Analysis

  • max time kernel
    1799s
  • max time network
    1705s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/05/2024, 10:43

General

  • Target

    http://google.com

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "http://google.com"
    1⤵
      PID:4448
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:424
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1328
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:596
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:1688
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:4888
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ffa9c509758,0x7ffa9c509768,0x7ffa9c509778
        2⤵
          PID:1888
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:2
          2⤵
            PID:588
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
            2⤵
              PID:824
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2100 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
              2⤵
                PID:2688
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2884 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:1
                2⤵
                  PID:3332
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2892 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:1
                  2⤵
                    PID:2904
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:1
                    2⤵
                      PID:6052
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
                      2⤵
                        PID:5228
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4792 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
                        2⤵
                          PID:5256
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4700 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
                          2⤵
                            PID:5408
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
                            2⤵
                              PID:5492
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4684 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:8
                              2⤵
                                PID:5568
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3904 --field-trial-handle=1844,i,17794794603962501592,10937521352057911433,131072 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5848
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:5248

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                1KB

                                MD5

                                0fb87182a1badda42582456a3a8f9e56

                                SHA1

                                6041be7a357d929cdc93d7f88eeaff48f8efe715

                                SHA256

                                b164a337b774f478ffd2f1a14d5ae084147e2ede97ca3b93ed8eeb16e79ab51f

                                SHA512

                                bc9a673f0ab7fd49662f59841733193c5748bca226b791bf49f86baa301480648b96cdb7817f263edd570ebd5a38c2de185ff03e61a54240e8861c91c6d6bab4

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                371B

                                MD5

                                78ae5595cce83e6986ba19ebbc9f7566

                                SHA1

                                4867d35da539b2c367e1c138a037686b449711ca

                                SHA256

                                284fde06844b5c4b1991c42b2e68b5e8a832c0053c4048a8c0a93226b90988a8

                                SHA512

                                e88922de34fea73cf3bcfebe6947fb8c74418163652f06b9aeb10e91992278fdd15495789a40252d731cd62d6f801a9e4c41f89d77c535423ab302f22909fa12

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                3dfee4c68609b0330b97faa4d4fad43e

                                SHA1

                                75f8b8fb3a64e5292625fa5e55070c5f44eb2929

                                SHA256

                                aae54796bfdae558f88e260b4c6728f09b28e0c2128b851f5361b2ff15f76656

                                SHA512

                                fa13f38fa69d7e8c2cc5e1ed3b699ffd0bdc8f138ea3b181ea04a11be17cdd52b40c41f61064ee5b229d6554866e676adcbbf17c7c29d0d27f69298ae29fee08

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                810d9e06943ba2606a4113c3dd9e9d4f

                                SHA1

                                e61914ced614aa60e1dc4d524ae814e97dc7a036

                                SHA256

                                b1adc842445cd50740b5c4891f1ab4b1af73c61808319567ebd391d066809f36

                                SHA512

                                963a2d138f76b40ed7de210f7042272764a6cd277a788f856f1c08506a92d768fa1ae826ec229de235a5a5c852fb498f7612e5e409574eadb122eb9a361c5bf3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                733b6383a1077314d8946d244cb5c808

                                SHA1

                                ce44a9bd08797b4ac4afd259aa3d52456270a081

                                SHA256

                                ddaed2c8c5f9db13c62c94d0882074141fa0382bee2e5db6346852810fdc1345

                                SHA512

                                bf816aa56cbeaf129edda1f57b1794fb269a91ada72b28f1e07314819b705180966ff8482f6c8a330bc7bbfe5afd3afaeff6ea2a9090e542fd7d9808704519e8

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                Filesize

                                12KB

                                MD5

                                0deae7aac3f412d569012d1a474a148e

                                SHA1

                                b74c71c7f9c03a14385951d31b8dd5e038c71c8d

                                SHA256

                                13302699405b53918bce7322454c6fcfbd6c83019b22dd9835037d443202bae5

                                SHA512

                                2dcdca75ce0bd546a40c8c1a936214cffccd6eb530a069db6800d7e6792f88f2d81095689bb27a06014a561f91da7dc5499fa484233583e3e26f7cddb4414eae

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                277KB

                                MD5

                                16537cd8ae0aeb69c3b347919ab91d92

                                SHA1

                                053401fa865322ac99216a74654cc77f0eb8b0b9

                                SHA256

                                f202cd3f6ae5f85cd3cb1a3dd21f495c37239f4a4dc3250ae5ff940c1af149a9

                                SHA512

                                d109e6ed5addd470e9ae7b6e74e7396d0912e9c12d636c8884da1ae3214001f8534c3974909f94a362e6bf78c1ca89a65423aacd2eb6544526aaa504a5a61a40

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

                                Filesize

                                74KB

                                MD5

                                d4fc49dc14f63895d997fa4940f24378

                                SHA1

                                3efb1437a7c5e46034147cbbc8db017c69d02c31

                                SHA256

                                853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                SHA512

                                cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MTMYRGZM\m=RqjULd[1].js

                                Filesize

                                18KB

                                MD5

                                b35daaaae90abc336054560880525b7f

                                SHA1

                                3b715fa2c930d3593808dd47fea956fbf5fea61a

                                SHA256

                                19ff851269639217e2bcff91d894ed6c70ba539b5852088a4cc4e3eb1485c623

                                SHA512

                                7c2054ad18f14f1c41cc13f5766e8b93f79101122dc843b8ac573b449d83d20d7bb85cb7b4417ca918c71ba74d851591c3ae1d7160ac71620a0f7ddee04d664c

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RD1KSS14\m=_b,_tp[1].js

                                Filesize

                                184KB

                                MD5

                                842c032b22d963915437316dbf33cb82

                                SHA1

                                24fee0efc2ae62266bcfa9ada17ed3986080eba6

                                SHA256

                                5736f87fd796413018a77f413c9ea56109ae491976e08044f7bb07db12ac9fab

                                SHA512

                                46e77fa28988b3e1d3d641eb55c59571532607fe987f1067f8f199822ac739613ccb5f57dd7eefabd043f830f10cef467f6b6d9b8fcbe3d032116d06db490235

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\U024LJPI\m=bm51tf[1].js

                                Filesize

                                1KB

                                MD5

                                7051659759e55146ce802875838587ba

                                SHA1

                                25022a92d08aff4096d2a1dab854051922d85a64

                                SHA256

                                3198dd0adceaf8b80fa1ea96f169159ede33bf03946eb1cb76c4749ae3a35c6b

                                SHA512

                                0a5fe535b55a50d67af9688bfcb2f46a0a538202223d2145d17bc37be15ef20664a741a99bf493a461ad89709d49aa63e68bb19534efdc02771914b4fb81bafa

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YLX471QC\B4W4DMQX.js

                                Filesize

                                258KB

                                MD5

                                7b58a79a4d64f0d78a6df02d568deef1

                                SHA1

                                338cb7d041090f7d65e729a4a77c197e76c51cd4

                                SHA256

                                59f877ab98deae9b1895bfb287ac174c43415595f6e179a0f802f719ae48eec3

                                SHA512

                                dc2bb1b5f8610745a89f378e21e25dbc54049ba7f45065f513c7de86979fb3b06e3eb88a2144b4ea47ae4776880c433ea257056aa1bd02f877038eafb83aa906

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\YLX471QC\m=Wt6vjf,hhhU8,FCpbqb,WhJNk[1].js

                                Filesize

                                3KB

                                MD5

                                6c35d581b7802cf8233ceb8d43ef8d60

                                SHA1

                                60c6771d2061fb5f51e7f7651537331cd079fd5f

                                SHA256

                                8b92fe2a9ee4786604c5814d06f2662d062d46aff712186c4a711d9eec8121a4

                                SHA512

                                3179a22c3fbc458fb33cafc5ea71ea00a18a2f80ed0f1def705f06bc363cc1adb9e8971adde6573cba19c2e171fca297d1cea9ce7590d58d87af2c152370ca44

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\9SF76JR5\suggestions[1].en-US

                                Filesize

                                17KB

                                MD5

                                5a34cb996293fde2cb7a4ac89587393a

                                SHA1

                                3c96c993500690d1a77873cd62bc639b3a10653f

                                SHA256

                                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                SHA512

                                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                              • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\U1BU3YZE\favicon[1].ico

                                Filesize

                                5KB

                                MD5

                                f3418a443e7d841097c714d69ec4bcb8

                                SHA1

                                49263695f6b0cdd72f45cf1b775e660fdc36c606

                                SHA256

                                6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                                SHA512

                                82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

                              • memory/424-16-0x0000023128720000-0x0000023128730000-memory.dmp

                                Filesize

                                64KB

                              • memory/424-35-0x0000023125CD0000-0x0000023125CD2000-memory.dmp

                                Filesize

                                8KB

                              • memory/424-166-0x000002312F600000-0x000002312F601000-memory.dmp

                                Filesize

                                4KB

                              • memory/424-167-0x000002312F610000-0x000002312F611000-memory.dmp

                                Filesize

                                4KB

                              • memory/424-0-0x0000023128620000-0x0000023128630000-memory.dmp

                                Filesize

                                64KB

                              • memory/1688-91-0x00000224DC5B0000-0x00000224DC5B2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-280-0x00000224E0CC0000-0x00000224E0DC0000-memory.dmp

                                Filesize

                                1024KB

                              • memory/1688-281-0x00000224E1200000-0x00000224E1300000-memory.dmp

                                Filesize

                                1024KB

                              • memory/1688-331-0x00000224CAFF0000-0x00000224CB000000-memory.dmp

                                Filesize

                                64KB

                              • memory/1688-333-0x00000224CAFF0000-0x00000224CB000000-memory.dmp

                                Filesize

                                64KB

                              • memory/1688-226-0x00000224DE140000-0x00000224DE142000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-229-0x00000224DE150000-0x00000224DE152000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-231-0x00000224DE2B0000-0x00000224DE2B2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-133-0x00000224DC8E0000-0x00000224DC8E2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-95-0x00000224DC690000-0x00000224DC692000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-81-0x00000224DC060000-0x00000224DC062000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-79-0x00000224DBEE0000-0x00000224DBEE2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-85-0x00000224DC0B0000-0x00000224DC0B2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-89-0x00000224DC590000-0x00000224DC592000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-93-0x00000224DC5D0000-0x00000224DC5D2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-87-0x00000224DC2D0000-0x00000224DC2D2000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-83-0x00000224DC070000-0x00000224DC072000-memory.dmp

                                Filesize

                                8KB

                              • memory/1688-75-0x00000224DC8C0000-0x00000224DC8E0000-memory.dmp

                                Filesize

                                128KB

                              • memory/1688-59-0x00000224CB500000-0x00000224CB600000-memory.dmp

                                Filesize

                                1024KB

                              • memory/1688-60-0x00000224CB500000-0x00000224CB600000-memory.dmp

                                Filesize

                                1024KB

                              • memory/1688-64-0x0000021CC7A00000-0x0000021CC7B00000-memory.dmp

                                Filesize

                                1024KB