Analysis

  • max time kernel
    292s
  • max time network
    291s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 17:17

General

  • Target

    https://archive.is/y0AEk

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://archive.is/y0AEk
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7afd46f8,0x7ffe7afd4708,0x7ffe7afd4718
      2⤵
        PID:3420
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:2
        2⤵
          PID:3536
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4992
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
          2⤵
            PID:4300
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:1
            2⤵
              PID:3448
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
              2⤵
                PID:3572
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4704 /prefetch:8
                2⤵
                  PID:4460
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4832 /prefetch:8
                  2⤵
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3492
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:8
                  2⤵
                    PID:2376
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1940
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5448 /prefetch:8
                    2⤵
                      PID:3476
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                      2⤵
                        PID:1728
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:1
                        2⤵
                          PID:5168
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:1
                          2⤵
                            PID:5176
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                            2⤵
                              PID:5348
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:1
                              2⤵
                                PID:5468
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6724 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5492
                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\(new)(new)(new)(new)(new)newnewnewnewnewnewVID_20240719_compressed_1_online-video-cutter.com_compressed_1 (2) (6) (4).mp4"
                                2⤵
                                • Suspicious behavior: AddClipboardFormatListener
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                • Suspicious use of SetWindowsHookEx
                                PID:5676
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:1
                                2⤵
                                  PID:1144
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:1
                                  2⤵
                                    PID:5336
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:1
                                    2⤵
                                      PID:3456
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,153268098046838951,1967954214134427398,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5132
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1388
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:736
                                      • C:\Windows\system32\AUDIODG.EXE
                                        C:\Windows\system32\AUDIODG.EXE 0x4f0 0x510
                                        1⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5984

                                      Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              f9664c896e19205022c094d725f820b6

                                              SHA1

                                              f8f1baf648df755ba64b412d512446baf88c0184

                                              SHA256

                                              7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                              SHA512

                                              3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              847d47008dbea51cb1732d54861ba9c9

                                              SHA1

                                              f2099242027dccb88d6f05760b57f7c89d926c0d

                                              SHA256

                                              10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                              SHA512

                                              bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              120B

                                              MD5

                                              87596af60c980a286bf9748ba95b60d4

                                              SHA1

                                              812a9bfb7cb9fce5b3cda459a4a9f1651071d8aa

                                              SHA256

                                              aee9a99cfd24838c05f18bd88b29ef5dacdb9a13fe1c26b2fc9e69ebe72ee706

                                              SHA512

                                              e799b5426619758f4490e2b91f34a2685c006ddbb797fb45692ad079cbbeb2e3ea44adbbd4f56e4932b0ce7cad4cbbb3be6a2b3de299ec9a900862a2955ddf7e

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              111B

                                              MD5

                                              285252a2f6327d41eab203dc2f402c67

                                              SHA1

                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                              SHA256

                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                              SHA512

                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                              Filesize

                                              781B

                                              MD5

                                              8e49c0054cc8241784c88b01bc1f88f1

                                              SHA1

                                              99773678005a1aee3863a28271e6f77131101a54

                                              SHA256

                                              4e87e2bf6a6bf39544919458cd6cd1f42ab2f6c282befd2309d704d3d611a1b2

                                              SHA512

                                              524913e2762b2af2ffeb774b547038433ee4322c8a9cb28abb23bd3ea76364d670f033f62394bfe07aed52da7d78db33da085b289e9dbcf77007425899516fcd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              d664a507b7bb65aa8fde49020dff0370

                                              SHA1

                                              40306b856a801eabde8b34320b893a9da94a1356

                                              SHA256

                                              40f1ca82047581a487de64fc81c77cc6290e79d1cc003a159767a2969c3afff4

                                              SHA512

                                              0c601135c02d997370222b63d5e21fd6df77ad2949b7c77d3f71f6a668aadcd6622c9a0b44952941e1560458af2ea9e350ac6be2caf7343801df069f3a078750

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              c98438e4ce9b73ef194444073170ba06

                                              SHA1

                                              c3f027a38b9c12d469a5304d1a556ad772b263f3

                                              SHA256

                                              08a8914b69fc2d71316c93ded388eb6bcc81738547b6dc732fb50e5a7b98acb2

                                              SHA512

                                              9a91b94436346d01e27abe673f623c7187a3ab1f952deae4269f7f1e5753f619952d6066bfdb3fea0e19b313395ee32361ae579791277595b9e667cedab9ed34

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              7KB

                                              MD5

                                              657132719ad9e2bb2af5f585c1ceccfa

                                              SHA1

                                              1560910f053433df625ea10c8f000f6c16ae973f

                                              SHA256

                                              b54ef49aae9c6b130a8492bd2972e9faee44881849eaa99628bde1796c4e8a77

                                              SHA512

                                              c10a699dfc590ba771ea4542680c8997d10b34ad156febc6cc9dbb425c683e145d55648cf71c208994635f93fb64b32c3e564fa1ee78e9dfff35ce0b75d05881

