Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2023 15:58

General

  • Target

    be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995.exe

  • Size

    11.7MB

  • MD5

    fe5a4d2b381761d420987edcb22c2fb6

  • SHA1

    8acbbd07976e2fbc80974567f88b988606ab651e

  • SHA256

    be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995

  • SHA512

    a3a01b48654a839de913e3d1d3555a02c28845e7e693744206048540f3e8cbb8aecead0898b1d3c93dfea46459a4f595c8f8af298bc61945cce473f7fcb3d4ac

  • SSDEEP

    98304:+DGCo6cWy7JlG49hbzPvRhJBAUZLHlrPz4rbm:ueVTJVhf4K

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995.exe
    "C:\Users\Admin\AppData\Local\Temp\be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995.exe"
    1⤵
    • Enumerates connected drives
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\aAHNX9iHIx.exe
      F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\aAHNX9iHIx.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\SysWOW64\grpconv.exe
        C:\Windows\SysWOW64\grpconv.exe
        3⤵
          PID:1652
        • C:\Windows\SysWOW64\netsh.exe
          C:\Windows\SysWOW64\netsh.exe
          3⤵
          • Suspicious use of SetWindowsHookEx
          PID:620
        • C:\Windows\SysWOW64\winrshost.exe
          C:\Windows\SysWOW64\winrshost.exe
          3⤵
            PID:600
          • C:\Windows\SysWOW64\ndadmin.exe
            C:\Windows\SysWOW64\ndadmin.exe
            3⤵
              PID:1736
            • C:\Windows\SysWOW64\gpresult.exe
              C:\Windows\SysWOW64\gpresult.exe
              3⤵
                PID:2384
              • C:\Windows\SysWOW64\winrs.exe
                C:\Windows\SysWOW64\winrs.exe
                3⤵
                • Suspicious use of SetWindowsHookEx
                PID:2120
              • C:\Windows\SysWOW64\rekeywiz.exe
                C:\Windows\SysWOW64\rekeywiz.exe
                3⤵
                  PID:1880
                • C:\Windows\SysWOW64\taskeng.exe
                  C:\Windows\SysWOW64\taskeng.exe
                  3⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:680
                • C:\Windows\SysWOW64\ieUnatt.exe
                  C:\Windows\SysWOW64\ieUnatt.exe
                  3⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:2684
                • C:\Windows\SysWOW64\SyncHost.exe
                  C:\Windows\SysWOW64\SyncHost.exe
                  3⤵
                    PID:2632
                  • C:\Windows\SysWOW64\RMActivate_ssp.exe
                    C:\Windows\SysWOW64\RMActivate_ssp.exe
                    3⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2580
                  • C:\Windows\SysWOW64\Utilman.exe
                    C:\Windows\SysWOW64\Utilman.exe
                    3⤵
                      PID:2884
                    • C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe
                      C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe
                      3⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:2344
                    • C:\Windows\SysWOW64\dvdupgrd.exe
                      C:\Windows\SysWOW64\dvdupgrd.exe
                      3⤵
                        PID:292
                      • C:\Windows\SysWOW64\mobsync.exe
                        C:\Windows\SysWOW64\mobsync.exe
                        3⤵
                          PID:456
                        • C:\Windows\SysWOW64\fontview.exe
                          C:\Windows\SysWOW64\fontview.exe
                          3⤵
                            PID:860
                          • C:\Windows\SysWOW64\regedt32.exe
                            C:\Windows\SysWOW64\regedt32.exe
                            3⤵
                              PID:2320
                            • C:\Windows\SysWOW64\mstsc.exe
                              C:\Windows\SysWOW64\mstsc.exe
                              3⤵
                                PID:1124
                              • C:\Windows\SysWOW64\mfpmp.exe
                                C:\Windows\SysWOW64\mfpmp.exe
                                3⤵
                                • Suspicious use of SetWindowsHookEx
                                PID:1096
                              • C:\Windows\SysWOW64\Robocopy.exe
                                C:\Windows\SysWOW64\Robocopy.exe
                                3⤵
                                  PID:544
                                • C:\Windows\SysWOW64\InfDefaultInstall.exe
                                  C:\Windows\SysWOW64\InfDefaultInstall.exe
                                  3⤵
                                    PID:2592
                                  • C:\Windows\SysWOW64\getmac.exe
                                    C:\Windows\SysWOW64\getmac.exe
                                    3⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2576
                                  • C:\Windows\SysWOW64\userinit.exe
                                    C:\Windows\SysWOW64\userinit.exe
                                    3⤵
                                      PID:2924
                                    • C:\Windows\SysWOW64\proquota.exe
                                      C:\Windows\SysWOW64\proquota.exe
                                      3⤵
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2764
                                    • C:\Windows\SysWOW64\MRINFO.EXE
                                      C:\Windows\SysWOW64\MRINFO.EXE
                                      3⤵
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2256
                                    • C:\Windows\SysWOW64\wecutil.exe
                                      C:\Windows\SysWOW64\wecutil.exe
                                      3⤵
                                        PID:1468
                                      • C:\Windows\SysWOW64\ktmutil.exe
                                        C:\Windows\SysWOW64\ktmutil.exe
                                        3⤵
                                          PID:968
                                        • C:\Windows\SysWOW64\explorer.exe
                                          C:\Windows\SysWOW64\explorer.exe
                                          3⤵
                                            PID:2296
                                          • C:\Windows\SysWOW64\SecEdit.exe
                                            C:\Windows\SysWOW64\SecEdit.exe
                                            3⤵
                                              PID:2784
                                            • C:\Windows\SysWOW64\ntoskrnl.exe
                                              C:\Windows\SysWOW64\ntoskrnl.exe
                                              3⤵
                                                PID:1540
                                              • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\Ye07qlLNhb_d5.exe
                                                F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\Ye07qlLNhb_d5.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • Enumerates connected drives
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2360
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BE5903~1.EXE > nul
                                              2⤵
                                              • Deletes itself
                                              PID:1400

