Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-09-2024 17:50

General

  • Target

    f4656a9af30e98ed2103194f798fa00fd1686618e3e62fba6b15c9959135b7be.ps1

  • Size

    5.1MB

  • MD5

    b1f0093b89561c6123070165bd2261e2

  • SHA1

    aac57162dc1311f07a869f7163bd30e0d62dcc0e

  • SHA256

    f4656a9af30e98ed2103194f798fa00fd1686618e3e62fba6b15c9959135b7be

  • SHA512

    637b40a33fc8e5d478128242f621ceefcb158b1d411898fbf4bb2e7352fd214befd58c308297108d631d5b4e4b44f953ac51676b02ef20e8de9dc122ef0ba797

  • SSDEEP

    24576:3lWHR7hoxn6yTYo1oc8UcMIh/MuwL+zn4ltC3O+wXCwNLaLRcfIAM1Bq9p0IQWwS:l

Malware Config

Extracted

Path

C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\A0CD44-Readme.txt

Family

netwalker

Ransom Note
Hi! Your files are encrypted by Netwalker. All encrypted files for this computer has extension: .a0cd44 -- If for some reason you read this text before the encryption ended, this can be understood by the fact that the computer slows down, and your heart rate has increased due to the ability to turn it off, then we recommend that you move away from the computer and accept that you have been compromised. Rebooting/shutdown will cause you to lose files without the possibility of recovery. -- Our encryption algorithms are very strong and your files are very well protected, the only way to get your files back is to cooperate with us and get the decrypter program. Do not try to recover your files without a decrypter program, you may damage them and then they will be impossible to recover. For us this is just business and to prove to you our seriousness, we will decrypt you one file for free. Just open our website, upload the encrypted file and get the decrypted file for free. -- Steps to get access on our website: 1.Download and install tor-browser: https://torproject.org/ 2.Open our website: pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion If the website is not available, open another one: rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion 3.Put your personal code in the input form: {code_a0cd44: P7v9XMsx/iNlSEUNnse4CQdHLusAOcAcVqXSOupbx+P0Z/44aC gSpJjhplg49BTJVtIlQEnFbMQ4crvVMzSoQLX79ppur2x7L0Sb SP/YtmfJSHNVjswP0wxxjPrHj9qmsg5kfGFULKEp77gBNQTEnu 63qQH8d64yBnIYJxRSVYI11afSS5I1soegsM9OluntokC6bZop jqdwyvoOt/qOGLB+DnIVPnifQsRglN9ASNlxxaIlQ920a4xN32 QO5dVSYWkC4NnAsSaCpgDyiRXs7m8GI01wmtXSPQ==}
URLs

http://pb36hu4spl6cyjdfhing7h3pw6dhpk32ifemawkujj4gp33ejzdq3did.onion

http://rnfdsgm6wb6j6su5txkekw4u4y47kp2eatvu7d6xhyn5cs4lt4pdrqqd.onion

Signatures

  • Netwalker Ransomware

    Ransomware family with multiple versions. Also known as MailTo.

  • Renames multiple (7389) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\f4656a9af30e98ed2103194f798fa00fd1686618e3e62fba6b15c9959135b7be.ps1
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zkf1lgul.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2968
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DDC.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3DCB.tmp"
          4⤵
            PID:2900
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9hk-memy.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES40B9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC40B8.tmp"
            4⤵
              PID:2700
        • C:\Windows\system32\notepad.exe
          C:\Windows\system32\notepad.exe "C:\Users\Admin\Desktop\A0CD44-Readme.txt"
          2⤵
            PID:2948
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2276

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\A0CD44-Readme.txt

          Filesize

          1KB

          MD5

          6b7ed793b96c75e44b9b0a4df95584d8

          SHA1

          2c4d944366d8608636f3f2ed9aec9d5687b61210

          SHA256

          00beb2b09aee67df095957d9c22ca8680dde22cfc372314b9d57cf4d607585dd

          SHA512

          63f05d649a857cd3adaf9e057974e2aed9e4e56cef682675d4bf40a245cd273fb0a377f1c57b5304985581fd85dda7042228cdf91f503583eb5ed2fd94f8d29b

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 04.wma.a0cd44

          Filesize

          232KB

          MD5

          11f76652851c919eee466a4b11e18d9c

          SHA1

          aab9eb49fbe7c00734404bfe2a4e314c6f4363cc

          SHA256

          c770dfd572f2ee10a89b19ee9b7de8969d4324c26d4eb3814f8ce9c40e74577b

          SHA512

          4d001d7a236543f9530ae7f845c3a45eb70fc839cb4efa72ac32e080c5714ce40362fb2f0630f28c6416278abdf720b212fb756f39c264e5cde82f5a874524bd

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 05.wma.a0cd44

          Filesize

          110KB

          MD5

          86c8d9452e62034194134646acb9b229

          SHA1

          d3bc2faf496442893f38e0c153ae7371ea936b15

          SHA256

          5902e5c136cb0121f4625c0edb52d97c13da112773a79193db0991709e6c4260

          SHA512

          a8fbd9118011c1f246e26b13a45ebc854991142845924682cdcb915f1c4bbc3c55f2e4615bd2c6914be3e359e01772040b38cf95ec5b6e941b271970c406ef3a

