Analysis

  • max time kernel
    173s
  • max time network
    296s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-05-2024 19:47

General

  • Target

    https://eprst281.boo/files/blackrock.msix

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://blackrock.com/

Signatures

  • NetSupport

    NetSupport is a remote access tool sold as a legitimate system administration software.

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in Windows directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://eprst281.boo/files/blackrock.msix"
    1⤵
      PID:4472
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:516
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • NTFS ADS
      PID:1300
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2712
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2476
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:5092
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:2692
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:424
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3044
      • C:\Program Files\7-Zip\7zG.exe
        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\blackrock\" -spe -an -ai#7zMap14458:76:7zEvent23144
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4344
      • C:\Windows\System32\notepad.exe
        "C:\Windows\System32\notepad.exe" "C:\Users\Admin\Desktop\blackrock\LMgwPLLUMYUCMYqNCHLJ.ps1"
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:4380
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & 'C:\Users\Admin\Desktop\blackrock\LMgwPLLUMYUCMYqNCHLJ.ps1'"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile
          2⤵
          • Blocklisted process makes network request
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\ProgramData\netsupport\client\client32.exe
            "C:\ProgramData\netsupport\client\client32.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1016
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1708
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe -Embedding
        1⤵
        • Modifies Internet Explorer settings
        PID:4708
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:524
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Drops file in Windows directory
        • Modifies registry class
        PID:4324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\netsupport\client\NSM.LIC

        Filesize

        259B

        MD5

        1dc87146379e5e3f85fd23b25889ae2a

        SHA1

        b750c56c757ad430c9421803649acf9acd15a860

        SHA256

        f7d80e323e7d0ed1e3ddd9b5df08af23dcecb47a3e289314134d4b76b3adcaf2

        SHA512

        7861abe50eefdf4452e4baacc4b788895610196b387b70ddeab7bc70735391ed0a015f47eada94a368b82f8e5cedb5a2096e624f4a881ff067937ad159e3562c

      • C:\ProgramData\netsupport\client\PCICL32.dll

        Filesize

        3.5MB

        MD5

        ad51946b1659ed61b76ff4e599e36683

        SHA1

        dfe2439424886e8acf9fa3ffde6caaf7bfdd583e

        SHA256

        07a191254362664b3993479a277199f7ea5ee723b6c25803914eedb50250acf4

        SHA512

        6c30e7793f69508f6d9aa6edcec6930ba361628ef597e32c218e15d80586f5a86d89fcbee63a35eab7b1e0ae26277512f4c1a03df7912f9b7ff9a9a858cf3962

      • C:\ProgramData\netsupport\client\client32.exe

        Filesize

        54KB

        MD5

        9497aece91e1ccc495ca26ae284600b9

        SHA1

        a005d8ce0c1ea8901c1b4ea86c40f4925bd2c6da

        SHA256

        1b63f83f06dbd9125a6983a36e0dbd64026bb4f535e97c5df67c1563d91eff89

        SHA512

        4c892e5029a707bcf73b85ac110d8078cb273632b68637e9b296a7474ab0202320ff24cf6206de04af08abf087654b0d80cbecfae824c06616c47ce93f0929c9

      • C:\ProgramData\netsupport\client\client32.ini

        Filesize

        672B

        MD5

        b195a5ef0d805dd2acfb38e5df63b63f

        SHA1

        311e0113acba508a1ed3c64d42fd7a0f0e3af7ce

        SHA256

        2ac94a594e8583574f9a16dca49b68947e5caeac3afc6b35f59f5b8a2a819d94

        SHA512

        dc797da376790054c6c0de33b1bcefc4e1e3db8ff87026974f2ea4dfc555d10ff588031b86580d309d77fe9001e7d5c17955f83aab40d221da42cb7c3ccc5be6

      • C:\ProgramData\netsupport\client\pcicapi.dll

        Filesize

        32KB

        MD5

        dcde2248d19c778a41aa165866dd52d0

        SHA1

        7ec84be84fe23f0b0093b647538737e1f19ebb03

        SHA256

        9074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917

        SHA512

        c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\36C8J9B0\www.blackrock[1].xml

        Filesize

        13B

        MD5

        c1ddea3ef6bbef3e7060a1a9ad89e4c5

        SHA1

        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

        SHA256

        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

        SHA512

        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

        Filesize

        512KB

        MD5

        653d3409366c39a770172941db5effbb

        SHA1

        2713a503a7efc12cddef3f7bbcb9af064a53a180

        SHA256

        9ab70465b096389d12cbe725189a29c6d7901535429fcde9087a8b3ade7bac96

        SHA512

        ef8e97ff322b59eed69f18015f45df0f9bb9e6c0664dbcd1c00c3ef0078f6dfcfaebc7d87e7c19ddf9886210e6e1371724f7c22180aa388d8701d2cdd6f223f8

