Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 18:23

General

  • Target

    2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe

  • Size

    4.3MB

  • MD5

    fdcd0858c7855fe5d15be5345aec0c19

  • SHA1

    5b260f84a9b4495ecfc255effae8c6365ca42a01

  • SHA256

    c292c41a624026c8c157aaf8f197c57e4d62bf259d6933d382ddefd865006303

  • SHA512

    f9102ccabc1e4e8446a1805499871a0c68240f5b23ef1df1ac4d9706600e525f55b57f63faea71c0bbae76437db4b487ced7b9ae76bab7d92895a76a1654af0c

  • SSDEEP

    98304:rpuFB1/XTsJPZUIbzlMMvylQ6DxVEminfYzUhswFtmOb9G1:6jXKPZUWzlMMhEEminfYzhwH39

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 13 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 8 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 6 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1200
  • C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
    C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
    1⤵
    • Event Triggered Execution: Image File Execution Options Injection
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\InfusedAppe\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\InfusedAppe\Corporate\log.txt
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\InfusedAppe\Corporate\vfshost.exe
        C:\Windows\InfusedAppe\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "MiscfostNsi" /ru system /tr "cmd /c C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4524
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4240
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "MiscfostNsi" /ru system /tr "cmd /c C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:636
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "HomeGroupProvider" /ru system /tr "cmd /c echo Y|cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4332
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "HomeGroupProvider" /ru system /tr "cmd /c echo Y|cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "WwANsvc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1956
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "WwANsvc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3356
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c net stop SharedAccess
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\SysWOW64\net.exe
        net stop SharedAccess
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3500
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop SharedAccess
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c net stop MpsSvc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Windows\SysWOW64\net.exe
        net stop MpsSvc
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MpsSvc
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1460
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c net stop LanmanServer
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Windows\SysWOW64\net.exe
        net stop LanmanServer
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2596
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop LanmanServer
          4⤵
          • System Location Discovery: System Language Discovery
          PID:116
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c sc config LanmanServer start= disabled
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1240
      • C:\Windows\SysWOW64\sc.exe
        sc config LanmanServer start= disabled
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:548
    • C:\Windows\TEMP\Networks\taskmgr.exe
      C:\Windows\TEMP\Networks\taskmgr.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1424
    • C:\Windows\TEMP\wimnat.exe
      C:\Windows\TEMP\wimnat.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5116
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Windows\InfusedAppe\Priess\scan.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4380
      • C:\Windows\InfusedAppe\Priess\GoogleCdoeUpdate.exe
        GoogleCdoeUpdate.exe tcp 10.127.0.1 10.127.255.255 445 512 /save
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:4876
  • C:\Windows\SysWOW64\xchlyg.exe
    C:\Windows\SysWOW64\xchlyg.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3048
  • C:\Windows\system32\cmd.EXE
    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F
    1⤵
      PID:4216
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        2⤵
          PID:2360
        • C:\Windows\system32\cacls.exe
          cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F
          2⤵
            PID:1444
        • C:\Windows\system32\cmd.EXE
          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
          1⤵
            PID:3712
            • C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
              C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
              2⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:4464
          • C:\Windows\system32\cmd.EXE
            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F
            1⤵
              PID:4944
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                2⤵
                  PID:3732
                • C:\Windows\system32\cacls.exe
                  cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F
                  2⤵
                    PID:4004
                • C:\Windows\system32\cmd.EXE
                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F
                  1⤵
                    PID:2396
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      2⤵
                        PID:5372
                      • C:\Windows\system32\cacls.exe
                        cacls C:\Windows\TEMP\Networks\taskmgr.exe /p everyone:F
                        2⤵
                          PID:5368
                      • C:\Windows\system32\cmd.EXE
                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
                        1⤵
                          PID:5304
                          • C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
                            C:\Windows\ime\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:5808
                        • C:\Windows\system32\cmd.EXE
                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F
                          1⤵
                            PID:1980
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              2⤵
                                PID:6016
                              • C:\Windows\system32\cacls.exe
                                cacls C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe /p everyone:F
                                2⤵
                                  PID:5452

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\2024-11-26_fdcd0858c7855fe5d15be5345aec0c19_godropper_hacktools_icedid_luca-stealer_mimikatz.exe

                                Filesize

                                4.3MB

                                MD5

                                fdcd0858c7855fe5d15be5345aec0c19

                                SHA1

                                5b260f84a9b4495ecfc255effae8c6365ca42a01

                                SHA256

                                c292c41a624026c8c157aaf8f197c57e4d62bf259d6933d382ddefd865006303

                                SHA512

                                f9102ccabc1e4e8446a1805499871a0c68240f5b23ef1df1ac4d9706600e525f55b57f63faea71c0bbae76437db4b487ced7b9ae76bab7d92895a76a1654af0c

                              • C:\Windows\InfusedAppe\Corporate\vfshost.exe

                                Filesize

                                381KB

                                MD5

                                fd5efccde59e94eec8bb2735aa577b2b

                                SHA1

                                51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                SHA256

                                441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                SHA512

                                74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                              • C:\Windows\InfusedAppe\LocalService\spoolsrv.xml

                                Filesize

                                7KB

                                MD5

                                497080fed2000e8b49ee2e97e54036b1

                                SHA1

                                4af3fae881a80355dd09df6e736203c30c4faac5

                                SHA256

                                756f44f1d667132b043bfd3da16b91c9f6681e5d778c5f07bb031d62ff00d380

                                SHA512

                                4f8bd09f9d8d332c436beb8164eec90b0e260b69230f102565298beff0db37265be1ae5eb70acf60e77d5589c61c7ee7f01a02d2a30ac72d794a04efef6f25df

