Analysis

  • max time kernel
    136s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2022, 15:56

General

  • Target

    b47a9ef4bc6a0764397c17c111e574d172ccadf5fdec8d557c710a782b0a3e5e.exe

  • Size

    3.6MB

  • MD5

    3138a391595f982f8677e025ce786203

  • SHA1

    ca80b7c809300223bebf024daf54161acfe7c473

  • SHA256

    b47a9ef4bc6a0764397c17c111e574d172ccadf5fdec8d557c710a782b0a3e5e

  • SHA512

    e99374c0bc2f277b03b13751eb8eff62519c33dff9e5e8643e01ae7c02e10a743353e6c146b8552406775df44292aa0107249ae4c9a738ea3ddc5336c4a01ccf

  • SSDEEP

    98304:DpBWwUteKlrdDRAOMaU9y4Xms2FRY/sMySUz2+FpH:3WwUteKlJV4Xms28vqpH

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 16 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b47a9ef4bc6a0764397c17c111e574d172ccadf5fdec8d557c710a782b0a3e5e.exe
    "C:\Users\Admin\AppData\Local\Temp\b47a9ef4bc6a0764397c17c111e574d172ccadf5fdec8d557c710a782b0a3e5e.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Program Files (x86)\Windows Shell\mrun.exe
      "C:\Program Files (x86)\Windows Shell\mrun.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\System32\cscript.exe" "C:\Users\Admin\AppData\Temp\tmp.vbs"
        3⤵
          PID:920
      • C:\Program Files (x86)\Windows Shell\4konya.exe
        "C:\Program Files (x86)\Windows Shell\4konya.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:928
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat" "
          3⤵
          • Drops file in Drivers directory
          • Suspicious use of WriteProcessMemory
          PID:1936
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\a0000000.vbs"
            4⤵
            • Drops file in Drivers directory
            PID:1716
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Fe\Oa\b222222.vbs"
            4⤵
            • Blocklisted process makes network request
            PID:1996
      • C:\Program Files (x86)\Windows Shell\runme.exe
        "C:\Program Files (x86)\Windows Shell\runme.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        PID:1900
      • C:\Program Files (x86)\Windows Shell\mac.exe
        "C:\Program Files (x86)\Windows Shell\mac.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1620
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 912
          3⤵
          • Suspicious behavior: GetForegroundWindowSpam
          PID:932
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {166D6963-D687-412C-8B84-9D81E27EF683} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\PROGRA~3\Mozilla\vjvysqf.exe
        C:\PROGRA~3\Mozilla\vjvysqf.exe -swhqdtn
        2⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of UnmapMainImage
        PID:1088

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\PROGRA~3\Mozilla\vjvysqf.exe

      Filesize

      176KB

      MD5

      c897f3460b6df10ae32242bb0259223f

      SHA1

      b88a1349a21fa7cdb494b959fad4d936c1733422

      SHA256

      8cb78251edae57be9eb88ce1953acf10e85163e400a8fd4d9020404ef5347ae4

      SHA512

      dbdefd023a0e89f8d528a82f7a7274544b82fea23145789f577d7485d6ee93ca2e49796613cc746d9f0b0b911895a971d06a980b81a06ca36b504cf50a319703

    • C:\PROGRA~3\Mozilla\vjvysqf.exe

      Filesize

      176KB

      MD5

      c897f3460b6df10ae32242bb0259223f

      SHA1

      b88a1349a21fa7cdb494b959fad4d936c1733422

      SHA256

      8cb78251edae57be9eb88ce1953acf10e85163e400a8fd4d9020404ef5347ae4

      SHA512

      dbdefd023a0e89f8d528a82f7a7274544b82fea23145789f577d7485d6ee93ca2e49796613cc746d9f0b0b911895a971d06a980b81a06ca36b504cf50a319703

    • C:\Program Files (x86)\Fe\Oa\a0000000.vbs

      Filesize

      1KB

      MD5

      95c7c5ebb71dd75b3d677680fd046a81

      SHA1

      214fddd3880cc44e2824b8849b6651bf6492b24f

      SHA256

      f75a2a45f36c0c830204bbea4c95197658db2a6191e802c8f60ffeed56411dd3

      SHA512

      fad061fed867e0695c4e75e27c81829a7c8684bda37016df3f9a7e8ca91d8577a84a56d65cfdd225807b3b3ab66ce1aa55efc9d2bb58232b04020c1ca0534e68

