Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    31-10-2020 16:23

General

  • Target

    Badlion Client Web Setup 2.17.0.exe

  • Size

    1.0MB

  • MD5

    edf47633312f964b28dfc3ed91f320c7

  • SHA1

    c9df701aae470466e5b8639328aa0a95c148f2f8

  • SHA256

    10a6d1044186ddaf801d57ab4fdd6991a44b859332fd8e2ae8990f7edd4b3206

  • SHA512

    98e1f0c70fbea5bf684136a976e9e8a8bb9f83c6c9f9625248485772f59f0ef529e5191434ce02fd7448e8c3810dd9450360422b3b1257036da4dc8f05547493

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 21 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • JavaScript code in executable 17 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 331 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Badlion Client Web Setup 2.17.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Badlion Client Web Setup 2.17.0.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\RunMSU.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Windows\SysWOW64\wusa.exe
        wusa "C:\Users\Admin\AppData\Local\Temp\Windows6.1-KB3033929.msu"
        3⤵
        • Drops file in Windows directory
        PID:1836
  • C:\Program Files\Badlion Client\Badlion Client.exe
    "C:\Program Files\Badlion Client\Badlion Client.exe"
    1⤵
    • Executes dropped EXE
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1852

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • C:\Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • C:\Program Files\Badlion Client\chrome_100_percent.pak
    MD5

    8d56d44c318d122f7931d03ba435f00b

    SHA1

    387f530e06f79a2a9f7fbf4446c71c31db08e7e0

    SHA256

    fcb4faaa82d13d90c42dfa0669f67391b3124d30310d0f4c510f31412974cab2

    SHA512

    03bd2f56f73ad06fe22ebd94fb0de4e37d1771f8a9d82a47ea93002ba4696d906b59d0e25db63e98af10a169a8c3dc9d047cfcbca01030924bf93abe7bce1590

  • C:\Program Files\Badlion Client\chrome_200_percent.pak
    MD5

    879f88cafa5714994744bde20e7bd2c2

    SHA1

    d63b55f9f7c0e40f9585cac8a5cb28c0ea9f32ee

    SHA256

    76126341d0dc2b4b6ddccf30559709e6a856cd47148107808bd18ceb16ed1df3

    SHA512

    4d70ae16c2656cf3a8aaad00e2ce0ddcc030bf1ad29bbb1d0e90c03f866c413f893b273b8b03aa12c9ea5ae01537ad1d2d1b2c52b35bf7773278121a09a3af9c

  • C:\Program Files\Badlion Client\ffmpeg.dll
    MD5

    cb752ba8c738ede3d3de71c32a6c0c41

    SHA1

    a7f6614c7632bd06c25d4740aa169e572e8f389c

    SHA256

    da751890905cc57fadeec813bae33fdcb4817ee526ae5f45fd10d1172f971597

    SHA512

    9b0b71578b3023e2a065ca60e5fd69819f77f025fad57a1cd3ebb921e9c8f7445e9a64e46b632fa53b36817e61aa96c06d83c825161aa75629239e23c08512cd

  • C:\Program Files\Badlion Client\icudtl.dat
    MD5

    4c8a9e9c260dc5a6fee2a3c37520f5bf

    SHA1

    5a9883dbeb5314a98e7ab5326f9868e78ba387dc

    SHA256

    8c2df1f6e2ea8df2e5fc5e4b016b0cddd64a7ce6985189ca45be3c0ec99472c2

    SHA512

    c0da0b08a0b0eaa898f96c6e6c6fb65bc7f773f5814fc0d612a40e2fcaea4049c67cd2812716a564dbc16d609677ee62eaa9f9747d2a7bc5c9bce43cd2208aa7

  • C:\Program Files\Badlion Client\locales\en-US.pak
    MD5

    15e8556f737d17bd4d645513ee190990

    SHA1

    a24844d68fe3e9f4c57d14e6091a06f5e6b5f327

    SHA256

    12e4fd083a49e038578ea2993e6c88239083c8d098231527eee861299a4e1c99

    SHA512

    4e5c423b2b14def0e6ebb9c7844bdc050198064c9db69d3a880c1444314211995b1f0dec6fcbb12c6d5e59f690c3ffc893c2265bf7168d1ecbc8d83dfa5e1465

  • C:\Program Files\Badlion Client\native-modules\launcher.node
    MD5

    bdeb8dedacd0887989be988a446028fa

    SHA1

    9497f0fdd63863a74821e2f4082789df748dc065

    SHA256

    74abcf460c0d12f16abda28ad9dc82c29818328efc66062e21b38fc115aa03df

    SHA512

    23980ab0413dd22779b6567d6e01b209216163006afe82be9050839790874bc33ea1470f556f0700de38418f2e3673b3b343b264d0ea4c5261afa50a92f1e966

