Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/04/2024, 03:08

240428-dm938aeg49 4

Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/04/2024, 03:08

General

  • Target

    http://youareanidiot.cc

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://youareanidiot.cc"
    1⤵
      PID:2872
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4840
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1104
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:752
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:620
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3488
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x390
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4920
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc03109758,0x7ffc03109768,0x7ffc03109778
        2⤵
          PID:4164
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1584 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:2
          2⤵
            PID:4648
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1796 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
            2⤵
              PID:4172
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
              2⤵
                PID:4520
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                2⤵
                  PID:1620
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2896 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                  2⤵
                    PID:2212
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3596 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                    2⤵
                      PID:1484
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4652 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                      2⤵
                        PID:428
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4788 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                        2⤵
                          PID:4088
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4668 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                          2⤵
                            PID:520
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                            2⤵
                              PID:1104
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5012 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                              2⤵
                                PID:3340
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4876 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                                2⤵
                                  PID:3708
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4952 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                                  2⤵
                                    PID:1968
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3824 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:8
                                    2⤵
                                      PID:3868
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4612 --field-trial-handle=1860,i,10861734981388544823,13905864945411793829,131072 /prefetch:1
                                      2⤵
                                        PID:4840
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:4476

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3eea6a71-97b5-4363-901f-579a02acb9f5.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        1e51e3d2332b02c4ac7aa9c0cd7d1806

                                        SHA1

                                        e08840dd67d7760f6b815f8f1816d8ad1e844c69

                                        SHA256

                                        59c4715363050173173cac8dfed3e2c52d047458455de15f790a6514926f0044

                                        SHA512

                                        de40b1ada6a47b48cfae30cfe8c84642463a9769424cbd159fdfac44a4e12d3f35121c01292513e455623bcfee7e2d72bb21f7a4e9db8ae3542ed5cb3256dadd

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        720B

                                        MD5

                                        3f65b57877a4b2721aa45e70dfa23263

                                        SHA1

                                        152af18abb05c65ae818e9139bd2316f3229faf4

                                        SHA256

                                        6986fb65461151676d9ba00a76e9219a95114471d8ed5ff082d52a9e41bd2cfe

                                        SHA512

                                        5f6212dc0d1454e082e72d3c5f4c586b68f8c77ea2508a52d74cf99bc0ef3d7a25967ecaaa4913bb759de7953736a785bd9c7532bb8e1840d93a90145fd3a77f

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        f50f89a0a91564d0b8a211f8921aa7de

                                        SHA1

                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                        SHA256

                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                        SHA512

                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        3KB

                                        MD5

                                        285436524a9b894658aa6c018d99096f

                                        SHA1

                                        4f45166dd28a8834244508ed30d98aa3de690438

                                        SHA256

                                        3b34b2b8a66fca9e5073fbd85671aff727e4ed4b8187ef05a0c708f7e07c5aee

                                        SHA512

                                        d4f495a03e039ba9b8a829d0daa515983cd6f8597f33040c68c8644826d8f675d89d4fa60c7ec627c337e1eea015f754c07059a122c4aed3585f17a2b30e4f6a

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        539B

                                        MD5

                                        948b2a15d117a0605b6e5db24071f2e6

                                        SHA1

                                        e749dacfa4067954575a3ca08fe95b5809ad8117

                                        SHA256

                                        11985273191160e811b0dbd891b531758b84579cb0615005ad631dedf1a228f1

                                        SHA512

                                        519d8de82970e3e3ed4f164f6c3c3f741de4663f37450c5b4c6b279d4706931c32b6d842448efdc7afc166303bec805f107b86dedb2c3c37096148559600246e

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        539B

                                        MD5

                                        86d3dda8e1cd3eb67d52fd108da9fd6e

                                        SHA1

                                        35728b9f8d61232ae83cdd12fe1b2f4faa41d1fe

                                        SHA256

                                        13f6b8b52f9913ae2d256d0362832ceeb9023ace5720e21063b6da085ddbebc8

                                        SHA512

                                        b0b1fe45114e68a89ab9bcded992b27931440b67a8a6769be8ffa85e102fcc391b9cecbb95072486bed48fd4b59451ed91be4f95c18c6ef624bcfbb4095b2e68

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        1KB

                                        MD5

                                        9ed51dcaab3baa35616d45b4fa860bc2

                                        SHA1

                                        08f3a3f5db93692a337135494d73589faac67317

                                        SHA256

                                        44070fe447d289df60b7b2ec7b0a75fc0bd2cbc82ff1a67c3c0953eef5854335

                                        SHA512

                                        d5fb13cc1fbed1d72be561495fe98c91d2d15aea2281e1b694122ff5f78ac948ecd35533019f65ec0d63c604c90bf6ff061ed52ff2c8234b2a2695ba0e132af6

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        426f3a850e5f11c7041b59da048dc7f7

                                        SHA1

                                        fc20a781882a6c0868964827284815371d16a25d

                                        SHA256

                                        12fe08f08adc3a692d5a35377cc4e7deecb9561abfe05279dbe47c3967ad85cb

                                        SHA512

                                        1156b80349cb533038edb809313564e7ef1a9ee846290fd143dadc04bc7eabc64a30d21539301e18cc60f8047a7f9f846eff2c51c1f4d128301747a5abf5a10a

