Analysis

  • max time kernel
    73s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-08-2024 10:41

General

  • Target

    https://drive.google.com/file/d/1Mzn6o3n5xIhN6nueBAl3YTzyb27ZgMrD/view?usp=sharing

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/file/d/1Mzn6o3n5xIhN6nueBAl3YTzyb27ZgMrD/view?usp=sharing
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4144
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd6dba9758,0x7ffd6dba9768,0x7ffd6dba9778
      2⤵
        PID:1004
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:2
        2⤵
          PID:4312
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1792 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:8
          2⤵
            PID:5024
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2072 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:8
            2⤵
              PID:32
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:1
              2⤵
                PID:2680
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:1
                2⤵
                  PID:5076
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:1
                  2⤵
                    PID:4944
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:8
                    2⤵
                      PID:3576
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:8
                      2⤵
                        PID:4628
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5148 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:1
                        2⤵
                          PID:1608
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4816 --field-trial-handle=260,i,8911846944922211213,15836037093085388151,131072 /prefetch:1
                          2⤵
                            PID:4220
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:5060
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                            1⤵
                            • Drops file in Windows directory
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:1108
                          • C:\Windows\system32\browser_broker.exe
                            C:\Windows\system32\browser_broker.exe -Embedding
                            1⤵
                            • Modifies Internet Explorer settings
                            PID:3976
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Modifies registry class
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of SetWindowsHookEx
                            PID:2336
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Drops file in Windows directory
                            • Modifies Internet Explorer settings
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:4080
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:5156
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Drops file in Windows directory
                            • Modifies registry class
                            PID:5260
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Modifies registry class
                            PID:5372
                          • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                            "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                            1⤵
                            • Modifies registry class
                            PID:4332

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                            Filesize

                            41KB

                            MD5

                            9a25111c0e90867c7b8f41c5462abfaf

                            SHA1

                            0619625d479f31cf145c2e3714de0df4a69169d1

                            SHA256

                            41bb42020f1beabc9e72913ef6a33aa264556ec829ac70fd92c9c9adfb84803d

                            SHA512

                            0fbc3c64d6f5acc2c0dab67924b0c669fefa994f449240d1f6b78dcac3538343938a4fae972726156189f05806d3aae0e333035df52605ffe28886b82f31ccdd

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            624B

                            MD5

                            f76d6713e7ec4457192f79b32803993a

                            SHA1

                            b521bb5578625298e75d0968a2bd66cefd89437d

                            SHA256

                            e40398f2bce19374d9fd163f80616732ecac70c24fe983db3152fed2a319e33d

                            SHA512

                            ba60fa622f02c232e0842e187f4eabe8eca7f060395cf1439a229ff866d623b1da1b1ef430e641d257a9deb2de8e9d0168d5370139bb701c6527c89eef2a1af1

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                            Filesize

                            288B

                            MD5

                            595ff52814e948147e4bb4deba1e3e6c

                            SHA1

                            2de531df57b73cef2d3c8d0c92f2ed8a04829fa2

                            SHA256

                            a23f507f0918560e9747b58e8fe3aac30bde45a90b1587cd16a8d08e89f9d54f

                            SHA512

                            87892369e307112cbaa860b01b4a39fa4fa35444bae3acc31508b253b789fff803f1427fd975dfd244893aea53f87ef0c0145b18c21793dcda17f7ca28d32fe7

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            4KB

                            MD5

                            518af47134a74bc87c30219feb551421

                            SHA1

                            0e687fcb262aeb241db2b01e0656c631a942dc8b

                            SHA256

                            cf5fb2fc2a26efb5674efdbe152e073572b31463b36640521ca68d8e1d6ba941

                            SHA512

                            5cbd30bbae01ebd1478ff2f591f27b474043481b86ca9922ff1b25b8f46f7d417910e69705a6a7f6daf2b0f88eb10300972cffe6298fa62758f6de60da52cac5

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            5cd2b06449acaeffd922b9a136c643e2

                            SHA1

                            b7d62f0634cb13c338ab94c9a556ba389c5ce544

                            SHA256

                            cb76244fb6a26e9e8c6610530ade64ba09ef6551afc721b25ce5b0e224f57f73

                            SHA512

                            7f721fc888b299d5c231f1c0d996e2842d3984067c3125451dc2f70a7e24da3f7d9606c99ec28968000eafeefce2e01105092e1ba818b815a83974a377d69ec6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            95358baab48ae8664f9c65f528480ef0

