Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:22

General

  • Target

    21888225e7ad34f11b2429351738a7eb.exe

  • Size

    269KB

  • MD5

    21888225e7ad34f11b2429351738a7eb

  • SHA1

    0fdc60e4033daf3d5c8b459c3c23e2c27b9c6137

  • SHA256

    27a4bb4a2707a359b525e88c707e09d86c351b8813b4310c4f981883fa7fad7f

  • SHA512

    13fa41bef9a0d653b64a03e34776f71315fbea57dfd0857cc53831636156db3054c35bd0b048b3a68eb4ca13241dfd73ed91b0f0a99a2a88dd1aa2b615b345e8

  • SSDEEP

    3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuJxmK:ZY7xh6SZI4z7FSVpuJxmK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in System32 directory 35 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21888225e7ad34f11b2429351738a7eb.exe
    "C:\Users\Admin\AppData\Local\Temp\21888225e7ad34f11b2429351738a7eb.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\wbbc.exe
      "C:\Windows\system32\wbbc.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\wvwuyopus.exe
        "C:\Windows\system32\wvwuyopus.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:572
        • C:\Windows\SysWOW64\wqjoal.exe
          "C:\Windows\system32\wqjoal.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\SysWOW64\wpoohtjbj.exe
            "C:\Windows\system32\wpoohtjbj.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Windows\SysWOW64\waaf.exe
              "C:\Windows\system32\waaf.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious use of WriteProcessMemory
              PID:1464
              • C:\Windows\SysWOW64\wdfeq.exe
                "C:\Windows\system32\wdfeq.exe"
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of WriteProcessMemory
                PID:524
                • C:\Windows\SysWOW64\wkehq.exe
                  "C:\Windows\system32\wkehq.exe"
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Suspicious use of WriteProcessMemory
                  PID:2608
                  • C:\Windows\SysWOW64\wgeyg.exe
                    "C:\Windows\system32\wgeyg.exe"
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    PID:1020
                    • C:\Windows\SysWOW64\wssdfm.exe
                      "C:\Windows\system32\wssdfm.exe"
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      PID:2956
                      • C:\Windows\SysWOW64\waommqhp.exe
                        "C:\Windows\system32\waommqhp.exe"
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        PID:652
                        • C:\Windows\SysWOW64\whumeogv.exe
                          "C:\Windows\system32\whumeogv.exe"
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          PID:2420
                          • C:\Windows\SysWOW64\wenjrsod.exe
                            "C:\Windows\system32\wenjrsod.exe"
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            PID:2980
                            • C:\Windows\SysWOW64\wsqww.exe
                              "C:\Windows\system32\wsqww.exe"
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              PID:2236
                              • C:\Windows\SysWOW64\woorro.exe
                                "C:\Windows\system32\woorro.exe"
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                PID:2872
                                • C:\Windows\SysWOW64\wtqsj.exe
                                  "C:\Windows\system32\wtqsj.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Drops file in System32 directory
                                  PID:2576
                                  • C:\Windows\SysWOW64\wvirll.exe
                                    "C:\Windows\system32\wvirll.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    PID:2172
                                    • C:\Windows\SysWOW64\wrqknf.exe
                                      "C:\Windows\system32\wrqknf.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      PID:2508
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvirll.exe"
                                      18⤵
                                        PID:240
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wtqsj.exe"
                                      17⤵
                                        PID:2556
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\woorro.exe"
                                      16⤵
                                        PID:2852
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wsqww.exe"
                                      15⤵
                                        PID:2164
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wenjrsod.exe"
                                      14⤵
                                        PID:2788
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\whumeogv.exe"
                                      13⤵
                                        PID:1904
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\waommqhp.exe"
                                      12⤵
                                        PID:1912
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wssdfm.exe"
                                      11⤵
                                        PID:2752
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wgeyg.exe"
                                      10⤵
                                        PID:1460
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wkehq.exe"
                                      9⤵
                                        PID:2740
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wdfeq.exe"
                                      8⤵
                                        PID:2680
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\waaf.exe"
                                      7⤵
                                        PID:2504
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wpoohtjbj.exe"
                                      6⤵
                                        PID:1828
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wqjoal.exe"
                                      5⤵
                                        PID:2444
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wvwuyopus.exe"
                                      4⤵
                                        PID:2172
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wbbc.exe"
                                      3⤵
                                        PID:560
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\21888225e7ad34f11b2429351738a7eb.exe"
                                      2⤵
                                      • Deletes itself
                                      PID:2524

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\Y5GSYJC3.txt

                                    Filesize

                                    99B

                                    MD5

                                    ae3d0bf4be885d104d1319b20d9c6c26

                                    SHA1

                                    72f727a4f0098e39f7f88d3e934def183fd2b9b4

                                    SHA256

                                    d41e68981e0e699e6459d4cd3e7a449e6b62f5dc1536167a941dbbae87339278

                                    SHA512

                                    d428129e3ebf07d3fc1a8e8678e365800c98b3c141b2f378950a12142d06abbe226e9233641c83758e3c812d13595210cbdc766faf9c9e9701027bba60578ecd