    • C:\Program Files (x86)\Fe\Oa\b222222.vbs

      Filesize

      164B

      MD5

      35d692f3049a445e6e566fcf79bebaf3

      SHA1

      e5771aa8f9508e0204e6b57274db87ab3d665ecf

      SHA256

      56fb7d6dbfca31ff851c5b466e2955459c9f4c809a0f3cc848ebb60cf04f056e

      SHA512

      17a97543a2bf8ff4b1117764f04cdd80690b7fc15e2684fb37bcabb41e4e6ab0c7a6895c2b9dc996d878565db90dd84a413f50399b73069a74f60d5bc9cb104d

    • C:\Program Files (x86)\Fe\Oa\cizfffffffffff.az

      Filesize

      27B

      MD5

      213c0742081a9007c9093a01760f9f8c

      SHA1

      df53bb518c732df777b5ce19fc7c02dcb2f9d81b

      SHA256

      9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

      SHA512

      55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

    • C:\Program Files (x86)\Fe\Oa\kk099999999999kk.qrw

      Filesize

      67B

      MD5

      7f5fcdafa607e2db829e38ddee1ce140

      SHA1

      ad0d62243de997b00c58be64c9f708cd1f5b5789

      SHA256

      30c20c47df8cdc9ea474fd9345cbf4ce9a749d8fbfbe1472b7398b31479f17eb

      SHA512

      6611061ab6d761d5a18e2cb71404b214392c348c7b2cd8064ec3335736be3e48dfe3ec808100f9f4300df2b13c00916a17b9b641f114d7bdb6ee69b34cd0befa

    • C:\Program Files (x86)\Fe\Oa\ooooooooopopopopopopopopopppopopo.bat

      Filesize

      2KB

      MD5

      1b229f3a6f894cebc4b70cfc14fd6a5f

      SHA1

      516714793d066cf32d03cf0808ccdb08e75203f9

      SHA256

      4aa31946d8659bccf938ff0e92b6769fc5389fe7399d92c745cc6af328d6674e

      SHA512

      d845652d461954c8864182003b7cea33a8e475662edfaef02c60fb38ac3feb984d82a6cc05126e302cf8f7f1d9962643fd6861270b3b8a34573ce82cfe5fbded

    • C:\Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • C:\Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • C:\Program Files (x86)\Windows Shell\Interop.IWshRuntimeLibrary.dll

      Filesize

      48KB

      MD5

      d923d4b8d2eba5847c92b8fdd3a0378f

      SHA1

      e99c5b639918616d41e06f1274c6ec5b9706c706

      SHA256

      73de6d8cd7795bed2fe4dd894a3febfc0083b7916b9bedc77a61fa1d23deee84

      SHA512

      2fcc23f1fa829fada9e77814af8062a077871128eddc6233c8bf1673af1ee0475489d2c6b8585e1d4066f2acf0657e024ac7fa93659c0ca0fb68bf582ce068bf

    • C:\Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • C:\Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • C:\Program Files (x86)\Windows Shell\mrun.exe

      Filesize

      2.8MB

      MD5

      a24c7214cd5f4e6d583054ff884f3975

      SHA1

      cd88074a83e84310f9958cce9976274b9f097193

      SHA256

      784f037789f4a38996a68e847e7b8b221a62dbabd6fd6debc9a1ef764beb2df5

      SHA512

      299dc8607bb39e25202d5bf417de7c43e842b1648f5beeb619c89236dcb240ef095903686f0b49f06b42c0f65b59fba5c4c909c2b3c087475b906e32201701c0

    • C:\Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • C:\Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • C:\Windows\System32\drivers\etc\hosts

      Filesize

      1KB

      MD5

      4b8ae1e8525f89daec664ef09ac0d67a

      SHA1

      503408e6328fd902f247617bc9e34aa93d138d9d

      SHA256

      03ecba0962de194d0c02f07857d264ffb060f41d6c3ccbfc313e7f62f2721ee4

      SHA512

      f99e91fa3f6403562c14f83c93595b1d26a47038b276838ba4f2da22d10e318329664b17e328a4f0f03725ac6bbf6bb77d5622b35a4017f12b8f36c0f2c37dbb

    • \Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • \Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • \Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • \Program Files (x86)\Windows Shell\4konya.exe

