Analysis

  • max time kernel
    299s
  • max time network
    225s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-05-2024 23:05

General

  • Target

    304ce35de7269192a5980747035eda59daaf01f0689b02b3676c32c4e5f35198.exe

  • Size

    894KB

  • MD5

    e253344ce4058f026e27ea14a115f288

  • SHA1

    0b17a2dd2296cbe67567e04ba3db0ad5423c2b8c

  • SHA256

    304ce35de7269192a5980747035eda59daaf01f0689b02b3676c32c4e5f35198

  • SHA512

    cde1e2a6ddbd3122ca223e77d711419df4ebfdd79cc66f04b6d320b28601a25b0c01ab877c14b8f9a82ffb595d9767d9428d92c15e49bf0378efb580a86f5463

  • SSDEEP

    12288:3qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Tv:3qDEvCTbMWu7rQYlBQcBiT6rprG8aAv

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\304ce35de7269192a5980747035eda59daaf01f0689b02b3676c32c4e5f35198.exe
    "C:\Users\Admin\AppData\Local\Temp\304ce35de7269192a5980747035eda59daaf01f0689b02b3676c32c4e5f35198.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4472
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4488
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:4448
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2904
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1848
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3048
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:5080
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1852
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4424
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2156
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1752
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:5036
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\1HF6SLX6\4Kv5U5b1o3f[1].png

    Filesize

    610B

    MD5

    a81a5e7f71ae4153e6f888f1c92e5e11

    SHA1

    39c3945c30abff65b372a7d8c691178ae9d9eee0

    SHA256

    2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

    SHA512

    1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\89XHYHZL\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\H840JZM3\favicon[1].ico

    Filesize

    5KB

    MD5

    f3418a443e7d841097c714d69ec4bcb8

    SHA1

    49263695f6b0cdd72f45cf1b775e660fdc36c606

    SHA256

    6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

    SHA512

    82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\6KFQ6OFT.cookie

    Filesize

    394B

    MD5

    c2d3b38172dac9b141eab1191808d6a9

    SHA1

    bd2042b4e9af2ce40071b2e863c138ba3322626d

    SHA256

    13a8cab0a0a329bef1b5a40e803bd05c9f41a55dd3b7459b0c821b5499f5661e

    SHA512

    8a50b310b71f52089a0a40f3a20f7b2d5faa0d68f18008c48e3846fdf26b62c06bddeb0653ca4e0b6c6b6664bc67dd5b938726b047642cf05ea11f0595cfeb47

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\FQ17Q4OA.cookie

    Filesize

    132B

    MD5

    7cc54ce01146876d19c883fb6d2c1df6

    SHA1

    6b0fbb6db508fdf93db3a1a739489cebfbcf60f4

    SHA256

    69daa4ef3b4f273af93100d7f5c3f1b2402d8b4136925d1424f3801dd3ef1f13

    SHA512

    8b1382e5b9dddf800459d63a86729ed14fcfbd2b77f4e25ed03a9d9685023b0dac16bac62bb4d07164b68c526c7308bb65791610e0c9df6969241050f423992e

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RY0JBVRG.cookie

    Filesize

    311B

    MD5

    0e6eb79afd21a130f2d51e5fe99bfb59

    SHA1

    e828172f226043204eb728dab5fc09d62fc2bee5

    SHA256

    11ee35c6a3ae7cc0e5bea5a7e2ae150fb2dac296965a545cc5313847dc17ef23

    SHA512

    7a9fb0d5a59b5a43d86c15b9a1ee726239d6fa6d41b463020b6926d9a730eb00d669ea5c59b7021298eb7a09cc1c3827a487e4f4d586d083416913eb87c219ab

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\WJPX8XDT.cookie

    Filesize

    132B

    MD5

    6e734045d967fe2267d58fcebb756e33

    SHA1

    959f63ef677b497c3a6880fdc4d61c004e174445

    SHA256

    9d771c87658e871980fbce7517c1c124e21dc0afc8a24ac82989d18c8ac2a1be

    SHA512

    0477078533de3aa854f64bac6bb8c7031833c6070c987c803de86dc1dfbe7d8a399f520b268409590d969b663889c711da7cfb99e5d184cc877f0169cae1d18e