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFA6E70E94BA8FC868.TMP

        Filesize

        24KB

        MD5

        d3cdb7663712ddb6ef5056c72fe69e86

        SHA1

        f08bf69934fb2b9ca0aba287c96abe145a69366c

        SHA256

        3e8c2095986b262ac8fccfabda2d021fc0d3504275e83cffe1f0a333f9efbe15

        SHA512

        c0acd65db7098a55dae0730eb1dcd8aa94e95a71f39dd40b087be0b06afc5d1bb310f555781853b5a78a8803dba0fb44df44bd2bb14baeca29c7c7410dffc812

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\AUFROVTC\blackrock[1].zip

        Filesize

        31KB

        MD5

        3fb2f14b99da205ed73c2f906458d630

        SHA1

        758976ac5862ffaeee2a654149fbf73c3606c2b3

        SHA256

        4c805a93a04c1ed10f00bfe46bef82b71c032016b46ec58839b5680ffa7d39da

        SHA512

        612f4b9c2219405b1415d3508d9016a347c161ba0a763fc5070960b277f8b3dd9c79d35ad5b37b2820621635df23ecae23cdaa79988f0723c4ff837cd9352d4d

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

        Filesize

        512KB

        MD5

        942e4a49d556f755ae52a03ddaf4841b

        SHA1

        dd9d42cd4273f0e03784529749431bdbdd63e6a3

        SHA256

        8faf7cc12090394619f8f0e3ca71f353704bca06396bcad68735352b0610c1dc

        SHA512

        0d52a2829a8f65ac9828e89271420f8270fa5481265c3f522fd6babdc941e8973c7bf7bc02efa1d17ede41b23187f4bc800306f7633769a17de2e74ec48144d1

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

        Filesize

        8KB

        MD5

        0a9440f6a1485f6f0942d4df86c7cbdc

        SHA1

        ae9c322213d12356b657eec2b341d00d0b0c52fb

        SHA256

        e4feb80d87e178e7d51ffcc7d2f51b4b78432f9ce373db9b4c84ae6dd7ceb1e1

        SHA512

        b75e65c1b1c193e501d01efc36bc3261c278d2cf348a397de2d0b058cf3944da5b9c6d71727ec8f5fe9a12bc9a3c1283375b1b2197785f27ded3f2cc23bfe230

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

        Filesize

        2.0MB

        MD5

        ba516a199951bdbe37b61752e6b068bc

        SHA1

        11b76ec55620ae1f6f2557f4ae316e070a7afba0

        SHA256

        f5b22955973ed8effd299981d4c53506fc2d1214b741fe0a01c6d4350db58ef8

        SHA512

        02e3548baa2731c7cd3f48efe6426962ebeb00d7990e035963a36887b6ee9ec16145b4b4584bdb80ddf5211877ca1174375f55c1bc1bf1403f5fb6b97949e570

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

        Filesize

        16KB

        MD5

        13e06fa85bae3ae116418253ae7f8522

        SHA1

        343ea3e79173cd6c3e4155bad356a2d89f40dbe8

        SHA256

        df66d747d0a790e502f4ada5ae3f799bf4d8f1aa7a9c9e04b6f755acd2286153

        SHA512

        6bc3bb3826e9c632fb84a1fe33366456297f66582f9e31c78fbe17d460d302fd7232af169fb308aa9493b6ac4e792384f524f1c89ac8dcf24c2a176f65c9e33e

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{DE31EC15-0D75-4BE5-A113-9D2E5A3624E0}.dat

        Filesize

        4KB

        MD5

        b3b94391d8f18d4559a7906edd1c802d

        SHA1

        0edf44a48ac36a279a1eaae60dfbbb1752801ee4

        SHA256

        33a0e289019475ebd0e449d210b5aef458be8b074093d2fb4549605591e6b25a

        SHA512

        5c24731607c981ff6284bbc9366c4bfc7faabbd769e39fd8d658e296f40308fe5fa89afff70b3b1a1cbcaa96dc177d6fe1f714dc8b33766c78296ded52299691

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{52540179-E6FA-40FA-9604-67DCAC38A613}.dat

        Filesize

        4KB

        MD5

        1a5e2f901820126eb2d88d5f6dd1b45a

        SHA1

        507165358673d7de01dc168cfaaeee1b38fa11aa

        SHA256

        0b484e3010c5fb2a699459fcd13bf3be3097e519495617064559f7064df921a9

        SHA512

        acaf3b72c03a056e7eb24b79f77d2d9e43da6f3231cd50d387415a3b061150835edef9f130f76547e8677349472e8239bbd32bc968788d10ec8a3396831e4bdd

      • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{751DDF99-0890-4BD1-A6FF-497C3908D040}.dat

        Filesize

        3KB

        MD5

        eeed5247326b4e51694895298ee8d2f4

        SHA1

        066a0fe872ffe5dcbaa92c78e5f420f68cb4bcbe

        SHA256

        88bfcb5ee5de3451cbdc869a227ec702ee97e2c977d0f268d7fd4ea138be0dd5

        SHA512

        dee9db20efd57e193e65a527a01640efaad860675ae82ebb3782c23c19219aa839cc3f0aec49b71f439964ae8c9660915a08b1ec232ba34d0c4677d0b8c2fab6

