Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    188s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/06/2024, 08:14

General

  • Target

    freeRAM.exe

  • Size

    14.4MB

  • MD5

    a8b71508a0de1f57c0260d9d43f37dcd

  • SHA1

    88925225803e6d32625b42907d0d9bda9e8cd0d3

  • SHA256

    cf4145246235311c8f4d003e0da6beb75d6d44bb8d79c6337500897eadee3d8e

  • SHA512

    ebaf0a636c9ab971c52278c4c83b4601ff6b12aa404fc6b48f84124cb157f27c1216bd6cc634f371e1ff38784c6497b581c98146b319ed65ac31f46855d46f87

  • SSDEEP

    98304:xz1Q5d3uJHIRK+Wp74ZOWCk3qYCFFVhlcl9Xr3gzDz5PDE815v2Twvb8q/ow5:xueJHI8+WpfWzHCXVhlcl9Xr3gzDz5P3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\freeRAM.exe
    "C:\Users\Admin\AppData\Local\Temp\freeRAM.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start https://www.youtube.com/watch?v=dQw4w9WgXcQ
      2⤵
      • Checks computer location settings
      PID:292
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:436
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:212
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4468
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:4556
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1672
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2872
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DF045BD8A60606260D.TMP

    Filesize

    16KB

    MD5

    a022451d328e2108496941d850918ea5

    SHA1

    c139d780dab0b2d1c4ce228252d6c8ae4cb6286a

    SHA256

    ca7271ecec0e16b959a414b0295069052f3a37bed9a58d47611c4557f7208c49

    SHA512

    663a9ef09341c0396c3c8072d56731a4b83bcebe1bc6ef70b1b23fb2baae0ae36790cc6a9fff01f72b2e60bb617a4060fe3ccef29c168a777b5373b7e238744b

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\361MVIC5\www-main-desktop-player-skeleton[1].css

    Filesize

    2KB

    MD5

    2a5f27d8d291d864d13eaa1f5cd9cd51

    SHA1

    b39f9b99b924e5251ac48fad818d78999cfd78d4

    SHA256

    056232b6127143e2f8bf4218db355d978e1e96f5dedcce59a9f5d6ab92b437f1

    SHA512

    1b54f1e13cb38e41f2a65db3cdc2bc702a9e963751b1ef0338d67b95816441b0143e1d4dabc99f276a04f9c00570bb8933f1bd87394998b3878c268b08ecf24a

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\361MVIC5\www-main-desktop-watch-page-skeleton[1].css

    Filesize

    8KB

    MD5

    64c8e3b11cfffc8ebf2240e4f46ab492

    SHA1

    71276680811731f983502e477a87e87cfe72d75f

    SHA256

    3acc199c41eb3c884ee9884c15e6b78975499be2255aa203dba38ef24440181c

    SHA512

    497a48233bb198e05517e2cba003c2c5ba25183e1654b5b8252b9823f0859497ccab66a77e243238b27ea6eb826ae4fc72efb2f32b2b378edee7f9dfb87f4756

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\361MVIC5\www-player[1].css

    Filesize

    371KB

    MD5

    d32700adacd5d982244c69736b87bedf

    SHA1

    813dfe8ce4ee3608ed3580113e3b82730ff03c85

    SHA256

    2c7426a5c6bf00c328c96fb01c89c3e23ba7791e87455cab5aa3b546942f1fc8

    SHA512

    bbe35704822e0a82de2da2890da6c06138514070fe93978823601079a9371386915431f98e613adaa9566112d728f5f0274b3864e8a0c7da538833383ea5d342

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6G6HBQJ3\scheduler[1].js

    Filesize

    9KB

    MD5

    0d27e3657f88acb00b70f55b2dbfe8b9

    SHA1

    3ed02109fb8c48810257a81285b1888512c9f86e

    SHA256

    37e2ffa625da376d22ecbcfcc9934a0c29e3087ede6fc3ae7f34977dbd4ad87a

    SHA512

    0771c07015a7e1762a08075fda3cdd86e99663e6ee0c0444c40227d0b1a33ac028e09514484d714da701d5e0f0a24699312dc2a30706fc1fb0dacca63d7a01a8