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    6e66bd2d283b36991f7460262e5ff4ae

    SHA1

    eb6906c6d9350ef0b8ff2edd81c3e51649b4a916

    SHA256

    564b4fa6970bf22294bceca2fb8f53087f3f5dec9565872d731cedd80aa9e7c3

    SHA512

    974fef50144e97b5bbae326f07ec863082693396e85dd42a0f85c86b6a3d0928b2da485cb7b3e541942d3c9bf49ce2f8063acf0ced79d6ed755928fdba453727

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_C700CFEB3E6527B324BD8C263072E83F

    Filesize

    471B

    MD5

    75688713ae4dc2cb0df526bad6fdad3d

    SHA1

    147426cb0f63f3e28f1077e86b8c90785901de65

    SHA256

    8aec98ca15697d2f0fb70283a93b3d4f36ca9987e01b20267823f0a5068ef25f

    SHA512

    0c6737122a613d4797362579206d1f136b1144fb6ec87dbbf7eb637ac1697124cdb264cd840013e7151dcbb805c841ebe0dcde17fd3b0406cc6039b5a0e264c6

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    609f4fad96fa84fff4e6a0720bbd07e4

    SHA1

    0d6e6654bbbdeb11831a6de1942a98ed67494ce8

    SHA256

    d247153236c81873cb2a07f18e7e81c5cbe72a00c46f2f65cf44aca150c9e962

    SHA512

    a83b538882d4e5766ecc3349744adbeedff1e9c6f2997a985740144829b2a83b9b600bfc72404d01d0931efe8bc5f67559f7a5e2decf16ab33dbe484bd0de718

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    fd35d1d9402071f0f932626608dc678f

    SHA1

    cb0a2cc0e7beea7a78511ea12546075254df6fde

    SHA256

    3100e0f11a8d78d9dea3248912dd73fe69b1bda098623638f865320f70f862ae

    SHA512

    8dc9aa077cf222cceb3530cb900c1ea1ed629fabb5b388935b3611ea4e7a1906865568d2ea78530169d9fbc74af3b7b64cfe30cb364a813c6d22611099e6a3d5

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    2f99c06c1d82ffec5a6cb4eef1733b07

    SHA1

    65b94663d925ff69c8d75b5c379ae80c4b48a61f

    SHA256

    5677befef4c6dcc199c9cb467df2d9750fda160de41882153c75d090c6283cfe

    SHA512

    aad0dcf699c510d6bd0751748247c18d0bc6f40a811a06bb82b552e0300ed998c24d198c629cc97abbc762d3354dd5f1e0b4666d7d98ab0c672b7c4f681bb1ae

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    b688e00f4c628d4ae613a130a997a95d

    SHA1

    bc3839ad3ac00c01c840363fc04559b7d2b266b7

    SHA256

    17140b2fb4e6046da7ce6252bb5cef6041a93e7083a83d3713d8d97d0930d3fc

    SHA512

    d94951fc9d940a91aa61d12cb597ea3535e23ca6b00661f0f0aafcb8349871aa1760c8dbbd48f6f580e32e0704896e713ccb83274db1031531c28c71938b6def

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    b39242a80de0ab309344de39a9345306

    SHA1

    13de27791a1d189dbe2cbbd371997697bc75dfb9

    SHA256

    17d1c4db558316ac773f51ae9e495763acc141e67efeb0e8ff44551684a9289d

    SHA512

    ae35f02158661c0f6874afed8153d3555a2f0d92a2bb04501cd7fc7aa07266969a7bb33a993090e43ddbff3a555c99be9cedb54629cff8cd3bfbac3937d4a3d6

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F2DDCD2B5F37625B82E81F4976CEE400_C700CFEB3E6527B324BD8C263072E83F