                            SHA1

                            6dec5cdd20a4318da225e46f692cb70a275c779c

                            SHA256

                            f5ff77d5fa9dbf8d2291acfe2ae921a22b48cfdd84894b6e355c54eda7eb4032

                            SHA512

                            9b7cfd7fab3ddef48f9e50f3d7f1e19f0e444a04adbfc634ecd3474b68c52c88a8a8ddd3acb2402b1522f810646105ab076d0e0725de059f45ed5dba4dfcb574

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            1KB

                            MD5

                            0c8a0690ff1b60e4c028e52132a1d0c4

                            SHA1

                            009304918926fb9c5131af6ede48be035a1daf47

                            SHA256

                            081c60f8e388b9785e82ea37c4f78ead021d586e0e91360595e3e08e61e80ed1

                            SHA512

                            bdfb4f4507f5856840a17e7cc923a7dc9901de210463b9a66f69cc13e21953b238a9de58ea27bed5e9e77582755bdd693890deeeb8051ab7c38582d2ff1ace09

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            5cfdcc4936b9fbe1b33333a7ed63357e

                            SHA1

                            51da5a29c14dd7ae7cbfc96a017c407abf365b81

                            SHA256

                            8d919251c9b0cc3ab366913adabe9759d4f8fcb2218896da2ae772a5f17e69ca

                            SHA512

                            6ec50407410ab7055e1de013163dc910d3a840643c134a8bb5e0abae5dd02d1c9ba406e2be05eb09920b262cf2511f165b2817eb1371706214173e28ac615a49

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            fb0d795d4e0898331a16faeb76256409

                            SHA1

                            b7247ec43f0ee40b87176cf36bdeea9049692e61

                            SHA256

                            b5707eb4cd9565012f4409913009f8d7b0c0a952548befd8739a5c515f5a4085

                            SHA512

                            2a0eddbbb51f5678c0ee1b0051dfd6b2a2230ff2d38cf5d6e6d53434f75e0458c99edfea8e8a883567496f2b33e3253e62c6973726c5e41f25ffcc206269933e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            269e83f262ab7579cbbaad28d3e769c5

                            SHA1

                            4c6984f82b294d400557b363d44b9dccd79a7831

                            SHA256

                            9ef42e9bdc58233f44262fd37baa217d3f6b6a513b33441f8870e20ea5b9faf8

                            SHA512

                            3a51857d74c08d0aac625dcb87a198c52dbe1c27d078066d65504668b83d1f9e659a1aeb4314b1336131d8683db24a1ccdd0e66850066bbe79af8ed5639afb86

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            136KB

                            MD5

                            bffe677bbdc462c5da13c5a20f2dcdac

                            SHA1

                            e4832c1fbf92653b2c986ef244408aae73cc64f7

                            SHA256

                            fcc5145b2fa78c8737cb6cff56a4babbf9a5d5243eedc45e6c390383e5a34477

                            SHA512

                            368b5e1054720eea292a2940ceea74379efa8f41407038bb33ac9cdf982373dba638f8b26c464f2b1574599e68066f2c1423b2967ec4b1c88acd05ed8c71ac95

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                            Filesize

                            136KB

                            MD5

                            bb8c6f96b281059731055457688f9e47

                            SHA1

                            c77f977842750bd240579a975a79dd563eba52d1

                            SHA256

                            e8c438c32f9121f1f89d3780c6436196a8ea25e698e32f95a6b4499819c92ae2

                            SHA512

                            c67bd69d2f1ba160b3a680ce399023bf1df5653026d6a11b7d3f892d3d3e332addc394541f9a19647ccc324c130fab630fac6687e416389c8560a0c91775e999

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                            Filesize

                            2B

                            MD5

                            99914b932bd37a50b983c5e7c90ae93b

                            SHA1

                            bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                            SHA256

                            44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                            SHA512