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        016b47b791e71513cf109afe8b4682a1

                                        SHA1

                                        5732f701c90d7b448ce74ac67e47477afd354c7e

                                        SHA256

                                        51cd852220fb9f831154456a0157ecf04d8a0cd8cc6602f1c146b9bc9c8976c8

                                        SHA512

                                        6350c9282dbb7839540b46715dfc8c3e695f67131bf84f7ac4bfdefbe38a240296e302c96c031f31075e32439689737bad54bfb096f186c707ef9e2502e4b0fe

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        12KB

                                        MD5

                                        5200383dad7fe84daada65b35b667bc1

                                        SHA1

                                        c61ccd63782b9467981abccb92722a1b750a6fcb

                                        SHA256

                                        cc742f62fa2bda54c317528fe682a023944117a1252adc0c8744d00177f1eea3

                                        SHA512

                                        2bb92f618ebdb75131185e114dbac5bae70b3d6dad0c232941a136520eb73f84e5ccdab9e84628fc7fe282ba244a0a2e928f5c151b833333c8d845b7c0a521fb

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        273KB

                                        MD5

                                        a4be89714855356ee3bdfa1fb1bd0cb5

                                        SHA1

                                        f23970a84cad4cacfbfdfe55f18987a65c3c44c7

                                        SHA256

                                        10363ca5a85e604dbbf04552cb8dc48c65cf6cbadbcf3792c82b8a80e0678423

                                        SHA512

                                        54b0762adcfe4f8e0af89e6c894e97e8cb495f49a1debd1710b404302f176714fe1a1b7c266267a74d5c46205a14388704724e6c268604b4a5fd42c2917405af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\c7603fc4-7f8e-40dd-aa36-9212ec3015a6.tmp

                                        Filesize

                                        273KB

                                        MD5

                                        3ea60ffe0df8753d0a0904aa27a6b4a4

                                        SHA1

                                        b5b7757ed08bcf9ddd93747af778b245d826dfac

                                        SHA256

                                        21d0ee3588ff867e659d8d5b416d8a42e229246756f9bd7e83901060393d278e

                                        SHA512

                                        1aa1c7034184372355b71ee04de9d91cadea86a1ba06b5909a6bdb2d63088bbe4b4eb6e9450e2d01a366bec56661f4958045260d75eff880576df780206dddf8

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                        Filesize

                                        2B

                                        MD5

                                        99914b932bd37a50b983c5e7c90ae93b

                                        SHA1

                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                        SHA256

                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                        SHA512

                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\YP6L2E6G\favicon[1].ico

                                        Filesize

                                        1KB

                                        MD5

                                        0b6dcf9c1429088c7f079d7cc291bb66

                                        SHA1

                                        d23f9a17c55011a829c1365bcba999b27c4115f4

                                        SHA256

                                        4b0358b16230208179720a09d205b99a3e9764e63815b09e9f1716a02fccadcb

                                        SHA512

                                        50b3d19252cf4601c93108639c0c82cd578c1869aeedbb327a7f917c7c9142ebe893347c9a065ad8dbd61b0edcb160b5169b7272c2f3a3f807649b007461ab74

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF0CB08AFF3FC93F19.TMP

                                        Filesize

                                        16KB

                                        MD5

                                        d28dc3ca59d02a31ca16071d20fa8546

                                        SHA1

                                        08252ee00ae0a6413d16a28f547b678fd63f1139

                                        SHA256

                                        fc0fca4d6320cd57bf379c7a6efbb11c085844e2cd97b31dd5394004a1ee5db2

                                        SHA512

                                        286c4903805dc1f03ea008ccd05ea1193abd5c5299ab2dfbc89ae3a9d3b4a1f18c56a497662086ccb4e45ed6f79954f768ac648fac8aa07b514c37c9984fdd63

                                      • memory/620-43-0x0000016955300000-0x0000016955400000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/620-44-0x0000016955300000-0x0000016955400000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/620-42-0x0000016955300000-0x0000016955400000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/3488-89-0x000002E577DA0000-0x000002E577DA2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-85-0x000002E577D60000-0x000002E577D62000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-87-0x000002E577D80000-0x000002E577D82000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-81-0x000002E577D30000-0x000002E577D32000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-83-0x000002E577D50000-0x000002E577D52000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-91-0x000002E577E60000-0x000002E577E62000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/3488-93-0x000002E577E80000-0x000002E577E82000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/4840-150-0x0000021639500000-0x0000021639501000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4840-109-0x0000021642850000-0x0000021642851000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4840-110-0x0000021642860000-0x0000021642861000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4840-146-0x00000216395F0000-0x00000216395F1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/4840-143-0x000002163B370000-0x000002163B372000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/4840-0-0x000002163C120000-0x000002163C130000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4840-35-0x0000021639510000-0x0000021639512000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/4840-16-0x000002163C220000-0x000002163C230000-memory.dmp

                                        Filesize

                                        64KB