Analysis

  • max time kernel
    83s
  • max time network
    84s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-08-2024 22:36

Errors

Reason
Machine shutdown

General

  • Target

    https://drive.google.com/file/d/1b6qB1WVdoi9qrL2lftt0YIRygYNVeIJh/view

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://drive.google.com/file/d/1b6qB1WVdoi9qrL2lftt0YIRygYNVeIJh/view"
    1⤵
      PID:2008
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3588
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:60
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4376
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4068
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4916
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2944
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:6128
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Windows\system32\dashost.exe
        dashost.exe {6540f46c-40e2-4284-ac69efeb5d133fe0}
        2⤵
          PID:5164
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0 /state0:0xa3a81055 /state1:0x41c64e6d
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        PID:3212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XCFODRP5\edgecompatviewlist[1].xml

        Filesize

        74KB

        MD5

        d4fc49dc14f63895d997fa4940f24378

        SHA1

        3efb1437a7c5e46034147cbbc8db017c69d02c31

        SHA256

        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

        SHA512

        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3V3Q2AI7\cb=gapi[1].js

        Filesize

        122KB

        MD5

        7d41ce8af12a1020f76d0d4620a30b79

        SHA1

        913cdcd6daf53cecb2639d9a451c4f1f88071d9e

        SHA256

        2b4ae5731b6361fef2a0b2ea0d005ca674d5cfa837628dc8acf4140b2c8b3843

        SHA512

        f42cd6041d26407cb75ab57788a71aab626d3a94c50a2a4a04dcb6c89fb728695c44054c0dd79e3c2824bfa9188d6ca8e7a3cb71e6eef7f645f93839147ae0f0

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3V3Q2AI7\rs=AA2YrTuZHf1FxnWSuni4yfYFm7DJbfG-0A[1].css

        Filesize

        3KB

        MD5

        4a4d3a159fc9c6ab57f5ed0aec76bab4

        SHA1

        04e1c402d2bed76ebf56abfe0f8cff5cb71d5745

        SHA256

        9aa721ae44d67d37aa0bd34944a23885eec90ce7ff3dde2137a7cda5315f7619

        SHA512

        be845b422cfb7ce4c3e661df6313019705e1d53c1b0122d15ef871465c95b81ef37ae984b06e04b651a189e4939eabc38b6945896225f551c3ffbe2f8699d07d

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\3V3Q2AI7\rs=AA2YrTuhs7wI50davzC4wzhH8Do425_T2w[1].js

        Filesize

        226KB

        MD5

        db05977cedef14745ba783fc0e40ca71

        SHA1

        a516910f03a80ccebdf79564d0297e9398a1ea5a

        SHA256

        2c21ab473d1360421bf4413bc9c955c9dc9cd498286b0f48d0506f542ae4cbb9

        SHA512

        bf2ed1ca1392ae5717b8795d1a3b2484be432cc49ab3b95ff5ced36bac27b2b4c99f0eab26074ffb17257ffdf6cf8ae70b91ce1aa894d88c8cd9bb4a43f9b56f

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9OWBHTOV\KFOlCnqEu92Fr1MmWUlfBBc4[1].woff2

        Filesize

        15KB

        MD5

        037d830416495def72b7881024c14b7b

        SHA1

        619389190b3cafafb5db94113990350acc8a0278

        SHA256

        1d5b7c64458f4af91dcfee0354be47adde1f739b5aded03a7ab6068a1bb6ca97

        SHA512

        c8d2808945a9bf2e6ad36c7749313467ff390f195448c326c4d4d7a4a635a11e2ddf4d0779be2db274f1d1d9d022b1f837294f1e12c9f87e3eac8a95cfd8872f

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9OWBHTOV\css[1].css

        Filesize

        800B

        MD5

        70c68652f820a1f9bb3545003bb8af67

        SHA1

        91e38bedbf9024f34b0a3fd5211b2d3608ac839e

        SHA256

        133f0fed047d2bbf088f16379d699d60665ea1d8792c588fcb2c0d1f6d2fde7f

        SHA512

        a07bfd5a0c553ea233255956bf99d0a0ed10d0255d64d215193c8c8782572c40b710769b42483e464a667ae2c4a0981a2cb25238d0e0bbebfcc4a39ddffbb5dd

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9OWBHTOV\m=_b,_tp[1].js

        Filesize

        185KB

        MD5

        efc2feda97c69fa08fc9acd50978323f

        SHA1

        8e6870f89f89244c8c760021e572228c72ffc9a7

        SHA256

        2fc64c5fceda55ff5620124facbe4c97429ff3a4b4824c1274757fdfb925a2db

        SHA512

        b9e6407366449c024286a8311a12f2cf495875f47fb1aaacd335559c50f5a1e5ec0e388d0c35c2a4456a9d54b6b7b625372b3d194307501c45305962a2a2c45e