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\RBSFSystem.ini

                                            Filesize

                                            265B

                                            MD5

                                            d231841835640a8ba23fb71157056650

                                            SHA1

                                            914230687e238042a3c3068dc3202c1825a563dd

                                            SHA256

                                            5b591cf43e20ed9a20076b8f14c548c66fd0875d3f74fd2e8527b2a4786080c1

                                            SHA512

                                            9413ef6c851891ea24630ca7044a2c7d1993c23f5bbabbf936218264816cc68978643195ec056dc6f5df0dab339d3cf96d5dfc7180099aa3770cf130e8207c70

                                          • C:\RBSFSystem.ini

                                            Filesize

                                            129B

                                            MD5

                                            78d89536fa344a82364f1dda81d78f3a

                                            SHA1

                                            e866b4f7713f3b6718c2b4b836937c8b35ff7c31

                                            SHA256

                                            32c064c7c56cae4ea4ee32cf8ee2f110f2f715ed064c28c1a5e5b4b384439fa5

                                            SHA512

                                            2a04d9ea26e8617c60f5af189f2fce74baf151bb414390aa617adf140bce277d492764dc7a34671d0a09c61edebbd0b9f8d3ce591a2d6d54f66495f53cce6d58

                                          • C:\RBSFSystem.ini

                                            Filesize

                                            162B

                                            MD5

                                            88c2252f623186c2d6df7435bc62d21c

                                            SHA1

                                            069e5043a513560366a4fcef96d8c93b4a208d92

                                            SHA256

                                            5e7569a68fbf6ac8aeb4d3db463ad165beeb63edcf63005f66a361cdcc2c7213

                                            SHA512

                                            49ea66da3b80e6bfecc5efa0a7fc42830f29fc5e2113d70cd049ceb89452dc58a82e2274e7a2ce7fd63fc4f86abed4858eb4c6144b766bd91e6a8ff0844bc3ea