        • C:\ProgramData\Microsoft\Windows\Ringtones\Ringtone 06.wma.a0cd44

          Filesize

          92KB

          MD5

          6fc3f3fccb5b06b9bbc18a806c6084d3

          SHA1

          e0dadcff154e55b1d2d8738dd3cbec9eb4760a9a

          SHA256

          01ce033910f6553f7b2ec7c73f3c6a396cf4f58fb5880a3452d360196e382c09

          SHA512

          e309d3afbf6e869bfe2feb330c8ca423b68d26e1b4fcaa570ef3d9dfb8c02b645fa764ce39edc7aae6d207b0f0959fa3fd9393164ebf2e15efccfe32cfc2a9c9

        • C:\Users\Admin\AppData\Local\Temp\9hk-memy.dll

          Filesize

          4KB

          MD5

          72c380db6121cd92462af4abf78232b4

          SHA1

          a168303fb3fc05db160dd7dc148ade708ebce660

          SHA256

          d7e07f5096aceeca4e3ccd5b1ea3dff0b87da67573586eb9d48bb0a6fdec0a0b

          SHA512

          98de2377da2e9748a31251c4fb65a54f0943d4801d8bebaffa08a56c3441cfe596b7a537fa813699f7e8d5b59d400cb416e6601f7b579549b8cd1159854f687f

        • C:\Users\Admin\AppData\Local\Temp\9hk-memy.pdb

          Filesize

          7KB

          MD5

          b97a4d700d85fd5e72a8e3f1d8016ef3

          SHA1

          97ce772da2866560e5d987639b4328a399689a75

          SHA256

          83a4e2d0b0bd7dbfc30c43b7259280bba30639868d19686a8916e2519ed3c132

          SHA512

          05e74d6406aba2d71df17000c1c087246c2f39e68ac6bffeca6db29b8ab546b60e4574a2c63765a8d9437ccd77f7cc3484d310e4877e9535e250e5684ed3a1b5

        • C:\Users\Admin\AppData\Local\Temp\RES3DDC.tmp

          Filesize

          1KB

          MD5

          d7d6a4e35b7f47fe81496135a23f6729

          SHA1

          10ed72aaaf40b134a660bacdb71dbb45b08eff7f

          SHA256

          48acd202810f3f53baa575e340d035bae534435bff4552cafea864fb33ece1c5

          SHA512

          8dc5e94a8b0f03b006c42c7bc6d8f6dd76927586673e11508aa66f0ceebb4f3d36ddd915e7224729a766ed21430219a9df5229c86544217116f7fefd79c4930f

        • C:\Users\Admin\AppData\Local\Temp\RES40B9.tmp

          Filesize

          1KB

          MD5

          2f65b0e97a1dbf4f1799aeb64d6465ce

          SHA1

          3b03e12d8550f22e2e1968a1e48fade9a82c3caa

          SHA256

          f41eecffd4d9f6992ae2c99be0f094262c654fe8cfaef98580dde58eae1256e9

          SHA512

          e9d9c338c2eb47a664e8367fcd74e4ef1c9d066a4d6a232d0f66562cb9dd4da9304bd737c2c94f9c5895e705e0cf0f6645072e295ead2ab0a3aa769f6883dfa7

        • C:\Users\Admin\AppData\Local\Temp\zkf1lgul.dll

          Filesize

          6KB

          MD5

          72122dbcf92254e677825c53a7e4de42

          SHA1

          f36b730e3e6eabc9c47990b2fb53e7698ffab6a5

          SHA256

          f0fee5af31e0a3d422f4c3a039284680db1469e42b90668881a049af6c0e462b

          SHA512

          ea2b43e9d8e8d25c770d482e009fd72d19fcce0766d044d63384c4b890b2b57567554c52cbfcc8ce08838b40b92ff8e9c6bd611fec1b02f300b043006888709d

        • C:\Users\Admin\AppData\Local\Temp\zkf1lgul.pdb

          Filesize

          7KB

          MD5

          41dd31ee83cdba20a69fe9d45a71c048

          SHA1

          651759137793b39d1f2c39436ff44bf9a485b3f6

          SHA256

          36664efb0c035a587b3fd373b81338c3619101026caa27173cd0205a015d8f9b

          SHA512

          35b0de9d6d19db9c24d70197e464d09210352f401d67bb61ceb75a4a053aab83d48d79119aaf783cc860869986a7354e4cc829cde4e6b3e80260c6954a8666c0

        • \??\c:\Users\Admin\AppData\Local\Temp\9hk-memy.0.cs

          Filesize

          2KB

          MD5

          b1f397a0d765a49ba2554b815326cfd7

          SHA1

          511ef931b96f19ee08dec8763b606701147244a1

          SHA256

          d39f9608c7e9805f327550e7cd98ed2b716dc2a4549ca4123215fe5331a9b36d

          SHA512

          f34a8edb867d39f0dc53de1708a65570d1fd2d0a57e5908f3a222f0edb77d65f719a491b93e697a0233cf9a443c2387cb34549264befc100bc6a2d436cd0b254

