822f4ed01cb59893c798bcb683cbd785e3a32b332fa6e0082140a03a9351b996a76636d2af7e49c1ac4d1d135cb966c84114e3f7e3

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_C0E9A060DFB4E460CC3576DA89FF9A7C

      Filesize

      406B

      MD5

      e22cf06fe8decccb2f9f47ee5f5c8810

      SHA1

      27845a9998c5fa2a83e9be1d2e5e6b79c11c985a

      SHA256

      090978541b004d7d7d93ecd3a156ab54300948a85f36576e100eb36832ea726f

      SHA512

      402c107acc1f6e27cee415f3ceee03d8f70ab32555b82605fa410a91948faf80236b08858336e0e59d568818cfbf02d11d9acad2ff67f629e21de34035dcb2ba

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      cb0e5e4a81afc73af07149a79e7434c3

      SHA1

      4e2ffc3295a13dd73376820201e3954fd151736b

      SHA256

      6cf89207e50f79c3d75c2ccfbff608fb28844209ea5846162ebea5bb28e9c36f

      SHA512

      56ed653b460b6a96a1e0ece2954be4fb2ae9abd5af31b13d3c1599722999731690543e5c0f21751ffec325a8b227d9ab0a3ba72189f532dbc18b77e98c6ef9f1

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

      Filesize

      392B

      MD5

      e67a28e7f7c6b61ea7087a01051dd545

      SHA1

      a9dae44db97992a25f827f99a5e8cd906237efba

      SHA256

      d3add3a84f26d696a2f425fd764f481f343e427fed22d3576765d2e19c4aa121

      SHA512

      e76fa330faf485a2fd3ee96ae2bfa3a2de1135d975b6539fe4de3305ff5665e53a4280eb5665c08b7d141f8311632ed3400acab0a81d3efda3b71ec976470368

    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_9E23C1D3BC042F285396F92A9773D1F3

      Filesize

      406B

      MD5

      c8a52b2d7ff2b0f902214e7713d81396

      SHA1

      a547e7998666079d37fa379e6832e3964e7e0476

      SHA256

      b2d51cfff57c683197eba93d1e769813f92381ddc6eba9ab07cad6c9434b9d4d

      SHA512

      a9de504f99547b2f025a846269a6d5ce2995368db7e2c111865595da5efa84110c5da2d6bdb1af843cd93e5bccd9e49338bb4b9572b518d0c7ea193fa2f9924d

    • memory/1540-415-0x00007FFFB5423000-0x00007FFFB5424000-memory.dmp

      Filesize

      4KB

    • memory/1916-107-0x0000021DEB3E0000-0x0000021DEB3E2000-memory.dmp

      Filesize

      8KB

    • memory/1916-109-0x0000021DEB900000-0x0000021DEB902000-memory.dmp

      Filesize

      8KB

    • memory/1916-105-0x0000021DEB3A0000-0x0000021DEB3A2000-memory.dmp

      Filesize

      8KB

    • memory/2212-123-0x000002208B1F0000-0x000002208B1F2000-memory.dmp

      Filesize

      8KB

    • memory/2212-128-0x000002209E5A0000-0x000002209E5A2000-memory.dmp

      Filesize

      8KB

    • memory/2212-126-0x000002209E590000-0x000002209E592000-memory.dmp

      Filesize

      8KB

    • memory/3824-337-0x00000257D1470000-0x00000257D1472000-memory.dmp

      Filesize

      8KB

    • memory/3824-379-0x00000257D33E0000-0x00000257D33E2000-memory.dmp

      Filesize

      8KB

    • memory/3824-397-0x00000257D3940000-0x00000257D3942000-memory.dmp

      Filesize

      8KB

    • memory/3824-395-0x00000257D3930000-0x00000257D3932000-memory.dmp

      Filesize

      8KB

    • memory/3824-393-0x00000257D3910000-0x00000257D3912000-memory.dmp

      Filesize

      8KB

    • memory/3824-391-0x00000257D38F0000-0x00000257D38F2000-memory.dmp

      Filesize

      8KB

    • memory/3824-389-0x00000257D38D0000-0x00000257D38D2000-memory.dmp

      Filesize

      8KB

    • memory/3824-387-0x00000257D38B0000-0x00000257D38B2000-memory.dmp

      Filesize

      8KB

    • memory/3824-385-0x00000257D37F0000-0x00000257D37F2000-memory.dmp

      Filesize

      8KB

    • memory/3824-383-0x00000257D37D0000-0x00000257D37D2000-memory.dmp

      Filesize

      8KB

    • memory/3824-381-0x00000257D33F0000-0x00000257D33F2000-memory.dmp

      Filesize

      8KB

    • memory/3824-375-0x00000257D2430000-0x00000257D2432000-memory.dmp

      Filesize

      8KB

    • memory/3824-369-0x00000257D2460000-0x00000257D2462000-memory.dmp

      Filesize

      8KB

    • memory/3824-409-0x00000257D1180000-0x00000257D11A0000-memory.dmp

      Filesize

      128KB

    • memory/3824-161-0x00000257D1000000-0x00000257D1100000-memory.dmp

      Filesize

      1024KB

    • memory/3824-316-0x00000257D2D00000-0x00000257D2E00000-memory.dmp

      Filesize

      1024KB

    • memory/3824-249-0x00000257D1260000-0x00000257D1280000-memory.dmp

      Filesize

      128KB

    • memory/3824-231-0x00000257D1000000-0x00000257D1100000-memory.dmp

      Filesize

      1024KB

    • memory/3824-169-0x00000257D1920000-0x00000257D1940000-memory.dmp

      Filesize

      128KB

    • memory/5004-202-0x000001CD37930000-0x000001CD37931000-memory.dmp

      Filesize

      4KB

    • memory/5004-201-0x000001CD37920000-0x000001CD37921000-memory.dmp

      Filesize

      4KB

    • memory/5004-0-0x000001CD30420000-0x000001CD30430000-memory.dmp

      Filesize

      64KB

    • memory/5004-35-0x000001CD30E90000-0x000001CD30E92000-memory.dmp

      Filesize

      8KB

    • memory/5004-16-0x000001CD30620000-0x000001CD30630000-memory.dmp

      Filesize

      64KB