                            27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\54I958ZB\cb=gapi[1].js

                            Filesize

                            80KB

                            MD5

                            750fad771f4f684472912c1d6140cbd0

                            SHA1

                            4cde2d7540f4897c121402a8dc2fa0f11f353e08

                            SHA256

                            0e093b02914cd9f80cd123cb932a1e732b30bbfd3b522e41fdcd6cb803d707a5

                            SHA512

                            50190c8b38a1f9738e6494eeff36fafc993232d6b8ad25c9946014d7b5cca00be25af9450644d64e73dc4c28a902a5a5ed31a2f65ad29ac8d24b1f3cd33d2ae2

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\KF1VC136\www.bing[1].xml

                            Filesize

                            6KB

                            MD5

                            e98a23ade143148c2354be35650a0741

                            SHA1

                            891f104279ae286d044e6c51d8bffcbd4732438a

                            SHA256

                            404d97a20cdc4748389bc8cfececcf4c140cfa08e2bef260e04b73d387498699

                            SHA512

                            9052045c7172b6eab8dac94d9af5659abac92ca969aace9b04bb9ea486f0d8b3159ade94bb95a1af9d874d09028d0c8491aca483e5943db7cc40e45a86d935e5

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\KAD4R23F\icon_48px[1].png

                            Filesize

                            1KB

                            MD5

                            75d78a3233b5e0672f48247200decdb0

                            SHA1

                            da7e8b9db98a6950d1637b4dd5e098fa2ec3a02a

                            SHA256

                            e136ae509e08ac00fb264cb82cfa1081982ddcf775ee058b201fabbcc59b7c8a

                            SHA512

                            78101831843340d55a22de928677fcdbc20a66fabb7cf8bc9961ee7ad334286e0c2ff3a10b09785bd84854ed511c6931a2a7cd0e0810c18adf526ef3619697f0

                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                            Filesize

                            4KB

                            MD5

                            1bfe591a4fe3d91b03cdf26eaacd8f89

                            SHA1

                            719c37c320f518ac168c86723724891950911cea

                            SHA256

                            9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                            SHA512

                            02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

                          • memory/1108-194-0x000001E688F20000-0x000001E688F30000-memory.dmp

                            Filesize

                            64KB

                          • memory/1108-229-0x000001E6862C0000-0x000001E6862C2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1108-210-0x000001E689020000-0x000001E689030000-memory.dmp

                            Filesize

                            64KB

                          • memory/4080-238-0x000001975F000000-0x000001975F100000-memory.dmp

                            Filesize

                            1024KB

                          • memory/4080-237-0x000001975F000000-0x000001975F100000-memory.dmp

                            Filesize

                            1024KB

                          • memory/5156-311-0x0000011CD8970000-0x0000011CD8990000-memory.dmp

                            Filesize

                            128KB

                          • memory/5156-306-0x0000011CD86E0000-0x0000011CD8700000-memory.dmp

                            Filesize

                            128KB

                          • memory/5260-387-0x000001897A4A0000-0x000001897A4A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-407-0x000001897BD30000-0x000001897BD32000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-405-0x000001897BD10000-0x000001897BD12000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-403-0x000001897BCD0000-0x000001897BCD2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-399-0x000001897BC90000-0x000001897BC92000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-409-0x000001897B4C0000-0x000001897B5C0000-memory.dmp

                            Filesize

                            1024KB

                          • memory/5260-411-0x000001897BD70000-0x000001897BD72000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-413-0x000001897BD80000-0x000001897BD82000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-491-0x000001897A400000-0x000001897A402000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-493-0x000001897A590000-0x000001897A592000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-495-0x000001897A5B0000-0x000001897A5B2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-501-0x000001897A690000-0x000001897A692000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-507-0x000001897CA50000-0x000001897CA52000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-505-0x000001897CA30000-0x000001897CA32000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-503-0x000001897CA10000-0x000001897CA12000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-401-0x000001897BCB0000-0x000001897BCB2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-389-0x000001897A000000-0x000001897A100000-memory.dmp

                            Filesize

                            1024KB

                          • memory/5260-599-0x0000018111CE0000-0x0000018111D00000-memory.dmp

                            Filesize

                            128KB

                          • memory/5260-383-0x000001897A2C0000-0x000001897A2C2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-385-0x000001897A2E0000-0x000001897A2E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/5260-380-0x0000018979D00000-0x0000018979E00000-memory.dmp

                            Filesize

                            1024KB