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6G6HBQJ3\www-i18n-constants[1].js

    Filesize

    5KB

    MD5

    877a2b1590385d79323ef992abe9e961

    SHA1

    f2f65882785537d6f3eeba7f02ea233f9e55672f

    SHA256

    ff474db3ea4409f034cbae6ae738bc80fb18734ccd38f87fcde90d02e11cfac3

    SHA512

    c7b9bda266c59a19476d7eaa3f6bc10d8d916345ff4195ee5932f5d5d884a487407552a29d576a9dd53dfd2588069c7376f660800f5ab7f8e1bea78cdd146e14

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8LLFXIMM\intersection-observer.min[1].js

    Filesize

    5KB

    MD5

    e02d881229f4e5bcee641ed3a2f5b980

    SHA1

    29093656180004764fc2283a6565178eb91b5ef3

    SHA256

    8037c1f1e0e4d3d7955f591a14a4b4d090141f1d210ef8b793ce5b345f08f7f5

    SHA512

    f4e8e21b91ee33879a2295215cba91e12851891165fe3f9f98913022280ef8192fd3f5def06aa8ac1fbe6d43d09034b0bb8e29e8703366a012e1fde6ff2828db

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8LLFXIMM\rs=AGKMywF9MmMcy4UXEdYIeP8N9122HWgkSQ[1].css

    Filesize

    2.8MB

    MD5

    f84b2d321c566e7d040c9069f9ca7c3f

    SHA1

    50561f42585379ca51bad60b6fbdecab7d1cbd6f

    SHA256

    ba454835d08eb878753973337ccb0d43a8f22f79994c621f65456c1687b004b7

    SHA512

    ba98b11a169536f78ad33a57e60f6ed08fa12a991b86a1203910b9ca1a907458598ea42af3b5f3790ccef64aa19273715c0e6a1da2d3680d3fc3592cab3bd78e

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\8LLFXIMM\www-onepick[1].css

    Filesize

    739B

    MD5

    9ace9ca4e10a48822a48955cbd3f94d0

    SHA1

    1f0efa2ee544e5b7a98de5201fb8254b6f3eb613

    SHA256

    f8fdbb9c5cdceb1363bb04c5e89b3288ea30d79ef1a332e7a06c7195dd2e0ec4

    SHA512

    25354aeecb224fd6d863c0253cd7ad382dce7067f4147790ee0ce343f8c3e0efb84e54dd174116e7ad52d4a7e05735039fa1085b739abbe80f9e318e432eed73

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MGPQDYAR\css2[1].css

    Filesize

    2KB

    MD5

    5912f3bba71c222672dfa244a60acef0

    SHA1

    317a49729bb8654c3986e6b32278258a1d692d81

    SHA256

    48708ab3b01bc53a736f7f85e0badd9174872faa981e78b32c16c4efcaa59d99

    SHA512

    770f13af0d6ebe7ff9d925efccd05b0b2e5afd5fbe19770562d88936d541a298a49aea028f5122a255fb5026b4a5f37c0cf52831212ecaaf378a5769ff0379f7

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MGPQDYAR\web-animations-next-lite.min[1].js

    Filesize

    49KB

    MD5

    5ab6c49dc7432d357d58fa452be3bff0

    SHA1

    b818a372657035d83161a32d42db3503b8d64b77

    SHA256

    2a39e309723372fa708ad44312f539e86defc91f28fd36e71a44e3b59c36537c

    SHA512

    33fa611bdde181cf1db7ffffaea01eb1cea240b08b0ee8c9141edc84dabaed419049f78223b305a3ac4c0d2d047971a917bfd2a0215c8845aea9752ca3321745

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\MGPQDYAR\webcomponents-ce-sd[1].js