        • \??\c:\Users\Admin\AppData\Local\Temp\9hk-memy.cmdline

          Filesize

          309B

          MD5

          35fbc2894195ede92825361365b457ba

          SHA1

          688c4ba77c94f773ad2edc6cf3670cb438a18d19

          SHA256

          d3cd16882be5d59a0833767493c2789652bd9e2e31470eb560fc29d17ef10388

          SHA512

          430c243b2433a0fe5a0b0eecf4894d718c11bc89c4b4f2327d82c58f00502e3704264bf2b0312e18f35d18e1373dab81538528d0da7fc2d0db12e5a8216aaa7c

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC3DCB.tmp

          Filesize

          652B

          MD5

          5456ed1cf47aa429ff2b02a409adbfd6

          SHA1

          5a644bd869e8eff13f1755d1f152e670cd31118f

          SHA256

          04c715ca6292c37703a87005ce92cee0bc0ec1e8308756d6eadfedd7b7affabd

          SHA512

          5da2f7033ef776c3d180cdd34405e5b655d408edd66321ef869aefac7ae19579e3e475ad2846e0dc286df2e3d3abf759a952d17fe42820cbb824a1c4a6451fe5

        • \??\c:\Users\Admin\AppData\Local\Temp\CSC40B8.tmp

          Filesize

          652B

          MD5

          ad97a691ada838125713cf475c819d7b

          SHA1

          82e61d5fab404b337a484f0edfb925ad664f95eb

          SHA256

          81c43ed3640c334bed035e1d49ce0d32461113a5052435680c296bdb4e3f43d5

          SHA512

          884806a02c0540283ef7239a1da0aac25e6c52d9bbab34526862c6597ccf7ed38a97cabd38500c5a627098d6938f5f440b7ec6ce80608867b3b777de566117e0

        • \??\c:\Users\Admin\AppData\Local\Temp\zkf1lgul.0.cs

          Filesize

          10KB

          MD5

          220274c8b5ea2af3a7c625d0c4985fc2

          SHA1

          2f5228308d3808946552e53ef5b9829b8764b741

          SHA256

          b00f4040bfc94627cc06e351d43d4b6fdaa1161b20b702956b564e18c3a37ee1

          SHA512

          da40fd6d5a9daeb3c42cfa3d92df0fcb71b1b9ab00577afe165c539e95f26cba80958b74140067b93deb66807de60f0d533e232ec49d0a28b798f6d339037c69

        • \??\c:\Users\Admin\AppData\Local\Temp\zkf1lgul.cmdline

          Filesize

          309B

          MD5

          37dc64e53a4698926334b1cb822764fe

          SHA1

          54bbd359b623bd025144c7f3827ff16d395a1ffa

          SHA256

          6d32370a30535c5b849078f8f4ead85cc2b3eeee51f8700586e913fad745cde9

          SHA512

          cc4950471efe5b62a3d0695d62c9031e5f6b8ca748ad520a15971f2b9a849f3953a38aa096c07c6b0f59aebb4f7c0174e01e6818c351b41afd91bcc2e9685f50

        • memory/1252-100-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-92-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-67-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-68-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-69-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-70-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-71-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-72-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-73-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-74-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-75-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-76-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-77-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-78-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-79-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-80-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-81-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-82-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-83-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-84-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-61-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-65-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-64-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-66-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-63-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-62-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-102-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-104-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-103-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-101-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-86-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-99-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-98-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-97-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-96-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-105-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-95-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-94-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-93-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-87-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-91-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-109-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-108-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-106-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-90-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-89-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-88-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-107-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-115-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-114-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-113-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-112-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/1252-111-0x00000000025C0000-0x00000000025DB000-memory.dmp

          Filesize

          108KB

        • memory/2248-49-0x0000000002940000-0x0000000002948000-memory.dmp

          Filesize

          32KB

        • memory/2248-55-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-5-0x000000001B340000-0x000000001B622000-memory.dmp

          Filesize

          2.9MB

        • memory/2248-56-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-13-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-54-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-53-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-14-0x000007FEF621E000-0x000007FEF621F000-memory.dmp

          Filesize

          4KB

        • memory/2248-9-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-10-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-11-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-12-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-57-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-4-0x000007FEF621E000-0x000007FEF621F000-memory.dmp

          Filesize

          4KB

        • memory/2248-52-0x0000000180000000-0x000000018001B000-memory.dmp

          Filesize

          108KB

        • memory/2248-33-0x0000000002930000-0x0000000002938000-memory.dmp

          Filesize

          32KB

        • memory/2248-15-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-6-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

          Filesize

          32KB

        • memory/2248-16-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-17-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-8-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-7838-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2248-7-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2968-31-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB

        • memory/2968-23-0x000007FEF5F60000-0x000007FEF68FD000-memory.dmp

          Filesize

          9.6MB