  • C:\Program Files\Badlion Client\natives_blob.bin
    MD5

    f8ac49858ca8739658ff44c296f8aba6

    SHA1

    427b4da3bd619d85381c36d61daf2ce392e07909

    SHA256

    354ff502a0e1ed73df4e5c7b52970356b04777461f6e169f72a8567ab5f4c317

    SHA512

    52e875aedbdc5dad21e01a42e333ff5aefed9ae6468a00e80f2bb373b871196f9a82bc3f43a6c72c9dd6be0e4fbc591d3ede41ca47b23a806b788db5aa9bf313

  • C:\Program Files\Badlion Client\resources.pak
    MD5

    978e8122033961585e14c65949d15e11

    SHA1

    3097d04bbcdfc6ff9e0bb52c2d38f6395e4bb631

    SHA256

    a435fa0e07a9124b0d457811de5e2245aeb225ad55ab99186cb665c6ec6e30ef

    SHA512

    5f6706116b7eaec70213f7343cac44eea2dc735de6262524b5508a659b150d8a5ad7f449fec984b45a2e5c170e1cb4feb927a19530c94841f3e6429a2fcaa1c0

  • C:\Program Files\Badlion Client\resources\app.asar
    MD5

    57892a47e06d3d1cb46fce7bb084730b

    SHA1

    64281fc658e2d624613ad88ab523eea9efb1a9a9

    SHA256

    c0bae93f4fe1c13eed69de41a8ea98da05db43682ba36fbac473548b23677d76

    SHA512

    2bcaad62e7dbbf89b64ffb8d42d548dbc6d12e92df8a7576b1065f96517e446bfe3c4e55a49f91aca40ecea8ca9fb83710b2688c22a6acd291929a72fc4c02de

  • C:\Program Files\Badlion Client\resources\electron.asar
    MD5

    9217b91b15e400888db98d761f78b310

    SHA1

    5cb9ba01638a9486a20d4c2e802944b2cc076202

    SHA256

    8183cc34c7d74689ed776c9c615eeb323c7c2e5886c280ea6d32a0f06e41627c

    SHA512

    e672bcffe09e5c729707d10ba8ecb25fee4223044de97cc165aed503548ee2a36ee38295dea6544218b08b69076094badd6b0ea9dd6764bfecf34ff6de3b5fff

  • C:\Program Files\Badlion Client\v8_context_snapshot.bin
    MD5

    ca7cd9e8812bf3d3af627e2ce32ac9be

    SHA1

    ae584ef401ec7684128517812e9eebc824098151

    SHA256

    15135d0f1bf67e01601a01dac865ae49d59eae99bc8967da1b8f0d5c7ada7d84

    SHA512

    f15ce97f2fe8d1e2230c7754449313f8c5b9a850a1bf2700adf47e95fd93a27c6d41a3435a1cbaf76b99a4ed2465ff5c8c39138239bda07e97b25e4bf377a310

  • C:\Program Files\Badlion Client\vcruntime140.dll
    MD5

    edf9d5c18111d82cf10ec99f6afa6b47

    SHA1

    d247f5b9d4d3061e3d421e0e623595aa40d9493c

    SHA256

    d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb

    SHA512

    bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d0f504141e8422ebbe11532bcb5f97da

    SHA1

    8f3376b26e80d1dc814db1c9208080ad35d64a96

    SHA256

    798eecdf912da408a9b19d39b25e446e5bb130517e15c04ebd5f747239d64f51

    SHA512

    c65e8412ccf8473b085adfb6b09a253603e910689aaf46dcaecc1f41571cff6396eb670a0fcf4f5febff6e76f540b70f64c3644d728c0d4b0142311e0598f928

  • C:\Users\Admin\AppData\Local\Temp\RunMSU.Bat
    MD5

    1ecda99ed52bae4cb70edc4b1e37fb63

    SHA1

    b298ad66a306e2e393dc3499e2c9ac0740c63f1e

    SHA256

    97c2ac9c0d179a206f3d80bd688a9a2e53acd92b14fc7601cb0f99d85424c4eb

    SHA512

    109fdb17c8cc57c6b5bd917fc42d2988852ee9b64d3aad9a4dffc6178b38d5b6692b03a99506c08f01250d259d1797574988d9cccc4947fbfa674cad556e8a05

  • C:\Users\Admin\AppData\Local\Temp\Windows6.1-KB3033929.msu
    MD5

    87ff18974de76144206910d0d41a8ae5

    SHA1

    5c56222b0caf43030addc9ad262633fcbddfcd41

    SHA256

    5318587007edb6c8b29310ff18da479a162b486b9101a7de735f94a70dbc3b31

    SHA512

    10d9180affd860c26fa4022ab26e8640397f4006bbfd5ac4c50ac0ed9cb72a0e591a71ef071d2087893f3769e83f62f4d45674342653b7d44df421440b15a059