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9OWBHTOV\m=v,wb[1].js

        Filesize

        1.8MB

        MD5

        815e48dcbbc27d8ad4ef542c94d0e478

        SHA1

        e354505bafe3718c2c7da2b6eb3ab42d55a3195e

        SHA256

        6659b873e6612a7d124925ef3ab488eb16aae6168df07eab1ee120d8a3fe59fa

        SHA512

        050a6612f9b1583f3e33c7c97a518439b2d9bae562457439ddbb17c21cc200ea3ae27c5a96f45e11693f74909c14b5e86a0f45a8666b493438f4b9e095bb9172

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\9OWBHTOV\rs=AO0039snslbYrNryBRt7i8qj5hZ5UpWU3Q[1].css

        Filesize

        2.3MB

        MD5

        8de9fffcea9fbd60deb7c260639ddd53

        SHA1

        f5096b47dab6569e3fb9459de3370736e48f1678

        SHA256

        432e70ebc941bb683048d65e0282ed9652c9058b9d11e49ae5baf35b54a8e993

        SHA512

        3de97f2eebaf9e5d18f665a9b2a0601cebcf089e077c835d08599d96a6f10c6b2fae7d7fc025cf5e0913e1fabc56af2e73be538dafa87534b1c1867d9a9c7be0

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\KFOlCnqEu92Fr1MmEU9fBBc4[1].woff2

        Filesize

        15KB

        MD5

        285467176f7fe6bb6a9c6873b3dad2cc

        SHA1

        ea04e4ff5142ddd69307c183def721a160e0a64e

        SHA256

        5a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7

        SHA512

        5f9bb763406ea8ce978ec675bd51a0263e9547021ea71188dbd62f0212eb00c1421b750d3b94550b50425bebff5f881c41299f6a33bbfa12fb1ff18c12bc7ff1

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\KFOlCnqEu92Fr1MmSU5fBBc4[1].woff2

        Filesize

        15KB

        MD5

        55536c8e9e9a532651e3cf374f290ea3

        SHA1

        ff3a9b8ae317896cbbcbadfbe615d671bd1d32a2

        SHA256

        eca8ffa764a66cd084800e2e71c4176ef089ebd805515664a6cb8d4fb3b598bf

        SHA512

        1346654c8293a2f38dd425ad44a2aa0ed2feab224388ab4e38fb99082769bbd14d67d74cac3ce6e39a562a0812f9bce0a623be233f9632dcb8d5d358e42f2186

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\cb=gapi[1].js

        Filesize

        206KB

        MD5

        01aca6d674132913ecbc9db2b2d9ad03

        SHA1

        c9fb646739e2ed2e18869867e3fcdd9364ff046f

        SHA256

        f41d574aeffffe2094c610397398b37da40813e31cded45f92037c49295f4d15

        SHA512

        c96ab1a80f2db279ea53f8bedbd1b2feb17c3ac7ff29181235883d78b065fca21c59c832b04bb6c50fc6cd56287f5fb7977a1d9a2dfb5c7ac45443d86f56bbd0

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\css2[1].css

        Filesize

        609B

        MD5

        c9416551b401e8ddc4cd642b1348d60c

        SHA1

        75d238de4bcef07ec6afd81fa38a91a3a55adc2a

        SHA256

        cb7b5b067f94b97f8e98d0c0d0e2ef2add7725527ad7ea726ff7d6702f1eff9a

        SHA512

        b7b3054284b982026adc743f27da8d89050546049471cba9e380086a56dc01749041e237b932e187b566445bdc380ef3938c4f7932e33a6005344f7ccb14d5c9

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\m=MpJwZc,UUJqVe,sy6,s39S4,syn,pw70Gc[1].js

        Filesize

        6KB

        MD5

        fd11c6ecbfff1def3629662fb3b973d5

        SHA1

        ce7af3298b19a7495e8bbc463e8e404f68920117

        SHA256

        ae792fc369868c53895c2051ac1a2256ca99b29a1c0d2ec301c697fc695b661e

        SHA512

        bbec488d4cfeddd7d9ffd64bafdfdbb1b917f8aef6ec35d0af5647eba92e7ea0a448236532281701c2f2543682d5f22f3fb32cbdcde604ff05072fcb8125cfe8

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\OTARACJE\m=bm51tf[1].js

        Filesize

        1KB

        MD5

        49e0675418a3349085e5d3fb1dbf723f

        SHA1

        960a887efd741f050b7d136246cb792a5e8f1406

        SHA256

        a649ebf5a81a1d2c6be748c79fc0081ab40bba095308e6e4a8dab7493182ca80

        SHA512

        a84df3fd421f41b757b0087bacc2852f6ee82dddf15839dbced55d2456687b0129ae18476795f5222bb111168fdbd35d9e11cbd9f8f72d173fa55d1243eea759

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSC41JKB\KFOkCnqEu92Fr1Mu51xIIzI[1].woff2

        Filesize

        16KB

        MD5

        d8bcbe724fd6f4ba44d0ee6a2675890f

        SHA1

        d276fd769bcb675f8efe42ebe3003c1d3255f985

        SHA256

        aa4650a411dfe1c9beb794ffaf08c7909cdfbb05672d79b3a9976672cbba75ec

        SHA512

        23f757ea3afe6febe1e8ea935f0ee8690e1b1b1da511788b529cc2fc38f7e454153cdba6f84a6a0e19b294e5311625a03617cf98aac150f17b88a53f3ed8b72a

