Analysis

  • max time kernel
    121s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-05-2021 14:02

General

  • Target

    9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe

  • Size

    8.8MB

  • MD5

    a75da330b5513be288c30bc1f3d6fd11

  • SHA1

    3e2fafb01d2f124d0a80ffc9135b6862d7a233db

  • SHA256

    9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e

  • SHA512

    07b9eb35cf87fefe781492703f6103b1391cebec4ce0fa2d43c086e8e8a3ea8165a7181426e4a01a3743d445ec8d6d271ee71b2afd66a6b2bb9470a868201af9

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Detects Pyinstaller 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe
    "C:\Users\Admin\AppData\Local\Temp\9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:204
      • C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:3776
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\ProgramData\Synaptics\Synaptics.exe

    MD5

    85c4062ca855443ba02c2b83503ddc14

    SHA1

    5fa7451b7808c19a3d28dbbd4f662d0a584b6c77

    SHA256

    9770a6476b607f28077320caa244bbdde08611769338485faa64ad3bee4616cf

    SHA512

    851b48968e44604db4d02ec29744e6e2ca006e20bfb8883152860984dd4a648684e20b97b83a0b76afd21a922b3ac1afa9b2d54d9e3125b2e9b6958a8a7f5c7e

  • C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe

    MD5

    f0fa5f34dbce1a454292c0b3a2ef167c

    SHA1

    f32318ff1132e5e043b5c92831c5095e051c0903

    SHA256

    5267a38a1bdb709bfed42bd255792f2f9d3d611b9df8797af6450aaf20cde0ab

    SHA512

    f861e5b99f89fa8e1bd1d5268f24b5d7709d8231abd3878ac43b7c026331fd88b6e900e34defd48217cf69346a7ce779b48fbbbc1f4ed56dd944ea5fe01a7b4e

  • C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe

    MD5

    f0fa5f34dbce1a454292c0b3a2ef167c

    SHA1

    f32318ff1132e5e043b5c92831c5095e051c0903

    SHA256

    5267a38a1bdb709bfed42bd255792f2f9d3d611b9df8797af6450aaf20cde0ab

    SHA512

    f861e5b99f89fa8e1bd1d5268f24b5d7709d8231abd3878ac43b7c026331fd88b6e900e34defd48217cf69346a7ce779b48fbbbc1f4ed56dd944ea5fe01a7b4e

  • C:\Users\Admin\AppData\Local\Temp\._cache_9ff1c57f2dfaddd4416cefbd24afc2a56386e83c318ff73975af3a3400edd29e.exe

    MD5

    f0fa5f34dbce1a454292c0b3a2ef167c

    SHA1

    f32318ff1132e5e043b5c92831c5095e051c0903

    SHA256

    5267a38a1bdb709bfed42bd255792f2f9d3d611b9df8797af6450aaf20cde0ab

    SHA512

    f861e5b99f89fa8e1bd1d5268f24b5d7709d8231abd3878ac43b7c026331fd88b6e900e34defd48217cf69346a7ce779b48fbbbc1f4ed56dd944ea5fe01a7b4e

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\FollowStar.exe.manifest

    MD5

    696ec9121c0eae2617ccc0d813776abf

    SHA1

    5059f149015a21ebfc756ec1c37e6d3ae8cf987d

    SHA256

    8b8f8833b7e5336b7cc6cba6ca51ff7ec6ef4c5d500585c22d79849aed3ba8fe

    SHA512

    b4d2216539d2d937932ec795531113048fe95d15d38f2fa8818c36df547e2a51c6215bf991070684fade96e8b6990a2788c65a5df09fcb1cdf6df3109643a85a

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\VCRUNTIME140.dll

    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_bz2.pyd

    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_ctypes.pyd

    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_hashlib.pyd

    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_lzma.pyd

    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_queue.pyd

    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_socket.pyd

    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\_ssl.pyd

    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\base_library.zip

    MD5

    d51016029ee85644acc39201245ca5e5

    SHA1

    4b3c3c4ff2154c2998447d2987509ea6319af026

    SHA256

    33e9ea1a4efc5ec7007ef361e356755540c3a1db4ab89342261d2347d72f6bc0

    SHA512

    380ff72a5024ba8817162437d91c3aeda51479b8fdf2d030c54a546828c63ae73350e2a0d91d550c24c91f9f508e1309876513770d3d9c677b07babfc57eebf9

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\libcrypto-1_1.dll

    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\libssl-1_1.dll

    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\python37.dll

    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\select.pyd

    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • C:\Users\Admin\AppData\Local\Temp\_MEI2042\unicodedata.pyd