                                  • \Windows\SysWOW64\waaf.exe

                                    Filesize

                                    269KB

                                    MD5

                                    ecbc12a6a44a79f7189a0894faf0d362

                                    SHA1

                                    b5d7594900fddd2f26a822f7942f430ea64d19db

                                    SHA256

                                    bde2552b8ba9ac408545223348129a37b349a1117422ef36524ccc4efa895291

                                    SHA512

                                    5cf56f2498e1573f0408cdb73b8eec550adea01cf7080a100f47d62014fbcfc45646c3f50d18ef162c77f6abfaa2046875c1364c2694ab2749aebce40ad9c85e

                                  • \Windows\SysWOW64\waommqhp.exe

                                    Filesize

                                    269KB

                                    MD5

                                    c11be0ca0bed85f462eb635061cc9475

                                    SHA1

                                    84f0572592e8f5375815ebbf05db24fd0ac5f436

                                    SHA256

                                    9c0a56e68ab28982c14ea45d21aca64efe7262850e8af37626cad5fa92057b8f

                                    SHA512

                                    f96e082f1cd0a7f29268b6a2167b106060296ea63027bf384bfd50b3c365ea8396e520dd85c73ed697a82e4590dfe6c8eb3eab978bfe3d56fdd5e1fafc1df8f4

                                  • \Windows\SysWOW64\wbbc.exe

                                    Filesize

                                    269KB

                                    MD5

                                    03cedd41df7a25bc6f70603fc6599dbd

                                    SHA1

                                    dc57373f2ec9866797d586b55183284e43006c11

                                    SHA256

                                    b22fe7c1793daa6d23242fbe8f90716b4edc7c7423fc9dabb8408a313c037b6b

                                    SHA512

                                    1d2d7acba411bf96e8decc2a847c92d9e0dbb8d850ccbc8b430300ad7b7020a2b8b378ca689fbdec8e203c9ccc12eb830f9c05785ad3caebd4cb2ecee0f0d3e3

                                  • \Windows\SysWOW64\wdfeq.exe

                                    Filesize

                                    269KB

                                    MD5

                                    2580afb55ab4d0f6f2a0454ec730322a

                                    SHA1

                                    a69f5db7c69974f525f78c1f064ea0ff26cfa906

                                    SHA256

                                    0a6439d3b9584d849f16181f6f1df168ee6b38bae1fbafbabf8b6964143080c5

                                    SHA512

                                    fe49400db22961c014a9a4621adb7118d2e337ce0282e329fab686956088262ce0503f1c64b042f534880f2d74ecabe68dd42079095b05b21f430c780f979095

                                  • \Windows\SysWOW64\wgeyg.exe

                                    Filesize

                                    269KB

                                    MD5

                                    a9255f2aba207a1fec9eaed7aad60c2d

                                    SHA1

                                    12f88be91c4fd9e06293cc411057dc7ec7b7882a

                                    SHA256

                                    9012d58dfd64a83da5322e3fae6c2e4afaad9066b6dc0008dd92d4eba29daa10

                                    SHA512

                                    86146710d71ac2ec00693847efb3392e95b31319f3dc20857c3ff3dadd383cfef163701a1eb297e2e109b9e41c60460d885a88c15d56c7138f9e69e7c7e5008e

                                  • \Windows\SysWOW64\whumeogv.exe

                                    Filesize

                                    269KB

                                    MD5

                                    8543b3ebfeed222993ac03b77652f362

                                    SHA1

                                    021420bbefea0f79f3a212408b37e6628e906b9a

                                    SHA256

                                    7003608eb8448e809027775b63bdcf6390be844353c8b2136fdb48b47abd6542

                                    SHA512

                                    8e91231c518443f7c1d5eb71522f07e8c261221c435e4079a79cd54aa84874b8a1dc8a3e721bae699f06ef2ab7f649155984f558aa59ce7c6f886198b160bb85

                                  • \Windows\SysWOW64\wkehq.exe

                                    Filesize

                                    269KB

                                    MD5

                                    43f3f34cac68d9b69e08ac580f0d607d

                                    SHA1

                                    12f4e6ac21872cd44af6a1bc83c4c6f98e701355

                                    SHA256

                                    6d18424572def6ef919b2ba3f2b8b694c5811b7a0eff9a8b4fa3fa70ad617fab

                                    SHA512

                                    7d869c024bf38d51e45585fa2e02175bdbdc3f29972c8bf071b9b4aecefdce29c000f5e33c11412dbad8af5b8e127a4adb746a4524110f5956ba712b65ebde27

                                  • \Windows\SysWOW64\wpoohtjbj.exe

                                    Filesize

                                    269KB

                                    MD5

                                    55dee9d99fadc2f63b02fbd0b452ca24

                                    SHA1

                                    01ead6059fa9100b2e3a3d17b71b38c74efd07cb

                                    SHA256

                                    943018fc0e4c482fef8c9af227e5d2ee8ab9b9d70b0c0c3012dd277429cf94fc

                                    SHA512

                                    d3f588972c49138f32bcc1d1ae8019a964454084160709b4c3160fcadf9354bda4b1819517c82f90a4f54cbd15a28733c02fd0c12d983c0bf115522649abb16d