                                          • C:\RBSFSystem.ini

                                            Filesize

                                            265B

                                            MD5

                                            d231841835640a8ba23fb71157056650

                                            SHA1

                                            914230687e238042a3c3068dc3202c1825a563dd

                                            SHA256

                                            5b591cf43e20ed9a20076b8f14c548c66fd0875d3f74fd2e8527b2a4786080c1

                                            SHA512

                                            9413ef6c851891ea24630ca7044a2c7d1993c23f5bbabbf936218264816cc68978643195ec056dc6f5df0dab339d3cf96d5dfc7180099aa3770cf130e8207c70

                                          • C:\RBSFSystem.ini

                                            Filesize

                                            162B

                                            MD5

                                            88c2252f623186c2d6df7435bc62d21c

                                            SHA1

                                            069e5043a513560366a4fcef96d8c93b4a208d92

                                            SHA256

                                            5e7569a68fbf6ac8aeb4d3db463ad165beeb63edcf63005f66a361cdcc2c7213

                                            SHA512

                                            49ea66da3b80e6bfecc5efa0a7fc42830f29fc5e2113d70cd049ceb89452dc58a82e2274e7a2ce7fd63fc4f86abed4858eb4c6144b766bd91e6a8ff0844bc3ea

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            304B

                                            MD5

                                            a73c6541d98499bb79c292d41ec5d344

                                            SHA1

                                            810fa2a8909a584d74c9623765111887d90f1d3f

                                            SHA256

                                            5b0b8e3d7985407e53d44335c82037545fe0f10d12ef23a5a824617731fce007

                                            SHA512

                                            14dc5309ac891b5b223c493a5e522b07614d9055a0f7bf7784d1f74d5e01161bcbca33f3a33efd5d4ff034957c82c61bdfd35482a3af9eaf6564127df907f240

                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                            Filesize

                                            304B

                                            MD5

                                            d976485c46be46645462d056462e6ebc

                                            SHA1

                                            255e91f4151680d69687df4d237bd8c61b924742

                                            SHA256

                                            a5417c6980dc40849b0875ecc442e2914bf111e449242faf05da8c672949eded

                                            SHA512

                                            6d901b4172f80334cec9a61265269de06ee0918f8a1d8391528027f25740e5b4eb5a64aa7795c9bc82c2efe1a937e0ba67fa0710a8ab01e04f2746c60fea4af4

                                          • C:\Users\Admin\AppData\Local\Temp\Cab9E63.tmp

                                            Filesize

                                            61KB

                                            MD5

                                            f3441b8572aae8801c04f3060b550443

                                            SHA1

                                            4ef0a35436125d6821831ef36c28ffaf196cda15

                                            SHA256

                                            6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

                                            SHA512

                                            5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

                                          • C:\Users\Admin\AppData\Local\Temp\Tar9F31.tmp

                                            Filesize

                                            163KB

                                            MD5

                                            9441737383d21192400eca82fda910ec

                                            SHA1

                                            725e0d606a4fc9ba44aa8ffde65bed15e65367e4

                                            SHA256

                                            bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

                                            SHA512

                                            7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

                                          • C:\Users\Admin\AppData\Roaming\RBSF.ini

                                            Filesize

                                            1KB

                                            MD5

                                            4ec8ecd71ff0c5171b83bc3f039aabfc

                                            SHA1

                                            5f453f0d854ae2c20d33394c2b91dac5318dbd67

                                            SHA256

                                            46db18402b86779c1a3626b3adfaf95d5efe7ffeca653bb4700ce006aa3b3c30

                                            SHA512

                                            0f5da66a15c9b3da07f3dc84b6309d51e30361ba2745c43c17234094b00971c360f9cc08473db1a6b99ff4d0ea2e033e95e167110e18889020bef1b92e280262

                                          • C:\Users\Admin\AppData\Roaming\RBSF.ini

                                            Filesize

                                            10B

                                            MD5

                                            4b80dad734fc60f3fd3030f47a9d70c2

                                            SHA1

                                            946c991e66a831290cf11bbd8e9748ca62f7a27f

                                            SHA256

                                            85e74a3678e99c8dd94f4a61600a08beeb2d982b41aa5d603c88b9e3a4ad1383

                                            SHA512

                                            40717479d237c1ef9e0225fa0f6306d467936238a54acebe974a7d2b1aa38131ff1a396dfdc98ca3df286e0be88fbbb9c7ef69f3a8adf7b78cd113662f5fdb6c

