Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    08-05-2021 22:12

General

  • Target

    760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe

  • Size

    8.8MB

  • MD5

    8d8bc4422cc4cddac47b2281d8ca2f92

  • SHA1

    8fcce51c52b7f6ec75a767f8e4d2136a410c332e

  • SHA256

    760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab

  • SHA512

    dfe996093f69f098d1a14d39a91f157daa2b1a4d9e98f2d7cd9d957a6bca3a2756f7bcb5562aa64852a0ff3aa8644bc193ba902f31d9e99a00a8092905b0e3a2

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Detects Pyinstaller 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
    "C:\Users\Admin\AppData\Local\Temp\760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2196
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2828
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
    MD5

    e82cb156c70d7225afb5ec9d9aa6cdef

    SHA1

    fb2882ea63650257863f20274d34249947583157

    SHA256

    c533bedc749f7a501b36b528275c2efa765de690e52feb2d08c341726eb8cabc

    SHA512

    b1c30f41f9262d58b40449e9baeec25f02f972db62841a4a55fca26e870e20886d9fe3f254956ef2a5c9dd6dac65ff39f3f8087bb98862b55f692bd020bac2be

  • C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
    MD5

    e82cb156c70d7225afb5ec9d9aa6cdef

    SHA1

    fb2882ea63650257863f20274d34249947583157

    SHA256

    c533bedc749f7a501b36b528275c2efa765de690e52feb2d08c341726eb8cabc

    SHA512

    b1c30f41f9262d58b40449e9baeec25f02f972db62841a4a55fca26e870e20886d9fe3f254956ef2a5c9dd6dac65ff39f3f8087bb98862b55f692bd020bac2be

  • C:\Users\Admin\AppData\Local\Temp\._cache_760d91b864e600f2266ca3eb3916c175147e28288f3f3d9ca24b89f37b345bab.exe
    MD5

    e82cb156c70d7225afb5ec9d9aa6cdef

    SHA1

    fb2882ea63650257863f20274d34249947583157

    SHA256

    c533bedc749f7a501b36b528275c2efa765de690e52feb2d08c341726eb8cabc

    SHA512

    b1c30f41f9262d58b40449e9baeec25f02f972db62841a4a55fca26e870e20886d9fe3f254956ef2a5c9dd6dac65ff39f3f8087bb98862b55f692bd020bac2be

  • C:\Users\Admin\AppData\Local\Temp\R3sXcXHC.xlsm
    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\CreateHeads.exe.manifest
    MD5

    0879c876b1277908c58cd485da7dd4d0

    SHA1

    93cd4c0b339426504028bea40a0b578178b2f5dc

    SHA256

    561dd35d00f3d219d20cdf275b3ef953ab560460e1e6b51db66dd8f406887fba

    SHA512

    0445e5b15a5e58b6a2a9c467cff746ef7ae8ae1f5422dd2777550f55a998bd4ab7ea236b75fbbde540ab1496022ec865d56f0f68faffe00bad4f51bc7a4dc622

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\VCRUNTIME140.dll
    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_bz2.pyd
    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_ctypes.pyd
    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_hashlib.pyd
    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_lzma.pyd
    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_queue.pyd
    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_socket.pyd
    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\_ssl.pyd
    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\base_library.zip
    MD5

    01eac4b8e303f88820131d88d8ac8651

    SHA1

    560ad32830d115ff162dc13fc785a1298461f62b

    SHA256

    1b7d4b1a9dbcecfb421c35d8d87b57be2187294aa917dfa9f977a4257e910bb3

    SHA512

    a012feb409a9f9bb0f2dc0a98abc5c1f7bcb15405cbef709d6fad6c4223f29c77ec3d40920089e6e03a2cfd82a03009bb3663a460764575588849b92c9152ac9

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\libcrypto-1_1.dll
    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\libssl-1_1.dll
    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\python37.dll
    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\select.pyd
    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • C:\Users\Admin\AppData\Local\Temp\_MEI35242\unicodedata.pyd
    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • \Users\Admin\AppData\Local\Temp\_MEI35242\VCRUNTIME140.dll
    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_bz2.pyd
    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_ctypes.pyd
    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_hashlib.pyd
    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_lzma.pyd
    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_queue.pyd
    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_socket.pyd
    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • \Users\Admin\AppData\Local\Temp\_MEI35242\_ssl.pyd
    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • \Users\Admin\AppData\Local\Temp\_MEI35242\libcrypto-1_1.dll
    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • \Users\Admin\AppData\Local\Temp\_MEI35242\libssl-1_1.dll
    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • \Users\Admin\AppData\Local\Temp\_MEI35242\python37.dll
    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • \Users\Admin\AppData\Local\Temp\_MEI35242\select.pyd
    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • \Users\Admin\AppData\Local\Temp\_MEI35242\unicodedata.pyd
    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • memory/940-156-0x00007FF8383E0000-0x00007FF8383F0000-memory.dmp
    Filesize

    64KB

  • memory/940-130-0x00007FF647550000-0x00007FF64AB06000-memory.dmp
    Filesize

    53.7MB

  • memory/940-153-0x00007FF8383E0000-0x00007FF8383F0000-memory.dmp
    Filesize

    64KB

  • memory/940-154-0x00007FF8383E0000-0x00007FF8383F0000-memory.dmp
    Filesize

    64KB

  • memory/940-155-0x00007FF8383E0000-0x00007FF8383F0000-memory.dmp
    Filesize

    64KB

  • memory/940-159-0x00007FF8383E0000-0x00007FF8383F0000-memory.dmp
    Filesize

    64KB

  • memory/940-160-0x00007FF858B70000-0x00007FF859C5E000-memory.dmp
    Filesize

    16.9MB

  • memory/940-161-0x0000024DCC170000-0x0000024DCE065000-memory.dmp
    Filesize

    31.0MB

  • memory/2196-121-0x0000000000000000-mapping.dmp
  • memory/2228-114-0x0000000001080000-0x0000000001081000-memory.dmp
    Filesize

    4KB

  • memory/2828-118-0x0000000000000000-mapping.dmp
  • memory/2828-129-0x0000000000730000-0x0000000000731000-memory.dmp
    Filesize

    4KB

  • memory/3524-115-0x0000000000000000-mapping.dmp