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nkcsxwxx.cbw.ps1

        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • C:\Users\Admin\Desktop\blackrock\LMgwPLLUMYUCMYqNCHLJ.ps1

        Filesize

        5KB

        MD5

        13e37ce0c6fd5ca118fca61d6dbbd7c2

        SHA1

        2a084d1ef095c30e92283eda758383a83fc3ec19

        SHA256

        ebfdea1721914a504465ea474edc3f823c3e13fc71c86f04f4793c61e5070d92

        SHA512

        34a3aeed8e223987fe511dc74805f47e0d97e10afc46e1b60520dfbb5e7def8803a9e5e116913c5debeffeba7b0d74fc743867534a99f43fc57e16b45285556e

      • C:\Users\Admin\Downloads\blackrock.zip.3qvvyuf.partial

        Filesize

        1.0MB

        MD5

        1e2c2fb600bbf50b18d65ba0087da087

        SHA1

        abdc80373a470bfd44da52e245a5ba453cbc9158

        SHA256

        8684e74d35baab30e8f8af7db486c2a339d3063feb2074109b8c96c1fea8313e

        SHA512

        ed512d11c0e2560072b29352533f6563781cc7ab3978706bfa2180d522715e836b8ffb6bfdfc3b8947644afad993cfa5b87bd8c2932e15ef08856702832ff5c0

      • \ProgramData\netsupport\client\HTCTL32.DLL

        Filesize

        320KB

        MD5

        2d3b207c8a48148296156e5725426c7f

        SHA1

        ad464eb7cf5c19c8a443ab5b590440b32dbc618f

        SHA256

        edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796

        SHA512

        55c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c

      • \ProgramData\netsupport\client\PCICHEK.DLL

        Filesize

        18KB

        MD5

        a0b9388c5f18e27266a31f8c5765b263

        SHA1

        906f7e94f841d464d4da144f7c858fa2160e36db

        SHA256

        313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a

        SHA512

        6051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd

      • \ProgramData\netsupport\client\msvcr100.dll

        Filesize

        755KB

        MD5

        0e37fbfa79d349d672456923ec5fbbe3

        SHA1

        4e880fc7625ccf8d9ca799d5b94ce2b1e7597335

        SHA256

        8793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18

        SHA512

        2bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630

      • memory/516-71-0x000002A627CF0000-0x000002A627CF1000-memory.dmp

        Filesize

        4KB

      • memory/516-117-0x000002A625BA0000-0x000002A625BA2000-memory.dmp

        Filesize

        8KB

      • memory/516-16-0x000002A621920000-0x000002A621930000-memory.dmp

        Filesize

        64KB

      • memory/516-70-0x000002A627CE0000-0x000002A627CE1000-memory.dmp

        Filesize

        4KB

      • memory/516-120-0x000002A620AC0000-0x000002A620AC1000-memory.dmp

        Filesize

        4KB

      • memory/516-124-0x000002A6209D0000-0x000002A6209D1000-memory.dmp

        Filesize

        4KB

      • memory/516-35-0x000002A6209E0000-0x000002A6209E2000-memory.dmp

        Filesize

        8KB

      • memory/516-0-0x000002A621820000-0x000002A621830000-memory.dmp

        Filesize

        64KB

      • memory/1972-859-0x000001EC9F320000-0x000001EC9F32A000-memory.dmp

        Filesize

        40KB

      • memory/1972-818-0x000001EC9F340000-0x000001EC9F362000-memory.dmp

        Filesize

        136KB

      • memory/1972-799-0x000001EC9F340000-0x000001EC9F36A000-memory.dmp

        Filesize

        168KB

      • memory/1972-846-0x000001EC9F330000-0x000001EC9F342000-memory.dmp

        Filesize

        72KB

      • memory/2692-79-0x0000025206F00000-0x0000025207000000-memory.dmp

        Filesize

        1024KB

      • memory/4148-195-0x0000025C5BBC0000-0x0000025C5BDC8000-memory.dmp

        Filesize

        2.0MB

      • memory/4148-194-0x0000025C5B830000-0x0000025C5B9A6000-memory.dmp

        Filesize

        1.5MB

      • memory/4148-175-0x0000025C5B630000-0x0000025C5B6A6000-memory.dmp

        Filesize

        472KB

      • memory/4148-172-0x0000025C42C40000-0x0000025C42C62000-memory.dmp

        Filesize

        136KB

      • memory/5092-65-0x000001C750380000-0x000001C750382000-memory.dmp

        Filesize

        8KB

      • memory/5092-61-0x000001C7401A0000-0x000001C7402A0000-memory.dmp

        Filesize

        1024KB

      • memory/5092-67-0x000001C7503A0000-0x000001C7503A2000-memory.dmp

        Filesize

        8KB

      • memory/5092-62-0x000001C750350000-0x000001C750352000-memory.dmp

        Filesize

        8KB