Analysis

  • max time kernel
    300s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-06-2024 23:05

General

  • Target

    2a868d79b36102ed62a54466f1e72ef9955d9a6b92e35122b55410f9a5f122bb.exe

  • Size

    894KB

  • MD5

    4ebc370791b6c116a054444f477b47e6

  • SHA1

    5a88d3e75f372f28b26965554022cfe5b888686f

  • SHA256

    2a868d79b36102ed62a54466f1e72ef9955d9a6b92e35122b55410f9a5f122bb

  • SHA512

    0041b4c9296ec9b41e5a0f4a2263be396f7b5e607c0681d6af400307547b375e7303d4f462f48eaaf763a3871c02df75e44b2c8f940194ad5facfda4b3ca0dad

  • SSDEEP

    12288:rqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4T9:rqDEvCTbMWu7rQYlBQcBiT6rprG8aA9

Score
10/10

Malware Config

Signatures

  • Detected google phishing page
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a868d79b36102ed62a54466f1e72ef9955d9a6b92e35122b55410f9a5f122bb.exe
    "C:\Users\Admin\AppData\Local\Temp\2a868d79b36102ed62a54466f1e72ef9955d9a6b92e35122b55410f9a5f122bb.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1608
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4020
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:5048
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2156
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2928
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4796
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4292
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4636
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4372
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4248
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3096
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4244
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4788
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VSH5XF98\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\8AWOIRYS\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\HZ6Q90KN\4Kv5U5b1o3f[1].png

    Filesize

    610B

    MD5

    a81a5e7f71ae4153e6f888f1c92e5e11

    SHA1

    39c3945c30abff65b372a7d8c691178ae9d9eee0

    SHA256

    2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

    SHA512

    1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\9A20GVPN.cookie

    Filesize

    266B

    MD5

    cb7654e68779fdd0a86d8c2705bac4f6

    SHA1

    153c487aece33ff9bf2c18131b67226c462fe8d3

    SHA256

    07e8644b83014b344387dbdcd5e61b94d66c85f40e263c7fdf440c45e77b93ac

    SHA512

    84f8f5a20c0bdd51898689e753990a8058504fb0720b65a3ff7dcd438b8cf3c45b9dee1cdfd52be899c0a77ce24be8f1c13502c892ceb8a183286095af9b2d2f

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\NBZWOUES.cookie

    Filesize

    130B

    MD5

    1c184eb03f7572a7452397b39f28f5ad

    SHA1

    ce608f86394f259259f6f3aea82e5f52f80f3049

    SHA256

    a7bb005b43c7c2ce76d64e9f473c36c3cfbf547ec813c8fcb82554592870a47d

    SHA512

    45a87c78d764685cd26c4c1934685e8684009653446e7804df19f107e2bedeefcef8c24952e4915a6b12e84b565a502549d910491ae311dbe064e8d2ea0e427f

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\QER32L4Z.cookie

    Filesize

    130B

    MD5

    6251b7850bce22c80adb8a36c77cea7c

    SHA1

    f3325ad55b8146a996c4870af871eedb547dd54e

    SHA256

    279401d33c5565b7da9ab4e4615effdd924170add05e65d71c2f1d1922f6ad11

    SHA512

    a357540fada1948dd625f318ed449ce2b0a80484bf472e347a8ae94f8e750a76e56a6db1d3f2715d7f038ed491896d15a808bf6c1fe27a1486299e63a261030c

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\R9Y9QY4L.cookie

    Filesize

    130B

    MD5

    0ae1e37d3d98cd1c63906255aa7b56b5

    SHA1

    cfee1048d4dc14e422f23632ed3ee94d850d77f3

    SHA256

    aa6c623fa4969edebf58950509d3ea009b36bbf609c73d62d8e2762e8962904d

    SHA512

    a90bce72fced0b89c96603edb187cc021ddfb52769a1cb9dc8425d4979ec2622e017b11a1b82200afb2b296f26358b94ac4204f919cee221b123ed75d4341d2d

