Analysis

  • max time kernel
    20s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 18:27

General

  • Target

    9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b.exe

  • Size

    3.5MB

  • MD5

    56cb37005dc4d9b3fa94a9eab2140346

  • SHA1

    74fe4e4afb9f0f09ae04e4da02948115ec8fcd9b

  • SHA256

    9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b

  • SHA512

    58aa443355395ce765b151ce1f13042107a67f3793f9a09625974c030da83749f664679e5b6d765bc5d355b2a797297c27362b7eb0092efa924716ef2e43777e

  • SSDEEP

    49152:9g8p3UukoA1LvVLYU8fAKLECM7ht+29LuSKco6oF4Nphe9+tiI6dU/izKVwtyYn:y8p3E1WU8fAKACaZlu6oee9nBzXyYn

Malware Config

Extracted

Family

vidar

Version

40.3

Botnet

706

C2

https://lenko349.tumblr.com/

Attributes
  • profile_id

    706

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Extracted

Family

redline

Botnet

pab777

C2

185.215.113.15:6043

Signatures

  • NullMixer

    NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b.exe
    "C:\Users\Admin\AppData\Local\Temp\9cf8a802217928175088777f3f886dde3cba71c0a5c427ed169e24581e1c7a9b.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4584
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS4006C367\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\782ac5a96a83a.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Users\Admin\AppData\Local\Temp\782ac5a96a83a.exe
            C:\Users\Admin\AppData\Local\Temp\782ac5a96a83a.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:668
            • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\setup_install.exe
              "C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\setup_install.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:4208
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 552
                7⤵
                • Program crash
                PID:2408
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu1235c12d7465e.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1184
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu1241657e9db03.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:5108
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu1232435f56edba7b.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:208
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu12804b2bd637.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2548
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu1228ac6c94401.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3520
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu1268860e437.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:3592
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c Thu12bffd99c3a6.exe
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1300
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:4644
  • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu12804b2bd637.exe
    Thu12804b2bd637.exe
    1⤵
    • Executes dropped EXE
    PID:4060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 1748
      2⤵
      • Program crash
      PID:2920
  • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1232435f56edba7b.exe
    Thu1232435f56edba7b.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\is-3C90E.tmp\Thu1232435f56edba7b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3C90E.tmp\Thu1232435f56edba7b.tmp" /SL5="$40234,506086,422400,C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1232435f56edba7b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2532
  • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1241657e9db03.exe
    Thu1241657e9db03.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:4944
  • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1228ac6c94401.exe
    Thu1228ac6c94401.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:856
  • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1268860e437.exe
    "C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1268860e437.exe" -u
    1⤵
    • Executes dropped EXE
    PID:2076
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4208 -ip 4208
    1⤵
      PID:4192
    • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1235c12d7465e.exe
      Thu1235c12d7465e.exe
      1⤵
      • Executes dropped EXE
      PID:2988
    • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu1268860e437.exe
      Thu1268860e437.exe
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      PID:1384
    • C:\Users\Admin\AppData\Local\Temp\7zSC92B9347\Thu12bffd99c3a6.exe
      Thu12bffd99c3a6.exe
      1⤵
      • Executes dropped EXE
      PID:3736
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
      1⤵
        PID:2084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4060 -ip 4060
        1⤵
          PID:4784
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2084

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\libgcc_s_dw2-1.dll

          Filesize

          113KB

          MD5

          9aec524b616618b0d3d00b27b6f51da1

          SHA1

          64264300801a353db324d11738ffed876550e1d3

          SHA256

          59a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e

          SHA512

          0648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0

        • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\libwinpthread-1.dll

          Filesize

          69KB

          MD5

          1e0d62c34ff2e649ebc5c372065732ee

          SHA1

          fcfaa36ba456159b26140a43e80fbd7e9d9af2de

          SHA256

          509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723

          SHA512

          3653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61

        • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\libzip.dll

          Filesize

          65KB

          MD5

          81d6f0a42171755753e3bc9b48f43c30

          SHA1

          b766d96e38e151a6a51d72e753fb92687e8f9d03

          SHA256

          e186cf97d768a139819278c4ce35e6df65adb2bdaee450409994d4c7c8d7c723

          SHA512

          461bf23b1ec98d97281fd55308d1384a3f471d0a4b2e68c2a81a98346db9edc3ca2b8dbeb68ae543796f73cc04900ec298554b7ff837db0241863a157b43cda1

        • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\setup_install.exe

          Filesize

          98KB

          MD5

          102e92758b86ff12accdb3631717e316

          SHA1

          1a7893e1c4d85286184933ea70899392438f1db9

          SHA256

          c66bcc6ae71f5ed8ba46d54a8e90dde2348aef6abe3ff10a5ed8e2fe3d5bfaf6

          SHA512

          a96a2cbff3b3eba232e38263c9167027485d575740911e793c0323b95a18d34dabfe81ebe9325db165babc673163fcac0bf4d35920c32354614042b6aaf39d67

        • C:\Users\Admin\AppData\Local\Temp\7zS4006C367\zlib1.dll

          Filesize

          73KB

          MD5

          c7d4d685a0af2a09cbc21cb474358595

          SHA1

          b784599c82bb90d5267fd70aaa42acc0c614b5d2

          SHA256

          e96b397b499d9eaa3f52eaf496ca8941e80c0ad1544879ccadf02bf2c6a1ecfc

          SHA512

          fed2c126a499fae6215e0ef7d76aeec45b60417ed11c7732379d1e92c87e27355fe8753efed86af4f58d52ea695494ef674538192fac1e8a2a114467061a108b

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          203KB

          MD5

          2b357df2faa4e771d2815727d6d3aaf3

          SHA1

          6b7505dbe9a062f2cc9afe158159627cd154fb97

          SHA256

          2b917d3138a37faee387c2cefde6e9c22870ea73484811e5646ca6786b8fbc6a

          SHA512

          c4673ed6805de2a2826b0deb9e42293442c92a4c5e93083b8694ad96084d992e32a95caf6cd744d023cd9859d169358536f5e20b13d4be4c1fedf6e3ac2ffad6

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          1024KB

          MD5

          51afbeaa037831b868100694f41658b0

          SHA1

          d047a27eb08f665f566a52364fa5615e344679bd

          SHA256

          76147e88a622aeed524d5cbef89985822b5329f5912eecfee909460ec7a38163

          SHA512

          80c02e8f03fae01430bbf4aa66826d9b6c4573d0059f649c4d55fccfd5725171d44ff8423c864ad2dde7c585c41242baaaac3dacb6307418133354f68641f1e5

        • C:\Users\Admin\AppData\Local\Temp\setup.exe

          Filesize

          915KB

          MD5

          f9f67ad0490a8075b1a02fa154cae9e7

          SHA1

          18071d65434ee9e537c499568dbf7cd5620c759d

          SHA256

          55dadfcd8d9066a7f8172e43f588e410a40a45e03f61cc76528d0dff5fa48a00

          SHA512

          91d317d55de3adfe1275c67fced5bbc3610ffc3d16804dee0ea24ee61cdafc73e4198d5df29f541a0c85cc1af122ed952bca5906aa2c4a7d05cea1dcfd81c2b3

        • memory/856-239-0x00007FFBC9BD0000-0x00007FFBCA691000-memory.dmp

          Filesize

          10.8MB

        • memory/856-136-0x0000000000230000-0x0000000000238000-memory.dmp

          Filesize

          32KB

        • memory/856-149-0x00007FFBC9BD0000-0x00007FFBCA691000-memory.dmp

          Filesize

          10.8MB

        • memory/856-154-0x00000000009F0000-0x0000000000A00000-memory.dmp

          Filesize

          64KB

        • memory/1800-126-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/1800-178-0x0000000000400000-0x000000000046D000-memory.dmp