    Filesize

    95KB

    MD5

    8a3c79faed4aafeb6f033759270f4009

    SHA1

    2c5d1a5ccd7b4378a98e29d6c1a9a513fd700b77

    SHA256

    ef2634fa681d36decb5bed34ec4a9e7d330de160020e2d7566273e71284993c1

    SHA512

    a40a76b91a30626488848eb40a9b95ddc4e880574b1cdbda8dd397f4fac25c2315e95e2851b81210b6263529250e9b7f5780d1f796a603a9658a7e15d19b5a71

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\OEAOPBWY.cookie

    Filesize

    267B

    MD5

    16205fc2a8404b3bb26e5c10baec1419

    SHA1

    7804b5a9de826345fbd5ce3424585e9869d61f5b

    SHA256

    d426f6d7de99c1cc76f5080fc47608121c335f7640fef4af53a88545f089b2d0

    SHA512

    c1f6a5010b74658e497354ee749a8ae5211033c576fa55d91ae7bfcd022a45bc34fa195409463e460b14cbf0a40118b294d3222faa071edab289fb6cb156ec83

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    c450bcc92705c42710bf76dd0e5cdea5

    SHA1

    ba084bc9b5b4f10a53a1d02f35c842c8c6700936

    SHA256

    77e3d011a232324a9445e8aef94b3bdd272e02291d25bfd5e3acab0d2da41bd7

    SHA512

    c074a8648d87ba60886761a924bb21257434eeecdaad72c5d4a64f887bad14b42d21a33af6278fcdef34bcf4958014059248fdf8c3631825131e2c0cd12b0bb5

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_65F72881313B5F8FFC737C28E760643D

    Filesize

    471B

    MD5

    78846f72556d7db634dcd496d837aa48

    SHA1

    9a880f697bb764f4c141febe09b5312112106949

    SHA256

    7c76a0f37c88e302b7b0309345aedd77873a2224099c7b9c0baf5586abbf5578

    SHA512

    dac3b24571f1e9558a8303603c34f542a16168dfa95d5f3010c208c0cf28f8c38b26132a357090b66ced8e9b42bdb5a43b34a57ab86edd7f415f4998aecdb749

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    724B

    MD5

    ac89a852c2aaa3d389b2d2dd312ad367

    SHA1

    8f421dd6493c61dbda6b839e2debb7b50a20c930

    SHA256

    0b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45

    SHA512

    c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_61C09DF1C88E9FAC26BDA537331B8625

    Filesize

    471B

    MD5

    7ce235d1dee8a32448518c8738bbf105

    SHA1

    69012a48ff2a02066e707ed3de49d6d38dbbfc98

    SHA256

    22c01a85dac1e6bfec8741f7751b93a0d4a4a446c6ef412b6abd85ffb554a793

    SHA512

    ccd32999f5a2c4ecdc61b35def458c5a88bd6a1f3e9fa4c7c26e21678552a95fe142d6c912d1711890c73bf5a80479822127824c8da735f10efe20756ae76648

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    3b8a911c178fe893ccefbc60d054ca5d

    SHA1

    dd859fff9dd46f07d1e3a5192c1ea26fdc49e0f1

    SHA256

    852e4d44273e8365aa76b3262205a98faa4afbb8b0deb6816e44523d1ad99257

    SHA512

    80a7761f1d3c5b318693b9b5f9f294de14e73a70cb2d056d93a9f0f6d2fa0ac8e182f340e264b13f530e5dce780af493c62b65810e32ec835369d93c2b8838ad

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_65F72881313B5F8FFC737C28E760643D

    Filesize

    406B

    MD5

    dd67b8eb97303525a192d9e51d785b18

    SHA1

    5ac2e28ad5c5c0c7aa42beaaf1941a4ac55eaa69

    SHA256

    47723486794b49b656b7fe4a698ba5921a362095e9f044e82642c8b495ed7676

    SHA512

    a0f088a97d4bc78392db8f3cc9e519eca7e982f3071e270865ecb159b4fb5bdd60be050d8ec441dfaed3acadd5a05aade52f77c1297d64ec7236f376f7be66d9

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    69878377c8a19eb87172252c90a4b007