                              • C:\Windows\InfusedAppe\LocalService\svschost.xml

                                Filesize

                                5KB

                                MD5

                                09d45ae26830115fd8d9cdc2aa640ca5

                                SHA1

                                41a6ad8d88b6999ac8a3ff00dd9641a37ee20933

                                SHA256

                                cf33a92a05ba3c807447a5f6b7e45577ed53174699241da360876d4f4a2eb2de

                                SHA512

                                1a97f62f76f6f5a7b668eadb55f08941b1d8dfed4a28c4d7a4f2494ff57e998407ec2d0fedaf7f670eb541b1fda40ca5e429d4d2a87007ec45ea5d10abd93aa5

                              • C:\Windows\InfusedAppe\Priess\GoogleCdoeUpdate.exe

                                Filesize

                                105KB

                                MD5

                                6f66a335570b54739990afe1b3f7abd2

                                SHA1

                                245aafe4f98ee9ea32800affd433a1446112b9e2

                                SHA256

                                9f843d4a0ec79659e9a45bcede49a4776813deb8d35c7d6b74f17b72d5a34eed

                                SHA512

                                daa55e9e6a9d9d6ca378a3017170fada5d14c8c6fe5ff7907c4c520b2abbfb9d6212c4258ea99e4b688a52882313dcecc642a58dde854883b799817c28a7dc90

                              • C:\Windows\InfusedAppe\Priess\ip.txt

                                Filesize

                                191B

                                MD5

                                6828bbf954c104a5617b1183fff260a5

                                SHA1

                                cf2f95850eead7d965efd506da49d1c06f91e456

                                SHA256

                                c4fcf2486bd076b1ae9611abb5980faf29848163132cdffce9d0c13629b98ce9

                                SHA512

                                5feb7d786b154cae953b680a852ad862a31af9bacd35d25ebb50c8a7849ee5898c4fc973d5aeda76f67f386793045ee2715185252ed124445fe8fc716677ee6d

                              • C:\Windows\InfusedAppe\Priess\scan.bat

                                Filesize

                                134B

                                MD5

                                2b2796f90932dc3c24db746b874c3e5a

                                SHA1

                                8c179ae387fafe5331dd5ad6a57632b92173fad8

                                SHA256

                                ddd2f544dd188599ea343567aa4fd2caf2cac8173a0acc67cfca667f90eaddd0

                                SHA512

                                8046816ed9dbbec32e0347b224397eb9f97c317b8589e90c228f8f67b73a133a8b9c02394e08d49b6c3f48d7e1109be734c50d856ce4ea3cc3d198dee3f4012a

                              • C:\Windows\TEMP\Networks\config.json

                                Filesize

                                750B

                                MD5

                                3bb2c47f0a437a02c2817753b3becf1f

                                SHA1

                                b1d4e62ba0675a57001a8c63349c9cb0af505711

                                SHA256

                                2e7c49b882f6f841891bcc82da771d5ec5a69fb02be336d6f7fd306c268ddb42

                                SHA512

                                39642aded900c47c878bda620442f1e708ea4c85742b264cdd98e19e1df4d00c6cb77eb326999c8b8cfad7775c4e4cb35dd0e78cac068e3968275140fa6484b2

                              • C:\Windows\Temp\Networks\taskmgr.exe

                                Filesize

                                266KB

                                MD5

                                82f23e8e9357e0dccfba2c448179ab4b

                                SHA1

                                9d0cea15ac25a02a22c2e800de0c34767b48da5b

                                SHA256

                                ebdf414fc030f885d0b75fcb6a39ace2f95b4e6a511fe1f137552dbec8f5f31a

                                SHA512

                                c55b5b909189c8a149477ba30061ec1eeebd7da728653fb4699c24afc1f24c18051f8acd7b62fc407764b79b6193ecd546b73a1a0655488d40bbd7a2e06d86f0

                              • C:\Windows\Temp\wimnat.exe

                                Filesize

                                72KB

                                MD5

                                2334bb8baf5e062683d8ec67b7ac531e

                                SHA1

                                5419ddccabaa0a0b98fd6783c8341012c40db522

                                SHA256

                                6c310b9829fe5fac50b0ea752242b456b3b86462dee46624337715831deb8b2e

                                SHA512

                                ee0e3f619f0294e3e67e324cab582dd790ba2c15ae08365c0481fd07e32949428c9f4f4872572f52df02be3cd558c78be8af5696da4731b528019ad6706770f8

                              • memory/1424-99-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-112-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-90-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-91-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-95-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-96-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-97-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-98-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-118-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-117-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-116-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-68-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-115-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/1424-114-0x00007FF60C2A0000-0x00007FF60C35D000-memory.dmp

                                Filesize

                                756KB

                              • memory/2112-87-0x00007FF782B70000-0x00007FF782C5E000-memory.dmp

                                Filesize

                                952KB

                              • memory/2112-85-0x00007FF782B70000-0x00007FF782C5E000-memory.dmp

                                Filesize

                                952KB

                              • memory/4876-109-0x0000000000200000-0x000000000021F000-memory.dmp

                                Filesize

                                124KB

                              • memory/5116-89-0x0000000000400000-0x0000000000412000-memory.dmp

                                Filesize

                                72KB

                              • memory/5116-71-0x0000000010000000-0x0000000010008000-memory.dmp

                                Filesize

                                32KB