    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • C:\Users\Admin\AppData\Local\Temp\ozWQgjo3.xlsm

    MD5

    e566fc53051035e1e6fd0ed1823de0f9

    SHA1

    00bc96c48b98676ecd67e81a6f1d7754e4156044

    SHA256

    8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

    SHA512

    a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

  • \Users\Admin\AppData\Local\Temp\_MEI2042\VCRUNTIME140.dll

    MD5

    ae96651cfbd18991d186a029cbecb30c

    SHA1

    18df8af1022b5cb188e3ee98ac5b4da24ac9c526

    SHA256

    1b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1

    SHA512

    42a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_bz2.pyd

    MD5

    ff5ac8fb724edb1635e2ad985f98ee5b

    SHA1

    24c4ab38a9d92c0587e540b2a45c938a244ef828

    SHA256

    b94f64fcb49f40682ed794fa1940a1dc0c8a28f24a1768d3bfe774cf75f59b62

    SHA512

    eac95da6496a18fcbd084b34114bcb0e9be3cfa9b55ba121fc09081ecf9e0b20dc9123f06730a687f052ecdf797716024643100bd8c1adbd046db0075ac15956

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_ctypes.pyd

    MD5

    9db2d9962cbd754e91b40f91cbc49542

    SHA1

    945ae09f678a4ca5f917339c304e5922e61dd588

    SHA256

    6a6df7d77b7a5552d8443bd1b98f681ad2e6b5a8acf7ade542dd369beab7e439

    SHA512

    a9d522f5768d265e2dca80faea239cc0ba7bec715d23058571651f8b61402650c01f3bca7f4d10e6806c8a553e79569dc852381d44169f535d63e85148d24e29

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_hashlib.pyd

    MD5

    e84e1ba269371e439c2d52024aca6535

    SHA1

    2abac4b3eb0ab5cbb86efd964089833cd3bd164f

    SHA256

    2fcb297733e6080480ac24cf073ff5e239fb02a1ce9694313c5047f9c58d781b

    SHA512

    22eaa0f42895eba9ab24fe1e33ef6767b2efa18529794d070858f15e116228d087fe7d3db655a564e52eb2ea01bf4a651f0f82417e0fccca8f770057b165d78c

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_lzma.pyd

    MD5

    65880a33015af2030a08987924ca737b

    SHA1

    931009f59c5639a81bc545c5eff06653cc1aff82

    SHA256

    a71366b95d89d1539a6ee751d48a969c1bca1aa75116424cc5f905f32a625eea

    SHA512

    7099208d7044cae5d9f79ca8c2ef0e0ea4a1066857ddff74d48ff4a6cebc6db679bcde4d64a9925d266542a63889bd300eeb33291db53adcee1df3ad575028db

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_queue.pyd

    MD5

    8807dc228bb761439dc6525a2966e27e

    SHA1

    cb9e8e230eb8a684dec8886a856ec54ff1d2c682

    SHA256

    b7ed6dfb6882e8ec4267d9f80cd5b1dc0a43519382fcb72ab5e74c47875c209d

    SHA512

    def98c22bad3f32ea4caceead743c0fd775cfa4f5287ad8a4728830e10b7352ccc45646e9d8cbffd7d51ae71a6bff1bca38fcefb49c0530a6b69e38edec2ffb3

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_socket.pyd

    MD5

    a4bd8e0c0597a22c3f0601fe798668aa

    SHA1

    5f4a7a23bcdb2d32fb15997536cddfd7f2bf7ca8

    SHA256

    96b0a3cfc16e215f0ef5d1e206f0137b4255005052720e91a58bc98cde8c898e

    SHA512

    7b325ab8b1978b8e8b23aad5714855b96c4c4284f7618475187a8d9043b04c4f79e6953c7d2b03981f34d31e7bd7d21747891d47dedd4f8f7646d3281f779ac0

  • \Users\Admin\AppData\Local\Temp\_MEI2042\_ssl.pyd

    MD5

    cc5c8eb32acb2261c42a7285d436cca9

    SHA1

    4845cde2d307e84e3076015a71f8ebc733aa71da

    SHA256

    07ea50e536886f68473635ffefcfcaa7266e63c478ef039ba100ddf02f88ce61

    SHA512

    352f3201a0f47e7741c3c9bfa207769f1afe287a9e9f4e6879d37b2a9cf7fc6ace02ebf0de1ad4a5847134bc3adfeee748f955d8d554b0f552d0e98703c6cd88

