Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 12:46

General

  • Target

    98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe

  • Size

    8.8MB

  • MD5

    e5a3dca01789308a3d67f8e32a661881

  • SHA1

    858a4bd0558eb38c8e6d67662a863a61c872331b

  • SHA256

    98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484

  • SHA512

    a2a3caafc1b323d1c9e5cf821663f607bd631935cd698b62eea8a10c56028ecdcd9235a5ec270f009b1733e8f144125b0f6bd1eaf224ad845d396e7309431053

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Detects Pyinstaller 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
    "C:\Users\Admin\AppData\Local\Temp\98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:3628
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:208
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1128

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\ProgramData\Synaptics\Synaptics.exe
    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
    MD5

    d2af584949363866d03876942361927e

    SHA1

    423307c6e6903c06048b89d774ee958e151a4b04

    SHA256

    a7c19051f2ed46b39262aeb35dcfaecb713573a28cdb14c80f0f177295fda321

    SHA512

    756b1991ccfed23485b920e6e35e26c2613c4ee657550da6ecf3a3dae8839c4cdb4a583995733baf011b233200771b93445157a3b8294a36b748eed610b7a751

  • C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
    MD5

    d2af584949363866d03876942361927e

    SHA1

    423307c6e6903c06048b89d774ee958e151a4b04

    SHA256

    a7c19051f2ed46b39262aeb35dcfaecb713573a28cdb14c80f0f177295fda321

    SHA512

    756b1991ccfed23485b920e6e35e26c2613c4ee657550da6ecf3a3dae8839c4cdb4a583995733baf011b233200771b93445157a3b8294a36b748eed610b7a751

  • C:\Users\Admin\AppData\Local\Temp\._cache_98f5bc8bf24a6f42dc84dc7f1361223820d699195188ca0220072f43ed217484.exe
    MD5

    d2af584949363866d03876942361927e

    SHA1

    423307c6e6903c06048b89d774ee958e151a4b04

    SHA256

    a7c19051f2ed46b39262aeb35dcfaecb713573a28cdb14c80f0f177295fda321

    SHA512

    756b1991ccfed23485b920e6e35e26c2613c4ee657550da6ecf3a3dae8839c4cdb4a583995733baf011b233200771b93445157a3b8294a36b748eed610b7a751

  • C:\Users\Admin\AppData\Local\Temp\BuBl2jME.xlsm
    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\SaveTrack.exe.manifest
    MD5

    7db964153920f06f4dbfd0c4f93c2bb9

    SHA1

    13f77fa485de82c3aeefc24db94e6097ada2597d

    SHA256

    a714df5ad0876bd59fb964873c9b2f139d0b24d6704afcaadf1385b97c9b84d9

    SHA512

    4e83d840176c8fb0b5d7d5966457ffc8af6ca8f2d69361b1a035329b124222a5ee42b2f34eb057e6c6545771dabb13546ab041ad1507701a773f5a70ec5c7368

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\VCRUNTIME140.dll
    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_bz2.pyd
    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_ctypes.pyd
    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_hashlib.pyd
    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_lzma.pyd
    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_queue.pyd
    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_socket.pyd
    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\_ssl.pyd
    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\base_library.zip
    MD5

    94f050907cb8441bdb3c29759366d1ec

    SHA1

    e95783c4dfc15e1b04a86b82fbda582a4f580e03

    SHA256

    5f528a2b141767639e34772a39eb2432df71cb9cd3f2e38cf318221692142da2

    SHA512

    12ad39473a38494b5d9de3dac2c4d2603e5c055e79d89ce0e11f617bdbceed004b6876ae77ee59e7a7bfe4355ae72611e0a4e243f10196ad5571e74b21d52214

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\libcrypto-1_1.dll
    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\libssl-1_1.dll
    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\python37.dll
    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\select.pyd
    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • C:\Users\Admin\AppData\Local\Temp\_MEI38322\unicodedata.pyd
    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • \Users\Admin\AppData\Local\Temp\_MEI38322\VCRUNTIME140.dll
    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_bz2.pyd
    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_ctypes.pyd
    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_hashlib.pyd
    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_lzma.pyd
    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_queue.pyd
    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_socket.pyd
    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • \Users\Admin\AppData\Local\Temp\_MEI38322\_ssl.pyd
    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • \Users\Admin\AppData\Local\Temp\_MEI38322\libcrypto-1_1.dll
    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • \Users\Admin\AppData\Local\Temp\_MEI38322\libssl-1_1.dll
    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • \Users\Admin\AppData\Local\Temp\_MEI38322\python37.dll
    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • \Users\Admin\AppData\Local\Temp\_MEI38322\select.pyd
    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • \Users\Admin\AppData\Local\Temp\_MEI38322\unicodedata.pyd
    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • memory/208-130-0x0000000000550000-0x0000000000551000-memory.dmp
    Filesize

    4KB

  • memory/208-118-0x0000000000000000-mapping.dmp
  • memory/1128-153-0x00007FF85A170000-0x00007FF85A180000-memory.dmp
    Filesize

    64KB

  • memory/1128-128-0x00007FF6CCAE0000-0x00007FF6D0096000-memory.dmp
    Filesize

    53.7MB

  • memory/1128-154-0x00007FF85A170000-0x00007FF85A180000-memory.dmp
    Filesize

    64KB

  • memory/1128-155-0x00007FF85A170000-0x00007FF85A180000-memory.dmp
    Filesize

    64KB

  • memory/1128-156-0x00007FF85A170000-0x00007FF85A180000-memory.dmp
    Filesize

    64KB

  • memory/1128-159-0x00007FF85A170000-0x00007FF85A180000-memory.dmp
    Filesize

    64KB

  • memory/1128-160-0x00007FF87AC00000-0x00007FF87BCEE000-memory.dmp
    Filesize

    16.9MB

  • memory/1128-161-0x00007FF878D00000-0x00007FF87ABF5000-memory.dmp
    Filesize

    31.0MB

  • memory/2752-114-0x0000000001030000-0x0000000001031000-memory.dmp
    Filesize

    4KB

  • memory/3628-121-0x0000000000000000-mapping.dmp
  • memory/3832-115-0x0000000000000000-mapping.dmp