                                  • \Windows\SysWOW64\wqjoal.exe

                                    Filesize

                                    269KB

                                    MD5

                                    45b25806f382b85fd450ebf65c2b0b9e

                                    SHA1

                                    50a6e6e023b089530c6d4cfabadcf4543644d6b3

                                    SHA256

                                    7d1fa8ba7eb94fa348fe2c86f20204ef5754da0cfc08c4a95d45b7472e7248f9

                                    SHA512

                                    316d3e45982907035b6e5713540ec05d0530f0e2e26075c6b1d93985ec695c8b1e48eb59c224781d79e14325c122d9387876391854f1ddc3ba151e5f63c81799

                                  • \Windows\SysWOW64\wssdfm.exe

                                    Filesize

                                    269KB

                                    MD5

                                    c741c32c46a1a2962fdced6a5757b00c

                                    SHA1

                                    d4cb2bc095654df810adc91c91e81a44b76dde89

                                    SHA256

                                    7bb2a06514bd74ae651289b5f089bbde7a8d2e81a1db73c5df5d318d80fc2e7f

                                    SHA512

                                    865e8848f0c2152e8226d8a87fd679f55e84bf7c22ae54f20ad1d5cfcf81e6ee8c9fea7c20d4318815d9e6067246f47b14f0513398bbdb387849f6449bf17db4

                                  • \Windows\SysWOW64\wvwuyopus.exe

                                    Filesize

                                    269KB

                                    MD5

                                    ff7f3a5b03e96839571cc397669a0d17

                                    SHA1

                                    42b209186bf8f6ea6e8854296d237c693697b948

                                    SHA256

                                    46d3e8ccdc55ea7470787877d8b65b5e38c1a782b1172fb80bddefa1b66d2ec0

                                    SHA512

                                    bd74051caaab816bc4d6e5ad6381f9aab1421bef903d81be74d9f2d5aef38a0a406c943e9d28dcaefb76104828325d29fcf15dbdc70f2dd619de0ee7da847bfd

                                  • memory/524-146-0x0000000003180000-0x0000000003197000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/524-149-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/524-147-0x0000000003170000-0x0000000003187000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/524-145-0x0000000003180000-0x0000000003197000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/572-42-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/572-62-0x0000000003C30000-0x0000000003C47000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/572-63-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/572-58-0x0000000003C30000-0x0000000003C47000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-232-0x0000000003380000-0x0000000003397000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-230-0x0000000003380000-0x0000000003397000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-251-0x0000000003380000-0x0000000003397000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-233-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-231-0x0000000003380000-0x0000000003397000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/652-214-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1020-193-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1020-190-0x0000000003C70000-0x0000000003C87000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1020-189-0x0000000003C70000-0x0000000003C87000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1020-171-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1112-17-0x00000000038B0000-0x00000000038C7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1112-22-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1112-0-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1112-18-0x00000000038B0000-0x00000000038C7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1440-80-0x00000000037E0000-0x00000000037F7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1440-87-0x00000000037E0000-0x00000000037F7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1440-84-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1440-81-0x00000000037E0000-0x00000000037F7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1440-83-0x00000000037E0000-0x00000000037F7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1464-126-0x0000000003BC0000-0x0000000003BD7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1464-128-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1464-125-0x0000000003BC0000-0x0000000003BD7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/1464-119-0x0000000003BB0000-0x0000000003BC7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2120-85-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2120-104-0x0000000002F60000-0x0000000002F77000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2120-93-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2120-107-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2120-106-0x0000000003B10000-0x0000000003B27000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-281-0x00000000021D0000-0x00000000021E7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-280-0x00000000021D0000-0x00000000021E7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-282-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-266-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-278-0x00000000021D0000-0x00000000021E7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2236-279-0x00000000021D0000-0x00000000021E7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2420-250-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2420-249-0x0000000003AF0000-0x0000000003B07000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2420-234-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2420-243-0x0000000003AF0000-0x0000000003B07000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2420-247-0x0000000003AF0000-0x0000000003B07000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2608-150-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2608-167-0x0000000003C30000-0x0000000003C47000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2608-170-0x0000000003C30000-0x0000000003C47000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2608-168-0x0000000003C30000-0x0000000003C47000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2608-172-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2860-44-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2860-20-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2860-40-0x00000000031A0000-0x00000000031B7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2860-34-0x00000000031A0000-0x00000000031B7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2956-210-0x00000000035B0000-0x00000000035C7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2956-192-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2956-213-0x00000000035B0000-0x00000000035C7000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2956-212-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2980-248-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2980-263-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2980-265-0x0000000000400000-0x0000000000417000-memory.dmp

                                    Filesize

                                    92KB

                                  • memory/2980-264-0x0000000003AF0000-0x0000000003B07000-memory.dmp

                                    Filesize

                                    92KB