  • \Users\Admin\AppData\Local\Temp\_MEI2042\libcrypto-1_1.dll

    MD5

    c0e55a25dd5c5447f15eed0ca6552ab7

    SHA1

    467bc011e0224df3e6b73ac3b88a97b911cc73b8

    SHA256

    9fefba93fa3300732b7e68fb3b4dbb57bf2726889772a1d0d6694a71820d71f3

    SHA512

    090b03626df2f26e485fea34f9e60a35c9d60957fbcc2db9c8396a75a2b246669451cc361eb48f070bbc051b12e40cacf2749488ebb8012ba9072d9f0b603fa6

  • \Users\Admin\AppData\Local\Temp\_MEI2042\libssl-1_1.dll

    MD5

    5adb49cc84abd6d3c8f959ca5a146ad7

    SHA1

    90faa543515960b2d47554b86d2478105497d853

    SHA256

    f4d5df50bdf3e7304c67c81ace83263c8d0f0e28087c6104c21150bfeda86b8d

    SHA512

    bf184a25e32bea2ac7d76d303562118eaa87bb5cd735142d6aa5a1a9247290d28c45476842e22c61e47a06316595834f8c0ebb35dfc622fe2f02a1e44a91e5d8

  • \Users\Admin\AppData\Local\Temp\_MEI2042\python37.dll

    MD5

    d49eac0faa510f2b2a8934a0f4e4a46f

    SHA1

    bbe4ab5dae01817157e2d187eb2999149a436a12

    SHA256

    625ca7bb2d34a3986f77c0c5ce572a08febfcacf5050a986507e822ff694dcaa

    SHA512

    b17f3370ecd3fe90b928f4a76cbad934b80b96775297acc1181b18ede8f2c8a8301d3298bafa4402bce4138df69d4b57e00e224a4ddbb0d78bb11b217a41a312

  • \Users\Admin\AppData\Local\Temp\_MEI2042\select.pyd

    MD5

    6a796088cd3d1b1d6590364b9372959d

    SHA1

    3de080d32b14a88a5e411a52d7b43ff261b2bf5e

    SHA256

    74d8e6a57090ba32cf7c82ad9a275351e421842d6ec94c44adbba629b1893fa7

    SHA512

    582d9a3513724cc197fd2516528bfd8337f73ae1f5206d57f683bf96367881e8d2372be100662c67993edecfbd7e2f903c0be70579806a783267b82f32abd200

  • \Users\Admin\AppData\Local\Temp\_MEI2042\unicodedata.pyd

    MD5

    e176f984d22f031098d700b7f1892378

    SHA1

    52842cdd08a3745756054b2278952e036031f5d9

    SHA256

    46876fc52f1529c2633372d8e2cea5b08b5a8582f8645cfad8f5ff8128a7f575

    SHA512

    b9ca5c965bf6b09cd05994340bfc8d006b64c78f0478cc58dffcb2932a4b54f92bc31c34bcbd0692b60adc7d3a31f8a156a2bc84d77379d900926d1e42b181b3

  • memory/204-115-0x0000000000000000-mapping.dmp

  • memory/784-114-0x0000000002B20000-0x0000000002B21000-memory.dmp

    Filesize

    4KB

  • memory/1356-155-0x00007FFDD78A0000-0x00007FFDD78B0000-memory.dmp

    Filesize

    64KB

  • memory/1356-131-0x00007FF628EF0000-0x00007FF62C4A6000-memory.dmp

    Filesize

    53.7MB

  • memory/1356-153-0x00007FFDD78A0000-0x00007FFDD78B0000-memory.dmp

    Filesize

    64KB

  • memory/1356-154-0x00007FFDD78A0000-0x00007FFDD78B0000-memory.dmp

    Filesize

    64KB

  • memory/1356-156-0x00007FFDD78A0000-0x00007FFDD78B0000-memory.dmp

    Filesize

    64KB

  • memory/1356-159-0x00007FFDD78A0000-0x00007FFDD78B0000-memory.dmp

    Filesize

    64KB

  • memory/1356-160-0x00007FFDF8B10000-0x00007FFDF9BFE000-memory.dmp

    Filesize

    16.9MB

  • memory/1356-161-0x00007FFDF6C10000-0x00007FFDF8B05000-memory.dmp

    Filesize

    31.0MB

  • memory/2024-121-0x0000000000000000-mapping.dmp

  • memory/3776-118-0x0000000000000000-mapping.dmp

  • memory/3776-134-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB