Resubmissions

25/04/2024, 20:22

240425-y5v28seb98 7

25/04/2024, 20:21

240425-y5c7eseb86 7

Analysis

  • max time kernel
    91s
  • max time network
    102s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25/04/2024, 20:22

General

  • Target

    paysafecard generator/paysafecardgenerator.exe

  • Size

    10.2MB

  • MD5

    d45b543e0729ffc7d3a56ac85eb486af

  • SHA1

    20f92c63b9ecbb1da6b77baad7bd9be128865dd7

  • SHA256

    3414fca594f8f5ac7514c1b51be2f6c4a3fc9f606e6c70709b206ea48ce28959

  • SHA512

    deb24f88c8eede36fb83825164a55379336b64af08968e3462a2facc456189e587faa937fd77b1ca637fcd628227fa144868a16173f3767ef03ba29768397882

  • SSDEEP

    196608:xLatAusbeILr7PnILLZWdoCOiV9onJ5hrZERryiU8AdZYJERfSEIrTswf5Y7xq50:dxlLr7M5liV9c5hlERjAdZYyAHrQ+5oq

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 20 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe
    "C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe
      "C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe\"""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4812
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Local\Temp\paysafecard generator\paysafecardgenerator.exe\""
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2888
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\"""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3168
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\""
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c echo Set oWS = WScript.CreateObject("WScript.Shell") > create_shortcut.vbs
        3⤵
          PID:3688
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c echo sLinkFile = "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Network System App Runtime Process.lnk" >> create_shortcut.vbs
          3⤵
            PID:4924
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c echo Set oLink = oWS.CreateShortcut(sLinkFile) >> create_shortcut.vbs
            3⤵
              PID:4864
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c echo oLink.TargetPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Pages\\Network System App Runtime Process.exe" >> create_shortcut.vbs
              3⤵
                PID:3188
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c echo oLink.Save >> create_shortcut.vbs
                3⤵
                  PID:3204
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c create_shortcut.vbs
                  3⤵
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:1100
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs"
                    4⤵
                    • Drops startup file
                    PID:4612

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    2KB

                    MD5

                    437395ef86850fbff98c12dff89eb621

                    SHA1

                    9cec41e230fa9839de1e5c42b7dbc8b31df0d69c

                    SHA256

                    9c39f3e1ee674a289926fddddfc5549740c488686ec6513f53848a225c192ba6

                    SHA512

                    bc669893f5c97e80a62fc3d15383ed7c62ffc86bc986401735903019bb96a5f13e4d0f6356baa2021267503a4eb62681e58e28fcff435350e83aa425fa76cd64

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    944B

                    MD5

                    e9688ab6235d42a37b41f2c9bccede30

                    SHA1

                    731fc10fc2a48424516d9219aeb98eb40ec3b112

                    SHA256

                    5522b52191a06d7b2314ceef9a3fb7963ae0c334e83912acced419f2fd786da0

                    SHA512

                    c4c4b256a6251c0b5ecfe9afc4de52475280867273107aa7ff51eed101115de020545be8d643628f409cf8858d90e3256f108fb8b56ac491eb93249ce45cf49b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\MSVCP140.dll

                    Filesize

                    559KB

                    MD5

                    c3d497b0afef4bd7e09c7559e1c75b05

                    SHA1

                    295998a6455cc230da9517408f59569ea4ed7b02

                    SHA256

                    1e57a6df9e3742e31a1c6d9bff81ebeeae8a7de3b45a26e5079d5e1cce54cd98

                    SHA512

                    d5c62fdac7c5ee6b2f84b9bc446d5b10ad1a019e29c653cfdea4d13d01072fdf8da6005ad4817044a86bc664d1644b98a86f31c151a3418be53eb47c1cfae386

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\VCRUNTIME140.dll

                    Filesize

                    99KB

                    MD5

                    8697c106593e93c11adc34faa483c4a0

                    SHA1

                    cd080c51a97aa288ce6394d6c029c06ccb783790

                    SHA256

                    ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833

                    SHA512

                    724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\VCRUNTIME140_1.dll

                    Filesize

                    43KB

                    MD5

                    21ae0d0cfe9ab13f266ad7cd683296be

                    SHA1

                    f13878738f2932c56e07aa3c6325e4e19d64ae9f

                    SHA256

                    7b8f70dd3bdae110e61823d1ca6fd8955a5617119f5405cdd6b14cad3656dfc7

                    SHA512

                    6b2c7ce0fe32faffb68510bf8ae1b61af79b2d8a2d1b633ceba3a8e6a668a4f5179bb836c550ecac495b0fc413df5fe706cd6f42e93eb082a6c68e770339a77c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_brotli.cp39-win_amd64.pyd

                    Filesize

                    861KB

                    MD5

                    2c7528407abfd7c6ef08f7bcf2e88e21

                    SHA1

                    ee855c0cde407f9a26a9720419bf91d7f1f283a7

                    SHA256

                    093ab305d9780373c3c7d04d19244f5e48c48e71958963ceca6211d5017a4441

                    SHA512

                    93e7c12a6038778fcda30734d933b869f93e3b041bb6940852404641a599fe9c8ee1168a2e99dcfb624f84c306aff99757d17570febabc259908c8f6cda4dbea

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_bz2.pyd

                    Filesize

                    83KB

                    MD5

                    6c7565c1efffe44cb0616f5b34faa628

                    SHA1

                    88dd24807da6b6918945201c74467ca75e155b99

                    SHA256

                    fe63361f6c439c6aa26fd795af3fd805ff5b60b3b14f9b8c60c50a8f3449060a

                    SHA512

                    822445c52bb71c884461230bb163ec5dee0ad2c46d42d01cf012447f2c158865653f86a933b52afdf583043b3bf8ba7011cc782f14197220d0325e409aa16e22

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_ctypes.pyd

                    Filesize

                    122KB

                    MD5

                    29da9b022c16da461392795951ce32d9

                    SHA1

                    0e514a8f88395b50e797d481cbbed2b4ae490c19

                    SHA256

                    3b4012343ef7a266db0b077bbb239833779192840d1e2c43dfcbc48ffd4c5372

                    SHA512

                    5c7d83823f1922734625cf69a481928a5c47b6a3bceb7f24c9197175665b2e06bd1cfd745c55d1c5fe1572f2d8da2a1dcc1c1f5de0903477bb927aca22ecb26a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_hashlib.pyd

                    Filesize

                    63KB

                    MD5

                    f377a418addeeb02f223f45f6f168fe6

                    SHA1

                    5d8d42dec5d08111e020614600bbf45091c06c0b

                    SHA256

                    9551431425e9680660c6baf7b67a262040fd2efceb241e4c9430560c3c1fafac

                    SHA512

                    6f60bfac34ed55ff5d6ae10c6ec5511906c983e0650e5d47dac7b8a97a2e0739266cae009449cced8dff59037e2dbfc92065fbbdfde2636d13679e1629650280

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_lzma.pyd

                    Filesize

                    157KB

                    MD5

                    b5355dd319fb3c122bb7bf4598ad7570

                    SHA1

                    d7688576eceadc584388a179eed3155716c26ef5

                    SHA256

                    b9bc7f1d8aa8498cb8b5dc75bb0dbb6e721b48953a3f295870938b27267fb5f5

                    SHA512

                    0e228aa84b37b4ba587f6d498cef85aa1ffec470a5c683101a23d13955a8110e1c0c614d3e74fb0aa2a181b852bceeec0461546d0de8bcbd3c58cf9dc0fb26f5

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_queue.pyd

                    Filesize

                    27KB

                    MD5

                    4ab2ceb88276eba7e41628387eacb41e

                    SHA1

                    58f7963ba11e1d3942414ef6dab3300a33c8a2bd

                    SHA256

                    d82ab111224c54bab3eefdcfeb3ba406d74d2884518c5a2e9174e5c6101bd839

                    SHA512

                    b0d131e356ce35e603acf0168e540c89f600ba2ab2099ccf212e0b295c609702ac4a7b0a7dbc79f46eda50e7ea2cf09917832345dd8562d916d118aba2fa3888

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_socket.pyd

                    Filesize

                    77KB

                    MD5

                    f5dd9c5922a362321978c197d3713046

                    SHA1

                    4fbc2d3e15f8bb21ecc1bf492f451475204426cd

                    SHA256

                    4494992665305fc9401ed327398ee40064fe26342fe44df11d89d2ac1cc6f626

                    SHA512

                    ce818113bb87c6e38fa85156548c6f207aaab01db311a6d8c63c6d900d607d7beff73e64d717f08388ece4b88bf8b95b71911109082cf4b0c0a9b0663b9a8e99

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\_ssl.pyd

                    Filesize

                    149KB

                    MD5

                    ef4755195cc9b2ff134ea61acde20637

                    SHA1

                    d5ba42c97488da1910cf3f83a52f7971385642c2

                    SHA256

                    8a86957b3496c8b679fcf22c287006108bfe0bb0aaffea17121c761a0744b470

                    SHA512

                    63ad2601fb629e74cf60d980cec292b6e8349615996651b7c7f68991cdae5f89b28c11adb77720d7dbbd7700e55fdd5330a84b4a146386cf0c0418a8d61a8a71

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\base_library.zip

                    Filesize

                    1006KB

                    MD5

                    486164529c839339cd0ff0388a6c577c

                    SHA1

                    48fc3473a5aa704d56315039fe725f87fdea457b

                    SHA256

                    38ceb5c89d72f0aeed6db30d35b027c5a5185dfeb1bb0e2dbe66e9a287e9815d

                    SHA512

                    a880c63e640222da2c1513de9631d1517cacad83bcec2667ff18f445c9e7287d47769df6bb8346d6f8ea978f3bc99ae24c5ce4ef7e19513c4ea2ee3a17041e80

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\certifi\cacert.pem

                    Filesize

                    279KB

                    MD5

                    7adbcc03e8c4f261c08db67930ec6fdd

                    SHA1

                    edc6158964acc5999ed5413575dd9a650a6bcdb2

                    SHA256

                    de5f02716b7fa8be36d37d2b1a2783dd22ee7c80855f46d8b4684397f11754f2

                    SHA512

                    58299ed51d66a801e2927d13c4304b7020eac80982559c7b898c46909d0bc902eb13fea501bd600c8c19739736289342bae227510c85702b7f04bd80d5a9c723

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\libcrypto-1_1.dll

                    Filesize

                    3.2MB

                    MD5

                    cc4cbf715966cdcad95a1e6c95592b3d

                    SHA1

                    d5873fea9c084bcc753d1c93b2d0716257bea7c3

                    SHA256

                    594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1

                    SHA512

                    3b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\libffi-7.dll

                    Filesize

                    32KB

                    MD5

                    eef7981412be8ea459064d3090f4b3aa

                    SHA1

                    c60da4830ce27afc234b3c3014c583f7f0a5a925

                    SHA256

                    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                    SHA512

                    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\libssl-1_1.dll

                    Filesize

                    673KB

                    MD5

                    bc778f33480148efa5d62b2ec85aaa7d

                    SHA1

                    b1ec87cbd8bc4398c6ebb26549961c8aab53d855

                    SHA256

                    9d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843

                    SHA512

                    80c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\python3.DLL

                    Filesize

                    57KB

                    MD5

                    3c88de1ebd52e9fcb46dc44d8a123579

                    SHA1

                    7d48519d2a19cac871277d9b63a3ea094fbbb3d9

                    SHA256

                    2b22b6d576118c5ae98f13b75b4ace47ab0c1f4cd3ff098c6aee23a8a99b9a8c

                    SHA512

                    1e55c9f7ac5acf3f7262fa2f3c509ee0875520bb05d65cd68b90671ac70e8c99bce99433b02055c07825285004d4c5915744f17eccfac9b25e0f7cd1bee9e6d3

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\python39.dll

                    Filesize

                    4.3MB

                    MD5

                    11c051f93c922d6b6b4829772f27a5be

                    SHA1

                    42fbdf3403a4bc3d46d348ca37a9f835e073d440

                    SHA256

                    0eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c

                    SHA512

                    1cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\select.pyd

                    Filesize

                    26KB

                    MD5

                    7a442bbcc4b7aa02c762321f39487ba9

                    SHA1

                    0fcb5bbdd0c3d3c5943e557cc2a5b43e20655b83

                    SHA256

                    1dd7bba480e65802657c31e6d20b1346d11bca2192575b45eb9760a4feb468ad

                    SHA512

                    3433c46c7603ae0a73aa9a863b2aecd810f8c0cc6c2cd96c71ef6bde64c275e0fceb4ea138e46a5c9bf72f66dcdea3e9551cf2103188a1e98a92d8140879b34c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\ucrtbase.dll

                    Filesize

                    992KB

                    MD5

                    0e0bac3d1dcc1833eae4e3e4cf83c4ef

                    SHA1

                    4189f4459c54e69c6d3155a82524bda7549a75a6

                    SHA256

                    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                    SHA512

                    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                  • C:\Users\Admin\AppData\Local\Temp\_MEI44562\unicodedata.pyd

                    Filesize

                    1.1MB

                    MD5

                    8320c54418d77eba5d4553a5d6ec27f9

                    SHA1

                    e5123cf166229aebb076b469459856a56fb16d7f

                    SHA256

                    7e719ba47919b668acc62008079c586133966ed8b39fec18e312a773cb89edae

                    SHA512

                    b9e6cdcb37d26ff9c573381bda30fa4cf1730361025cd502b67288c55744962bdd0a99790cedd4a48feef3139e3903265ab112ec545cb1154eaa2a91201f6b34

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_v4t4obse.1f3.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\Network System App Runtime Process.exe

                    Filesize

                    6.7MB

                    MD5

                    984704ebd3a9b37173510c21ca9a9aea

                    SHA1

                    2aa0d577c6e6c4ffa298db35115a2c0a9ab5b4bf

                    SHA256

                    b6617e188fd0a5f78280b0c972bf92d44b12fffacf6b02c86abab266565b8207

                    SHA512

                    62fa47ed18dcedac1205e356742b81172c9b207326c157269c698d202f23da8f4c0737803e3fa256da1286c5a477229bc597cc8a8d5d36ff16521bc7758d2dea

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs

                    Filesize

                    182B

                    MD5

                    8e08cd9ff419b6425f25e8786175e374

                    SHA1

                    ad9bf757f97662ad4584eb5cc6b984ffede294ea

                    SHA256

                    0ece1a539ed5bf596d72f68a8ae59b0e1c21400f3c4534505a3bfb7c2eed245d

                    SHA512

                    d847677e05de14ab662ecf4ba7873b9ed6c567e282963d8d908b1efc470cb865733b2edc5979ea3b894441157f04713bf8b848b6945a3a85ad46aa7c0b1d5df9

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs

                    Filesize

                    226B

                    MD5

                    12a7a2a148bbcc75d09d686281e4d2c8

                    SHA1

                    29854f107a9adbf4fd50d961664442c2ce46634f

                    SHA256

                    2370fc9ec0b9a95bfed7bfd7749cb60e6cabbdeb311b6be9ed809b2f7a2b5eb8

                    SHA512

                    253b2f41eb21ae1e381043261a81d733f2aa9e7b19f9953ca57df489f8d7a25841c40cf9ad263c693a09ff19cdf57c12d86e0a1f1b727afae884503832b164b5

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs

                    Filesize

                    351B

                    MD5

                    3720fb8cfa60183e6673e652722628ee

                    SHA1

                    c4760b44d1c8d8bdbcbe9a82133b7a4e73d99773

                    SHA256

                    e1e55cfda0de8141d98ebf9a46c00a5f502583e704dbee92228eae1625f6a2a8

                    SHA512

                    a0d714e2c6edcbd616d8ac91bc974995f40cf32d2fd51a797e281435612e3155a9f2c9c83bbd5b13e4220bdc5db5f4e8649161855377a5791ae6dd8d5d6f1e69

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Pages\create_shortcut.vbs

                    Filesize

                    364B

                    MD5

                    f5989b37ae11b13b4702a29df259a1a3

                    SHA1

                    f937ba426066e6f6db28e1c833ae1b1e65757a96

                    SHA256

                    66f8d8241c9797b3e21feed1f110f1741684768d01be998d1590c50ee4946b01

                    SHA512

                    db488e1e63b8c6036e918e3bd0970bf00607a0105ce57487756416d7c1346884d880b38389383762e14cae49118794d9b715c6d5ef795bf4bf85d5dfd266580b

                  • memory/2000-135-0x00007FFE5C5C0000-0x00007FFE5D082000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2000-137-0x000001E87FF70000-0x000001E87FF80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2000-136-0x000001E87FF70000-0x000001E87FF80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2000-139-0x000001E87FF70000-0x000001E87FF80000-memory.dmp

                    Filesize

                    64KB

                  • memory/2000-141-0x00007FFE5C5C0000-0x00007FFE5D082000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2888-118-0x000001C123A40000-0x000001C123A62000-memory.dmp

                    Filesize

                    136KB

                  • memory/2888-120-0x000001C123950000-0x000001C123960000-memory.dmp

                    Filesize

                    64KB

                  • memory/2888-121-0x000001C123950000-0x000001C123960000-memory.dmp

                    Filesize

                    64KB

                  • memory/2888-119-0x00007FFE5C5C0000-0x00007FFE5D082000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2888-125-0x00007FFE5C5C0000-0x00007FFE5D082000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/2888-122-0x000001C123950000-0x000001C123960000-memory.dmp

                    Filesize

                    64KB