    SHA1

    a9b2e85992f16d8e2fbde2463acbb5ab61ed885c

    SHA256

    390d915adf0b4a3e6da14ae8bce27c960268b63d9509815d8fdd4be00753e4c0

    SHA512

    dafb7144af38663169d907a3650df3bc32be9ac0bc7324fd65ecd2ee31e0266080c9acceab06c5a085f9271186a2b2c1cdbe5f81b17b0cd0b3cffd3a67f00a04

  • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_61C09DF1C88E9FAC26BDA537331B8625

    Filesize

    406B

    MD5

    a4cb3a61f269dbaa2be54d398ce22d05

    SHA1

    fc9533d5bf84f5ccbc31bda0ba9214692ba10c80

    SHA256

    a209590a92b0d706fbb437de01ba300ea1a593fae5775b66d2985b1a1d1cd04f

    SHA512

    603c19a5f54cb19c812bc4f241d95b0786432137dad56edea6f66de4368e5afa699ab41132375b7984d27b91f18f5820a8a17d91c70dd9415add7edadb216de2

  • memory/436-1-0x00000227CCE20000-0x00000227CCE30000-memory.dmp

    Filesize

    64KB

  • memory/436-212-0x00000227CBFF0000-0x00000227CBFF2000-memory.dmp

    Filesize

    8KB

  • memory/436-36-0x00000227CBF60000-0x00000227CBF62000-memory.dmp

    Filesize

    8KB

  • memory/436-215-0x00000227CBF90000-0x00000227CBF91000-memory.dmp

    Filesize

    4KB

  • memory/436-17-0x00000227CCF20000-0x00000227CCF30000-memory.dmp

    Filesize

    64KB

  • memory/436-219-0x00000227CBF50000-0x00000227CBF51000-memory.dmp

    Filesize

    4KB

  • memory/1020-0-0x0000000000400000-0x0000000001097000-memory.dmp

    Filesize

    12.6MB

  • memory/1020-37-0x0000000000400000-0x0000000001097000-memory.dmp

    Filesize

    12.6MB

  • memory/1672-151-0x0000014C29F00000-0x0000014C2A000000-memory.dmp

    Filesize

    1024KB

  • memory/1672-174-0x0000014C3ACC0000-0x0000014C3ACE0000-memory.dmp

    Filesize

    128KB

  • memory/1672-152-0x0000014C29F00000-0x0000014C2A000000-memory.dmp

    Filesize

    1024KB

  • memory/1920-179-0x0000019E0BAD0000-0x0000019E0BBD0000-memory.dmp

    Filesize

    1024KB

  • memory/1920-183-0x0000019E1C810000-0x0000019E1C812000-memory.dmp

    Filesize

    8KB

  • memory/1920-189-0x0000019E1C870000-0x0000019E1C872000-memory.dmp

    Filesize

    8KB

  • memory/1920-185-0x0000019E1C830000-0x0000019E1C832000-memory.dmp

    Filesize

    8KB

  • memory/1920-178-0x0000019E0BAD0000-0x0000019E0BBD0000-memory.dmp

    Filesize

    1024KB

  • memory/4468-47-0x000002946A640000-0x000002946A740000-memory.dmp

    Filesize

    1024KB

  • memory/4556-73-0x0000027971A10000-0x0000027971A12000-memory.dmp

    Filesize

    8KB

  • memory/4556-68-0x0000027971400000-0x0000027971500000-memory.dmp

    Filesize

    1024KB

  • memory/4556-67-0x0000027971400000-0x0000027971500000-memory.dmp

    Filesize

    1024KB

  • memory/4556-66-0x0000027971400000-0x0000027971500000-memory.dmp

    Filesize

    1024KB

  • memory/4556-71-0x00000279717F0000-0x00000279717F2000-memory.dmp

    Filesize

    8KB

  • memory/4556-97-0x0000027972080000-0x00000279720A0000-memory.dmp

    Filesize

    128KB

  • memory/4556-75-0x0000027971A30000-0x0000027971A32000-memory.dmp

    Filesize

    8KB