                                          • C:\Users\Admin\Desktop\RBSF_tVSEkXl9MAj.lnk

                                            Filesize

                                            949B

                                            MD5

                                            40af7d7ad6cf02474f3a2d5df8aa4812

                                            SHA1

                                            044a7ae837736e6c6796be95a57df06e37b6f59d

                                            SHA256

                                            17166e13135dea8f13dd31df95f07f3485943cc00e662a2d3cf5b61fad4f1680

                                            SHA512

                                            534eccd1e0703db186d663ad78be36fd12400e638f56d556afbb06bf8b86429b48fbf196f0179bd876961af06066c7d0eedd0badfc59d85a6b7520ca38549ea7

                                          • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\Ye07qlLNhb_d5.exe

                                            Filesize

                                            6.8MB

                                            MD5

                                            4005ccc8d13e9ee5453e32eee30cccad

                                            SHA1

                                            dda8359a7c2cbbebc84857505c5bb65477557f8c

                                            SHA256

                                            0bcc80aa9398268eef12ac025223b06eae05664aedcf230d3ba73992206850ed

                                            SHA512

                                            4455034763cc85c81572d6b30da1b1ca649fd05e5d64d14fbd9b9954907ec44555c776daff35d4b9fa558f856dc4f7167fbfa4e48fc17a0a8270402301f0eff5

                                          • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\aAHNX9iHIx.exe

                                            Filesize

                                            11.7MB

                                            MD5

                                            fe5a4d2b381761d420987edcb22c2fb6

                                            SHA1

                                            8acbbd07976e2fbc80974567f88b988606ab651e

                                            SHA256

                                            be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995

                                            SHA512

                                            a3a01b48654a839de913e3d1d3555a02c28845e7e693744206048540f3e8cbb8aecead0898b1d3c93dfea46459a4f595c8f8af298bc61945cce473f7fcb3d4ac

                                          • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\aAHNX9iHIx.exe

                                            Filesize

                                            11.7MB

                                            MD5

                                            fe5a4d2b381761d420987edcb22c2fb6

                                            SHA1

                                            8acbbd07976e2fbc80974567f88b988606ab651e

                                            SHA256

                                            be5903721f12a958898ca4039988f128f63b37420d02227ccb28ac77657ae995

                                            SHA512

                                            a3a01b48654a839de913e3d1d3555a02c28845e7e693744206048540f3e8cbb8aecead0898b1d3c93dfea46459a4f595c8f8af298bc61945cce473f7fcb3d4ac

                                          • F:\N3xvZeLn6XD_d5\Luubp5JQ4Bb\I1TfW5Bbo\CBdjw7Roz\tVSEkXl9MAj\aAHNX9iHIx.exe

                                            Filesize

                                            11.7MB

                                            MD5

                                            fb9b3b98f52f6e9ed6ba8f0f745aba13

                                            SHA1

                                            cbc95a3baf8317db8a2a42a84b4ef5095ca06b04

                                            SHA256

                                            ef6f6101846718ab4281039e8d688163f89331ff2eefe1fe736550f0183df173

                                            SHA512

                                            54447ca5ed32815fb94d8afd97ec1feb8cbd0df3cef17d87a70215e2f359a135f3015f7dc5a02def3f8fdfe3ec9d77d08869ab765b168657afcd4a249829fbd2

                                          • memory/620-174-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-152-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-154-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-147-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/620-156-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-159-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-162-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-165-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-167-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-171-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-146-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-176-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-180-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-133-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-135-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-137-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-140-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/620-143-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-211-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-225-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-210-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-206-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-213-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-217-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-218-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-220-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-222-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-208-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-227-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-229-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-233-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-231-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-235-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-204-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-203-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-201-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-199-0x0000000000400000-0x0000000000B20000-memory.dmp

                                            Filesize

                                            7.1MB

                                          • memory/2120-195-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                            Filesize

                                            4KB