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              6752a1d65b201c13b62ea44016eb221f

                                              SHA1

                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                              SHA256

                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                              SHA512

                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              0b9edcc0ef6f3ae5c5fdeb3265574892

                                              SHA1

                                              2e523644781fe19f116292d619cadf15bc5fa8b9

                                              SHA256

                                              4f78d68000e6ddf198e9afcdd89e8223b763e85219e4c995345f6de119e1de25

                                              SHA512

                                              c30c7ff259e3918385b02f24e1cd6d3223c0b135fe53efb719ed82c1d47967d121f467ce48f126f64173bccd0e53aeddb6ce99096625f2e7a3f5b8e278c958fe

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              7c7f9ac52549f8f0cc7d49fa974eddde

                                              SHA1

                                              874c2f524586352b11f379f47236cf8c72f6abbf

                                              SHA256

                                              7f803bf35ceb554c6652785a7401a86f910ca65e1ad1381d642134e895fc4f95

                                              SHA512

                                              bba3e1b770f4b73775b5195611eb7f5ce553eda182df65801d10670cd3dead19f9cc7299cc32e3714f3318248578ae98bcb1b4d25eb22f0525c4d5d61f16b2ac

                                            • C:\Users\Admin\Downloads\(new)(new)(new)(new)(new)newnewnewnewnewnewVID_20240719_compressed_1_online-video-cutter.com_compressed_1 (2) (6) (4).mp4.crdownload

                                              Filesize

                                              21.7MB

                                              MD5

                                              43b746b844a4dd4b62481c92a0a627b7

                                              SHA1

                                              d4a282116c8d3b8383bae355433be9044ccc8188

                                              SHA256

                                              9826f21ed22d57a5cb888114a2e17b5eecc8e6c094071b7a56a409059585811b

                                              SHA512

                                              2d16efff22b5a3117a6ad9d3703baaa0542174daec5d63da0e76b417f3fa1fab48f16e531fb91ab1fdf547ab873b5835370b07d7a6853d3d94c15d09a1e91183

                                            • memory/5676-144-0x00007FFE69130000-0x00007FFE69171000-memory.dmp

                                              Filesize

                                              260KB

                                            • memory/5676-149-0x00007FFE66C40000-0x00007FFE66C51000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-135-0x00007FFE67F60000-0x00007FFE68216000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5676-142-0x00007FFE69180000-0x00007FFE69191000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-143-0x00007FFE67D50000-0x00007FFE67F5B000-memory.dmp

                                              Filesize

                                              2.0MB

                                            • memory/5676-140-0x00007FFE691C0000-0x00007FFE691D1000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-139-0x00007FFE691E0000-0x00007FFE691F7000-memory.dmp

                                              Filesize

                                              92KB

                                            • memory/5676-138-0x00007FFE69C10000-0x00007FFE69C21000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-137-0x00007FFE6A870000-0x00007FFE6A887000-memory.dmp

                                              Filesize

                                              92KB

                                            • memory/5676-136-0x00007FFE74470000-0x00007FFE74488000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/5676-150-0x00007FFE66C20000-0x00007FFE66C31000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-141-0x00007FFE691A0000-0x00007FFE691BD000-memory.dmp

                                              Filesize

                                              116KB

                                            • memory/5676-148-0x00007FFE66C60000-0x00007FFE66C71000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5676-147-0x00007FFE66C80000-0x00007FFE66C98000-memory.dmp

                                              Filesize

                                              96KB

                                            • memory/5676-146-0x00007FFE69100000-0x00007FFE69121000-memory.dmp

                                              Filesize

                                              132KB

                                            • memory/5676-145-0x00007FFE66CA0000-0x00007FFE67D50000-memory.dmp

                                              Filesize

                                              16.7MB

                                            • memory/5676-151-0x000001C1F13B0000-0x000001C1F2C1F000-memory.dmp

                                              Filesize

                                              24.4MB

                                            • memory/5676-134-0x00007FFE69200000-0x00007FFE69234000-memory.dmp

                                              Filesize

                                              208KB

                                            • memory/5676-180-0x00007FFE67F60000-0x00007FFE68216000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5676-190-0x00007FFE66CA0000-0x00007FFE67D50000-memory.dmp

                                              Filesize

                                              16.7MB

                                            • memory/5676-208-0x00007FFE67F60000-0x00007FFE68216000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/5676-133-0x00007FF68BD80000-0x00007FF68BE78000-memory.dmp

                                              Filesize

                                              992KB