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSC41JKB\KFOmCnqEu92Fr1Mu4mxK[1].woff2

        Filesize

        14KB

        MD5

        5d4aeb4e5f5ef754e307d7ffaef688bd

        SHA1

        06db651cdf354c64a7383ea9c77024ef4fb4cef8

        SHA256

        3e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc

        SHA512

        7eb7c301df79d35a6a521fae9d3dccc0a695d3480b4d34c7d262dd0c67abec8437ed40e2920625e98aaeafba1d908dec69c3b07494ec7c29307de49e91c2ef48

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSC41JKB\lazy.min[1].js

        Filesize

        117KB

        MD5

        8d24ed27706b0ae1c5e66d0bbc654bae

        SHA1

        67747fb79c6724a2fa28dd22e36f0ed25ae17798

        SHA256

        c15542b3f57d74bb469cfeae96cc5f815918e430e3f2a36f2215f11da717eabe

        SHA512

        451ab7153152b96620cefba5f03855045b95d9e8a2f8b9b5e1a6612cfc4a5af50a9f464fbf0d23eba47472d609bcae9b237651ee05a75b689232f8064456128d

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RSC41JKB\m=RqjULd[1].js

        Filesize

        21KB

        MD5

        85430beeb4994ade9e37ac8d4517b925

        SHA1

        8ef4fcdd9c89b191ca969a0d71cf4d5f8bf8699c

        SHA256

        ff79813acf59609d8928663453291afcaba58c4b436e5e0cb2bc5ade39b9e24b

        SHA512

        1ec2bfb06b1df4f986f51a97a716892f1e01ca70e7a551d5ec23a68d51487d7c0efb94c1fca961de43251e590737639407975285bd8c051e95c6825e4c6c65f9

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

        Filesize

        4KB

        MD5

        1bfe591a4fe3d91b03cdf26eaacd8f89

        SHA1

        719c37c320f518ac168c86723724891950911cea

        SHA256

        9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

        SHA512

        02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\19YL7BCN\drive_2020q4_32dp[1].png

        Filesize

        831B

        MD5

        916c9bcccf19525ad9d3cd1514008746

        SHA1

        9ccce6978d2417927b5150ffaac22f907ff27b6e

        SHA256

        358e814139d3ed8469b36935a071be6696ccad7dd9bdbfdb80c052b068ae2a50

        SHA512

        b73c1a81997abe12dba4ae1fa38f070079448c3798e7161c9262ccba6ee6a91e8a243f0e4888c8aef33ce1cf83818fc44c85ae454a522a079d08121cd8628d00

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\BOIM7VU5\favicon[1].ico

        Filesize

        758B

        MD5

        84cc977d0eb148166481b01d8418e375

        SHA1

        00e2461bcd67d7ba511db230415000aefbd30d2d

        SHA256

        bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c

        SHA512

        f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFCF4A2B460421C8DF.TMP

        Filesize

        20KB

        MD5

        7cc1686b11fe19f17c4651515fb46f8d

        SHA1

        d1da273fef7839b44e1376fa2c354a2b72f8afd7

        SHA256

        828e0c204d8db3a289442d7ac162b465f21cfba3ea8ec1d60f36a52c50432299

        SHA512

        8aa8b878ad71c5e7ceb472b33ba790676b1d3f8e195e670c840e66bb4f3f285bbd045dae74420a8e9dcc8617a8f43faeb4330ed8545f5c46cbca184a4ff0d998

      • memory/3588-17-0x0000017652330000-0x0000017652340000-memory.dmp

        Filesize

        64KB

      • memory/3588-0-0x0000017652220000-0x0000017652230000-memory.dmp

        Filesize

        64KB

      • memory/3588-35-0x000001764F6A0000-0x000001764F6A2000-memory.dmp

        Filesize

        8KB

      • memory/4068-44-0x000002BFC2080000-0x000002BFC2180000-memory.dmp

        Filesize

        1024KB

      • memory/4068-45-0x000002BFC2080000-0x000002BFC2180000-memory.dmp

        Filesize

        1024KB

      • memory/4916-321-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-84-0x0000029C53E50000-0x0000029C53E52000-memory.dmp

        Filesize

        8KB

      • memory/4916-320-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-323-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-301-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-175-0x0000029C55E80000-0x0000029C55F80000-memory.dmp

        Filesize

        1024KB

      • memory/4916-128-0x0000029C5E1A0000-0x0000029C5E1C0000-memory.dmp

        Filesize

        128KB

      • memory/4916-319-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-86-0x0000029C53E70000-0x0000029C53E72000-memory.dmp

        Filesize

        8KB

      • memory/4916-88-0x0000029C53E90000-0x0000029C53E92000-memory.dmp

        Filesize

        8KB

      • memory/4916-63-0x0000029C41A40000-0x0000029C41B40000-memory.dmp

        Filesize

        1024KB

      • memory/4916-318-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-317-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-316-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-314-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB

      • memory/4916-313-0x0000029C415F0000-0x0000029C41600000-memory.dmp

        Filesize

        64KB