          Filesize

          436KB

        • memory/2084-221-0x00000000073C0000-0x00000000073D4000-memory.dmp

          Filesize

          80KB

        • memory/2084-216-0x0000000006EC0000-0x0000000006EDA000-memory.dmp

          Filesize

          104KB

        • memory/2084-134-0x0000000073270000-0x0000000073A20000-memory.dmp

          Filesize

          7.7MB

        • memory/2084-139-0x00000000024F0000-0x0000000002500000-memory.dmp

          Filesize

          64KB

        • memory/2084-138-0x0000000005060000-0x0000000005688000-memory.dmp

          Filesize

          6.2MB

        • memory/2084-185-0x0000000004BD0000-0x0000000004BEE000-memory.dmp

          Filesize

          120KB

        • memory/2084-220-0x00000000073B0000-0x00000000073BE000-memory.dmp

          Filesize

          56KB

        • memory/2084-192-0x0000000006E20000-0x0000000006E52000-memory.dmp

          Filesize

          200KB

        • memory/2084-153-0x00000000024F0000-0x0000000002500000-memory.dmp

          Filesize

          64KB

        • memory/2084-210-0x000000007F5E0000-0x000000007F5F0000-memory.dmp

          Filesize

          64KB

        • memory/2084-219-0x0000000007380000-0x0000000007391000-memory.dmp

          Filesize

          68KB

        • memory/2084-158-0x0000000004F90000-0x0000000004FB2000-memory.dmp

          Filesize

          136KB

        • memory/2084-168-0x00000000058C0000-0x0000000005926000-memory.dmp

          Filesize

          408KB

        • memory/2084-218-0x00000000073F0000-0x0000000007486000-memory.dmp

          Filesize

          600KB

        • memory/2084-169-0x0000000005930000-0x0000000005996000-memory.dmp

          Filesize

          408KB

        • memory/2084-217-0x0000000007200000-0x000000000720A000-memory.dmp

          Filesize

          40KB

        • memory/2084-226-0x0000000073270000-0x0000000073A20000-memory.dmp

          Filesize

          7.7MB

        • memory/2084-223-0x00000000074A0000-0x00000000074A8000-memory.dmp

          Filesize

          32KB

        • memory/2084-215-0x0000000007820000-0x0000000007E9A000-memory.dmp

          Filesize

          6.5MB

        • memory/2084-129-0x0000000002890000-0x00000000028C6000-memory.dmp

          Filesize

          216KB

        • memory/2084-208-0x00000000070F0000-0x0000000007193000-memory.dmp

          Filesize

          652KB

        • memory/2084-206-0x00000000063F0000-0x000000000640E000-memory.dmp

          Filesize

          120KB

        • memory/2084-195-0x0000000074D40000-0x0000000074D8C000-memory.dmp

          Filesize

          304KB

        • memory/2084-186-0x0000000005EC0000-0x0000000005F0C000-memory.dmp

          Filesize

          304KB

        • memory/2084-170-0x00000000059A0000-0x0000000005CF4000-memory.dmp

          Filesize

          3.3MB

        • memory/2084-222-0x00000000074B0000-0x00000000074CA000-memory.dmp

          Filesize

          104KB

        • memory/2532-176-0x0000000000400000-0x0000000000516000-memory.dmp

          Filesize

          1.1MB

        • memory/2532-150-0x0000000002020000-0x0000000002021000-memory.dmp

          Filesize

          4KB

        • memory/2988-194-0x0000000006450000-0x0000000006460000-memory.dmp

          Filesize

          64KB

        • memory/2988-196-0x0000000006450000-0x0000000006460000-memory.dmp

          Filesize

          64KB

        • memory/2988-245-0x0000000073270000-0x0000000073A20000-memory.dmp

          Filesize

          7.7MB

        • memory/2988-188-0x0000000001EB0000-0x0000000001EE0000-memory.dmp

          Filesize

          192KB

        • memory/2988-189-0x0000000003B00000-0x0000000003B26000-memory.dmp

          Filesize

          152KB

        • memory/2988-187-0x0000000002020000-0x0000000002120000-memory.dmp

          Filesize

          1024KB

        • memory/2988-193-0x0000000003FA0000-0x0000000003FC4000-memory.dmp

          Filesize

          144KB

        • memory/2988-244-0x0000000006450000-0x0000000006460000-memory.dmp

          Filesize

          64KB

        • memory/2988-243-0x0000000002020000-0x0000000002120000-memory.dmp

          Filesize

          1024KB

        • memory/2988-242-0x0000000006450000-0x0000000006460000-memory.dmp

          Filesize