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    6ca16ec94429226823393b805facbc1b

    SHA1

    963a9fa166605dcc2ce0d0ef15acc414a633a14e

    SHA256

    1ef2e5e560e26c438b8ab801ff5dee6b5acaeb8d8b66c5a0fb3fe75b0124cf8f

    SHA512

    e560bc883d068b48ebba63a616c8d0bdd9ccefa694d75b6bf14312752d56c59a12a2f3bec9eb984ef1a0093cbf30bfb8d35097030b02659cb7b2ab727720fdc1

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_346763B529DBD5D9BA393CF19AF897D8

    Filesize

    471B

    MD5

    c18613c97e0902495ca55347e3a4af99

    SHA1

    8e41db284ebe395db01fa25419adc3a0f5fba84e

    SHA256

    a8cd810481d590b36d87213530523eab677c926d188577e42c1406c2d2816160

    SHA512

    0ac5d66a7cc3ca64f996d4634a7e07e5794b68a928282c93f059eb1f98482da52a99e39fece0a381d2672b0d85466fb3a55e07d791ec5a9bd69a7d2dac99b4f7

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    358cbff04270d96348c704931adc8dc1

    SHA1

    93fd71f56efab48cf1709dbe373246a0722b03ed

    SHA256

    8f99bd0c6eae261f62688d7651ccb50c63cb3deb65068779c51b83757181904f

    SHA512

    14f24ef35f343c9cb5c4b7b0eda9a7824c937cc612fbfff122d6cc5042f30cc9d30afcf36546f85adcb2d26d50b4a82307790c73008f916b4c56d3ca0236c0fc

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    43f43f3170d8a8b292e5c253471548fd

    SHA1

    f5a7fe37d1f0d6ad789bc0a2fba60b7083aee4f5

    SHA256

    44b70a693c29ba1cc40404045fab3a8ebf5c03b4c9aa92351d05cf9e86ec2877

    SHA512

    e64f5eb5226014f081e4cfe9203d5f54994a3916cd96ab4ff90cf6732bfb0962ed951634d304be1a6997e42379341a30bdec8a9707d14069af05a8ad6e78c79a

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    0e6b2062357bc4d6ba6c1ab6a2887e03

    SHA1

    b44f5d655fe14a6411b9bcc399b0673df97395b2

    SHA256

    be3263dd71f7ce99bcd6f82b6abcf544b99dc865658809305718925fb7e9ec39

    SHA512

    2591a36cf142f77c3385ca18d4a114efb449689fa4e4e2047d263f97888ae99bbbe20c0ff7e82f731cd309fdf4037590387d4a242c9d6c181d04471f404db5e8

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    338B

    MD5

    8baa358b1fc8fdeeb26e80ed8e8e123f

    SHA1

    1259eafaf84f1028e3e5a5a765e1ea855314cd5a

    SHA256

    9064408c221f4d6087cfb8e2c5f7fadd640763164a0e32d8877a47ac4fbb7ddc

    SHA512

    2cbc6db0b135b8b6016297812ba87456c010395be26c546e0b2ef3e3bdfcec1f0cbf7e898b67aff7c96f05d7502667529c80e0adc167cfed085ba2960d646ce4

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_346763B529DBD5D9BA393CF19AF897D8

    Filesize

    406B

    MD5

    48a0cdb4b2fb985724b732a31ed4cfa5

    SHA1

    c5b8ae57db92f994e0715e9da11b06953dfc0b3e

    SHA256

    d45da1bd48f108070911fe8b318a6873359bbcde9c1ba45f7f34c1c776f1dd77

    SHA512

    1f24658e6b1fc96fb7c4cd1590a0bae96fb868b69b1723d36cb1cb727598f3ea1e981e942b2087825eb88acda4a968f9674d13bc1e2f5a87ec6ea53a9e913992

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    eb68c5fbb44a9fd94c5f3cbf5b915101

    SHA1

    e99c08c9ef50a3331ef20160b8bfefa450092a3c

    SHA256

    a4cc196ffec5575730e79f03ff0160fd574c79b75698511d211f37b2e6dd7a7d

    SHA512

    1a31eab91c23e40fd870f57ee545eb111a927b47e2778c3d82ae651164bc264c5d940e9e7be58e77b4e350fd33f4f1d60d4b2c41b477f077e4d6b5fa51df58e1

  • memory/2928-44-0x000001B308400000-0x000001B308500000-memory.dmp

    Filesize

    1024KB

  • memory/4020-417-0x000001CB689E0000-0x000001CB689E1000-memory.dmp

    Filesize

    4KB

  • memory/4020-35-0x000001CB66230000-0x000001CB66232000-memory.dmp

    Filesize

    8KB

  • memory/4020-0-0x000001CB61F20000-0x000001CB61F30000-memory.dmp

    Filesize

    64KB

  • memory/4020-418-0x000001CB689F0000-0x000001CB689F1000-memory.dmp

    Filesize

    4KB

  • memory/4020-16-0x000001CB62020000-0x000001CB62030000-memory.dmp

    Filesize

    64KB

  • memory/4292-386-0x0000021353CE0000-0x0000021353CE2000-memory.dmp

    Filesize

    8KB

  • memory/4292-402-0x00000213542D0000-0x00000213542D2000-memory.dmp

    Filesize

    8KB

  • memory/4292-410-0x0000021354340000-0x0000021354342000-memory.dmp

    Filesize

    8KB

  • memory/4292-408-0x0000021354330000-0x0000021354332000-memory.dmp

    Filesize

    8KB

  • memory/4292-406-0x0000021354310000-0x0000021354312000-memory.dmp

    Filesize

    8KB

  • memory/4292-404-0x00000213542F0000-0x00000213542F2000-memory.dmp

    Filesize

    8KB

  • memory/4292-396-0x00000213541F0000-0x00000213541F2000-memory.dmp

    Filesize

    8KB

  • memory/4292-394-0x00000213541D0000-0x00000213541D2000-memory.dmp

    Filesize

    8KB

  • memory/4292-392-0x0000021353DF0000-0x0000021353DF2000-memory.dmp

    Filesize

    8KB

  • memory/4292-390-0x0000021353DE0000-0x0000021353DE2000-memory.dmp

    Filesize

    8KB

  • memory/4292-388-0x0000021353DC0000-0x0000021353DC2000-memory.dmp

    Filesize

    8KB

  • memory/4292-398-0x0000021354210000-0x0000021354212000-memory.dmp

    Filesize

    8KB

  • memory/4292-384-0x0000021353D30000-0x0000021353D32000-memory.dmp

    Filesize

    8KB

  • memory/4292-382-0x0000021353D10000-0x0000021353D12000-memory.dmp

    Filesize

    8KB

  • memory/4292-446-0x0000021351040000-0x0000021351050000-memory.dmp

    Filesize

    64KB

  • memory/4292-450-0x0000021351040000-0x0000021351050000-memory.dmp

    Filesize

    64KB

  • memory/4292-453-0x0000021351040000-0x0000021351050000-memory.dmp

    Filesize

    64KB

  • memory/4292-454-0x0000021351040000-0x0000021351050000-memory.dmp

    Filesize

    64KB

  • memory/4292-449-0x0000021351040000-0x0000021351050000-memory.dmp

    Filesize

    64KB

  • memory/4292-374-0x0000021352BD0000-0x0000021352BD2000-memory.dmp

    Filesize

    8KB

  • memory/4292-327-0x0000021353500000-0x0000021353600000-memory.dmp

    Filesize

    1024KB

  • memory/4292-226-0x0000021340E00000-0x0000021340F00000-memory.dmp

    Filesize

    1024KB

  • memory/4292-168-0x00000213523E0000-0x0000021352400000-memory.dmp

    Filesize

    128KB

  • memory/4292-98-0x0000021340E00000-0x0000021340F00000-memory.dmp

    Filesize

    1024KB