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\Badlion Client.exe
    MD5

    fdbca799d3d61ec981249afd30b2e8a0

    SHA1

    eb0cd62c7b2e6c22b5b0db353be945cae54c5f1d

    SHA256

    d2a616741267b2a93756da11dfb2673d515ebba54b5a92d0c6240d6c63dd9653

    SHA512

    85f1359e5169e4053bf2e5c924f19b4535f198af8c920919639576981c8e54cae1582a6e78f35f4352e96b4ce706434aaf34986cc4b7ad7e1075333ccee8b289

  • \Program Files\Badlion Client\ffmpeg.dll
    MD5

    cb752ba8c738ede3d3de71c32a6c0c41

    SHA1

    a7f6614c7632bd06c25d4740aa169e572e8f389c

    SHA256

    da751890905cc57fadeec813bae33fdcb4817ee526ae5f45fd10d1172f971597

    SHA512

    9b0b71578b3023e2a065ca60e5fd69819f77f025fad57a1cd3ebb921e9c8f7445e9a64e46b632fa53b36817e61aa96c06d83c825161aa75629239e23c08512cd

  • \Program Files\Badlion Client\native-modules\launcher.node
    MD5

    bdeb8dedacd0887989be988a446028fa

    SHA1

    9497f0fdd63863a74821e2f4082789df748dc065

    SHA256

    74abcf460c0d12f16abda28ad9dc82c29818328efc66062e21b38fc115aa03df

    SHA512

    23980ab0413dd22779b6567d6e01b209216163006afe82be9050839790874bc33ea1470f556f0700de38418f2e3673b3b343b264d0ea4c5261afa50a92f1e966

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\INetC.dll
    MD5

    38caa11a462b16538e0a3daeb2fc0eaf

    SHA1

    c22a190b83f4b6dc0d6a44b98eac1a89a78de55c

    SHA256

    ed04a4823f221e9197b8f3c3da1d6859ff5b176185bde2f1c923a442516c810a

    SHA512

    777135e05e908ac26bfce0a9c425b57f7132c1cdb0969bbb6ef625748c868860602bacc633c61cab36d0375b94b6bcfbd8bd8c7fa781495ef7332e362f8d44d1

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\NSISdl.dll
    MD5

    49e7c5d0cee4e570efe79923c83ee10d

    SHA1

    75491a8a2bd849f62529b4227736c274dc5f5d3f

    SHA256

    08fde15b4be408a1fae1fb3de9cd13121dc0a416cf13ac6543c57a61216bdc59

    SHA512

    c861b68d3dbca4b68abb0224d039a2f5d149ed61a44bebb54c5ad304627469a074c9c28e57808bd16fd7eb984a788825e8cfb499ff8e96fa2b9f345abb579ab6

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\StdUtils.dll
    MD5

    c6a6e03f77c313b267498515488c5740

    SHA1

    3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    SHA256

    b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    SHA512

    9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\System.dll
    MD5

    75ed96254fbf894e42058062b4b4f0d1

    SHA1

    996503f1383b49021eb3427bc28d13b5bbd11977

    SHA256

    a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7

    SHA512

    58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\UAC.dll
    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\WinShell.dll
    MD5

    1cc7c37b7e0c8cd8bf04b6cc283e1e56

    SHA1

    0b9519763be6625bd5abce175dcc59c96d100d4c

    SHA256

    9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    SHA512

    7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\WinShell.dll
    MD5

    1cc7c37b7e0c8cd8bf04b6cc283e1e56

    SHA1

    0b9519763be6625bd5abce175dcc59c96d100d4c

    SHA256

    9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    SHA512

    7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\nsDialogs.dll
    MD5

    ca95c9da8cef7062813b989ab9486201

    SHA1

    c555af25df3de51aa18d487d47408d5245dba2d1

    SHA256

    feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be

    SHA512

    a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\nsProcess.dll
    MD5

    f0438a894f3a7e01a4aae8d1b5dd0289

    SHA1

    b058e3fcfb7b550041da16bf10d8837024c38bf6

    SHA256

    30c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11

    SHA512

    f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7

  • \Users\Admin\AppData\Local\Temp\nsx3322.tmp\nsis7z.dll
    MD5

    80e44ce4895304c6a3a831310fbf8cd0

    SHA1

    36bd49ae21c460be5753a904b4501f1abca53508

    SHA256

    b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

    SHA512

    c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

  • memory/616-18-0x0000000000000000-mapping.dmp
  • memory/1836-21-0x0000000000000000-mapping.dmp
  • memory/1836-20-0x0000000000000000-mapping.dmp
  • memory/1852-35-0x000001879DB00000-0x000001879DB01000-memory.dmp
    Filesize

    4KB

  • memory/1932-5-0x000007FEF5D50000-0x000007FEF5FCA000-memory.dmp
    Filesize

    2.5MB