      Filesize

      128KB

      MD5

      058b9ceec8f16a108f1bbd2ca0b0d3c2

      SHA1

      1ee9d82238c457209f16863d73fa9f4aa8a5f8b6

      SHA256

      a87976130b87f19509e7b5e57dc89ddbd678311871a81b266d43430a1120d81d

      SHA512

      281ef1db959b9a9aa8967d7295a2b68de1c30ca5f3b64dea09e7a0f695f82d60636210c2f5469190b089f5a59564fdb9ba643520779cb6eba197d5258e9ca2b3

    • \Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • \Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • \Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • \Program Files (x86)\Windows Shell\mac.exe

      Filesize

      87KB

      MD5

      ae94e4af1c9befaae89a0479d5bab685

      SHA1

      28afffde9c2b973cf11a1f3710a3ec08e8566337

      SHA256

      68477513cb2e19940142cc729c2fe57991e203ba6a04fbe1195ebcd76c001ebc

      SHA512

      c8a93b0253826030c4ee013191d8cb0aca26317b0a26fbdf3e2c68b4d9775cffc1dfe6c417fabb6f87b684865e6d9620425847eed253214a9a17db9f54c163be

    • \Program Files (x86)\Windows Shell\mrun.exe

      Filesize

      2.8MB

      MD5

      a24c7214cd5f4e6d583054ff884f3975

      SHA1

      cd88074a83e84310f9958cce9976274b9f097193

      SHA256

      784f037789f4a38996a68e847e7b8b221a62dbabd6fd6debc9a1ef764beb2df5

      SHA512

      299dc8607bb39e25202d5bf417de7c43e842b1648f5beeb619c89236dcb240ef095903686f0b49f06b42c0f65b59fba5c4c909c2b3c087475b906e32201701c0

    • \Program Files (x86)\Windows Shell\mrun.exe

      Filesize

      2.8MB

      MD5

      a24c7214cd5f4e6d583054ff884f3975

      SHA1

      cd88074a83e84310f9958cce9976274b9f097193

      SHA256

      784f037789f4a38996a68e847e7b8b221a62dbabd6fd6debc9a1ef764beb2df5

      SHA512

      299dc8607bb39e25202d5bf417de7c43e842b1648f5beeb619c89236dcb240ef095903686f0b49f06b42c0f65b59fba5c4c909c2b3c087475b906e32201701c0

    • \Program Files (x86)\Windows Shell\mrun.exe

      Filesize

      2.8MB

      MD5

      a24c7214cd5f4e6d583054ff884f3975

      SHA1

      cd88074a83e84310f9958cce9976274b9f097193

      SHA256

      784f037789f4a38996a68e847e7b8b221a62dbabd6fd6debc9a1ef764beb2df5

      SHA512

      299dc8607bb39e25202d5bf417de7c43e842b1648f5beeb619c89236dcb240ef095903686f0b49f06b42c0f65b59fba5c4c909c2b3c087475b906e32201701c0

    • \Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • \Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • \Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • \Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • \Program Files (x86)\Windows Shell\runme.exe

      Filesize

      176KB

      MD5

      6792d0c1dad310a1b9bee9147f34a5c3

      SHA1

      61ce56701bc841f8fe28e7165cc7b0c18df71b3b

      SHA256

      a0c1ca7d4d304bf9beb4fd89a8ecfa3d1ce7937919322ac90c0e36f30b498895

      SHA512

      97be3cd9db2f632d6fa600ed27ece35e9d0979dfc322ed83147785e5c035bab4512382460d2cd50372a1438b3558b9c23e06c0ba8f054848871b70f686fa39bc

    • memory/932-109-0x000007FEFC421000-0x000007FEFC423000-memory.dmp

      Filesize

      8KB

    • memory/1088-117-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1088-115-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1088-114-0x0000000000460000-0x00000000004BB000-memory.dmp

      Filesize

      364KB

    • memory/1244-54-0x0000000075B11000-0x0000000075B13000-memory.dmp

      Filesize

      8KB

    • memory/1620-102-0x000007FEEE4A0000-0x000007FEEF536000-memory.dmp

      Filesize

      16.6MB

    • memory/1620-86-0x000007FEF4050000-0x000007FEF4A73000-memory.dmp

      Filesize

      10.1MB

    • memory/1772-99-0x0000000000400000-0x00000000006D2000-memory.dmp

      Filesize

      2.8MB

    • memory/1772-116-0x0000000000400000-0x00000000006D2000-memory.dmp

      Filesize

      2.8MB

    • memory/1900-107-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1900-101-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1900-100-0x0000000000300000-0x000000000035B000-memory.dmp

      Filesize

      364KB