    Filesize

    410B

    MD5

    68cbc10b6484918a1d24fe90990e5a72

    SHA1

    78f686d47cab02a130558c4f392b066cca539960

    SHA256

    1f2c2bb5b3a37561f38766a15178bfb14d92c4d056e1fe57b68bd20462345ad3

    SHA512

    0991c84ba38c0437c02a8b292fe1bb4fc8866a044f29f17367425f58baf95015ba1edd6f741130ea1539082fa011fc16aaa223c6ebc96d9d51f8744bf229ffaf

  • memory/1848-44-0x00000188BD830000-0x00000188BD930000-memory.dmp

    Filesize

    1024KB

  • memory/1848-43-0x00000188BD830000-0x00000188BD930000-memory.dmp

    Filesize

    1024KB

  • memory/1852-117-0x000002695C630000-0x000002695C632000-memory.dmp

    Filesize

    8KB

  • memory/1852-116-0x000002695CA60000-0x000002695CB60000-memory.dmp

    Filesize

    1024KB

  • memory/1852-121-0x000002695C670000-0x000002695C672000-memory.dmp

    Filesize

    8KB

  • memory/1852-119-0x000002695C650000-0x000002695C652000-memory.dmp

    Filesize

    8KB

  • memory/1852-112-0x000002694C250000-0x000002694C350000-memory.dmp

    Filesize

    1024KB

  • memory/3048-123-0x000001D270490000-0x000001D270492000-memory.dmp

    Filesize

    8KB

  • memory/3048-102-0x000001D25D310000-0x000001D25D410000-memory.dmp

    Filesize

    1024KB

  • memory/3048-100-0x000001D25D310000-0x000001D25D410000-memory.dmp

    Filesize

    1024KB

  • memory/3048-128-0x000001D2704D0000-0x000001D2704D2000-memory.dmp

    Filesize

    8KB

  • memory/3048-126-0x000001D2704C0000-0x000001D2704C2000-memory.dmp

    Filesize

    8KB

  • memory/4488-0-0x000001B4BD820000-0x000001B4BD830000-memory.dmp

    Filesize

    64KB

  • memory/4488-147-0x000001B4C4E00000-0x000001B4C4E01000-memory.dmp

    Filesize

    4KB

  • memory/4488-35-0x000001B4BABA0000-0x000001B4BABA2000-memory.dmp

    Filesize

    8KB

  • memory/4488-148-0x000001B4C4E10000-0x000001B4C4E11000-memory.dmp

    Filesize

    4KB

  • memory/4488-16-0x000001B4BD920000-0x000001B4BD930000-memory.dmp

    Filesize

    64KB

  • memory/5080-223-0x0000028C54D40000-0x0000028C54D60000-memory.dmp

    Filesize

    128KB

  • memory/5080-468-0x0000028C55670000-0x0000028C55672000-memory.dmp

    Filesize

    8KB

  • memory/5080-466-0x0000028C556C0000-0x0000028C556C2000-memory.dmp

    Filesize

    8KB

  • memory/5080-472-0x0000028C556F0000-0x0000028C556F2000-memory.dmp

    Filesize

    8KB

  • memory/5080-420-0x0000028C54770000-0x0000028C54772000-memory.dmp

    Filesize

    8KB

  • memory/5080-409-0x0000028C553E0000-0x0000028C554E0000-memory.dmp

    Filesize

    1024KB

  • memory/5080-382-0x0000028C56100000-0x0000028C56200000-memory.dmp

    Filesize

    1024KB

  • memory/5080-265-0x0000028C546E0000-0x0000028C54700000-memory.dmp

    Filesize

    128KB

  • memory/5080-249-0x0000028C53B10000-0x0000028C53C10000-memory.dmp

    Filesize

    1024KB

  • memory/5080-210-0x0000028C55000000-0x0000028C55100000-memory.dmp

    Filesize

    1024KB

  • memory/5080-224-0x0000028C54D60000-0x0000028C54D80000-memory.dmp

    Filesize

    128KB