          64KB

        • memory/2988-212-0x0000000006A10000-0x0000000006B1A000-memory.dmp

          Filesize

          1.0MB

        • memory/2988-214-0x0000000006410000-0x000000000644C000-memory.dmp

          Filesize

          240KB

        • memory/2988-213-0x0000000073270000-0x0000000073A20000-memory.dmp

          Filesize

          7.7MB

        • memory/2988-191-0x0000000000400000-0x0000000001D9A000-memory.dmp

          Filesize

          25.6MB

        • memory/2988-190-0x0000000006460000-0x0000000006A04000-memory.dmp

          Filesize

          5.6MB

        • memory/2988-209-0x0000000007030000-0x0000000007648000-memory.dmp

          Filesize

          6.1MB

        • memory/2988-211-0x00000000063B0000-0x00000000063C2000-memory.dmp

          Filesize

          72KB

        • memory/2988-207-0x0000000006450000-0x0000000006460000-memory.dmp

          Filesize

          64KB

        • memory/3296-40-0x0000000061880000-0x00000000618B7000-memory.dmp

          Filesize

          220KB

        • memory/3296-41-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/3296-51-0x0000000061B80000-0x0000000061B98000-memory.dmp

          Filesize

          96KB

        • memory/3296-50-0x000000006EB40000-0x000000006EB63000-memory.dmp

          Filesize

          140KB

        • memory/3296-38-0x0000000061880000-0x00000000618B7000-memory.dmp

          Filesize

          220KB

        • memory/3296-49-0x0000000061880000-0x00000000618B7000-memory.dmp

          Filesize

          220KB

        • memory/3296-47-0x0000000000400000-0x00000000007A7000-memory.dmp

          Filesize

          3.7MB

        • memory/3296-48-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/3296-42-0x0000000061880000-0x00000000618B7000-memory.dmp

          Filesize

          220KB

        • memory/4060-156-0x0000000002E10000-0x0000000002F10000-memory.dmp

          Filesize

          1024KB

        • memory/4060-175-0x0000000000400000-0x0000000002BB1000-memory.dmp

          Filesize

          39.7MB

        • memory/4060-238-0x0000000000400000-0x0000000002BB1000-memory.dmp

          Filesize

          39.7MB

        • memory/4060-157-0x0000000004830000-0x0000000004903000-memory.dmp

          Filesize

          844KB

        • memory/4208-110-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-107-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-109-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-108-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-106-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4208-105-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4208-104-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4208-103-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/4208-102-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-97-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4208-101-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4208-179-0x0000000000400000-0x000000000051B000-memory.dmp

          Filesize

          1.1MB

        • memory/4208-180-0x000000006B440000-0x000000006B4CF000-memory.dmp

          Filesize

          572KB

        • memory/4208-111-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4208-112-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4208-182-0x000000006B280000-0x000000006B2A6000-memory.dmp

          Filesize

          152KB

        • memory/4208-183-0x000000006EB40000-0x000000006EB63000-memory.dmp

          Filesize

          140KB

        • memory/4208-184-0x000000006FE40000-0x000000006FFC6000-memory.dmp

          Filesize

          1.5MB

        • memory/4208-181-0x0000000064940000-0x0000000064959000-memory.dmp

          Filesize

          100KB

        • memory/4944-155-0x0000000000EA0000-0x0000000000EB0000-memory.dmp

          Filesize

          64KB

        • memory/4944-152-0x00007FFBC9BD0000-0x00007FFBCA691000-memory.dmp

          Filesize

          10.8MB

        • memory/4944-151-0x0000000000E00000-0x0000000000E20000-memory.dmp

          Filesize

          128KB

        • memory/4944-135-0x0000000000620000-0x000000000064C000-memory.dmp

          Filesize

          176KB

        • memory/4944-228-0x00007FFBC9BD0000-0x00007FFBCA691000-memory.dmp

          Filesize

          10.8MB