Analysis

  • max time kernel
    152s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:49

General

  • Target

    83e6d07827f322e1c43b492ac5b49fed7571c458c14d19e5de47cc1b620603cd.exe

  • Size

    556KB

  • MD5

    2572828259a9fd28af15c2828c7601bd

  • SHA1

    c59998d6011230a85203e32952ef49d783684819

  • SHA256

    83e6d07827f322e1c43b492ac5b49fed7571c458c14d19e5de47cc1b620603cd

  • SHA512

    b91c79270d16f1aaeeff20a9c5c121109ad7f2ac31f98bc42f2412300aadc62e2fde6b7b3eab774cdf3aa89824af6ef3054b24a7baa67ef7b86de932907e7c74

  • SSDEEP

    12288:YKRSbgYaUBITegyFDjtkSHwnXDeW5Vr3e3e4msyyDTUu7MYm:YK4mLryFDjKcwnN593e3FhUu7MYm

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

BRH4X

C2

anonymous07.no-ip.org:82

anonymous07.no-ip.org:83

anonymous07.no-ip.org:2000

anonymous07.no-ip.org:666

anonymous07.no-ip.org:6001

anonymous07.no-ip.org:6321

anonymous07.no-ip.org:5896

anonymous07.no-ip.org:5000

Mutex

***MUTEX***

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    explorer.exe

  • install_dir

    install

  • install_file

    Windows Defender.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    NetFramework old version instaled computer

  • message_box_title

    Error

  • password

    123

  • regkey_hkcu

    HKCU

  • regkey_hklm

    HKLM

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 15 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e6d07827f322e1c43b492ac5b49fed7571c458c14d19e5de47cc1b620603cd.exe
    "C:\Users\Admin\AppData\Local\Temp\83e6d07827f322e1c43b492ac5b49fed7571c458c14d19e5de47cc1b620603cd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\1.EXE
      "C:\Users\Admin\AppData\Local\Temp\1.EXE"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Users\Admin\AppData\Local\Temp\server.exe
        "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Modifies Installed Components in the registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          4⤵
          • Modifies Installed Components in the registry
          • Loads dropped DLL
          PID:1756
          • C:\Windows\SysWOW64\install\Windows Defender.exe
            "C:\Windows\system32\install\Windows Defender.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:924
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          4⤵
            PID:1216
          • C:\Users\Admin\AppData\Local\Temp\server.exe
            "C:\Users\Admin\AppData\Local\Temp\server.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:832
            • C:\Windows\SysWOW64\install\Windows Defender.exe
              "C:\Windows\system32\install\Windows Defender.exe"
              5⤵
              • Executes dropped EXE
              PID:1076
      • C:\Users\Admin\AppData\Local\Temp\2.EXE
        "C:\Users\Admin\AppData\Local\Temp\2.EXE"
        2⤵
        • Executes dropped EXE
        PID:1252
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1256

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1.EXE

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • C:\Users\Admin\AppData\Local\Temp\1.Exe

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • C:\Users\Admin\AppData\Local\Temp\2.EXE

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • C:\Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

        Filesize

        230KB

        MD5

        1b4c0126bffc5530fd1ec04f17c60ba5

        SHA1

        7ba96b85537c8ea9a56153fc35ffcc1569dd676f

        SHA256

        9c6a1df0d6ee21b0ee3b1ba686f03ea2d82e28deedb2fac397d6d59d17b4bbf9

        SHA512

        24bfc55af6f8141f91c7b50a07179379673c16ba55a1716b46b2649cb9de57210f08e91df06cd61cbfeb8446052d447da1e0700da27ac8a6383d7202de6a29dd

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • C:\Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • C:\Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • C:\Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • C:\Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Users\Admin\AppData\Local\Temp\1.Exe

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • \Users\Admin\AppData\Local\Temp\1.Exe

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • \Users\Admin\AppData\Local\Temp\1.Exe

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • \Users\Admin\AppData\Local\Temp\1.Exe

        Filesize

        397KB

        MD5

        95b34decd3577fe917603240d4ef856d

        SHA1

        cb5ecae424221b0beb230d0359e5535596c55758

        SHA256

        e35d7059086fd309629c57f3930b5b33e4bcdf7aeef003cb1018d32d1e0ed010

        SHA512

        a7f59946995399158621b400bfc9177dc2c16bcd13d83e5696ad3410d969d3b21f0f7c60072269dda7a644e91cd973e9389b26f2f434d7cc395b287942bb5440

      • \Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • \Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • \Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • \Users\Admin\AppData\Local\Temp\2.exe

        Filesize

        24KB

        MD5

        90e5a664568c77fc3f31aa7e70f05cb4

        SHA1

        1c26b7d69bbf7d9d258938ff95d3d22040873f0f

        SHA256

        50d387eb338e0c0cfd0c3d833918736fff7ca06a4b603237fc8656cbb5464a76

        SHA512

        a774b5a65c54306a3c17fa58f7c12a962eac96e52debc01b23697d72a7d3ecd17754a33b5391d85fa4d6b24302c3d528a93211ec131e6fc3a0f91ff5523470c3

      • \Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Users\Admin\AppData\Local\Temp\server.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • \Windows\SysWOW64\install\Windows Defender.exe

        Filesize

        276KB

        MD5

        964b6256c09afe5d3fdaaf7d907507e6

        SHA1

        9c7196cbbf0ed99d4b1b2a778e60208408f59e14

        SHA256

        f0d387f71db823c7ee61576c06fb3f14d366bb5b8ac5b11d193cc7388c5a65c1

        SHA512

        7b012b8a3f460b641a6e6ec5698564e98be86d5c23e3bd3d06f24f44e5b95718e1bf32c4ff747d60b532047fa1d759d41bcc8438171f2b28532be8bc7526e3e3

      • memory/240-127-0x0000000000BC0000-0x0000000000C17000-memory.dmp

        Filesize

        348KB

      • memory/240-103-0x0000000073EC0000-0x000000007446B000-memory.dmp

        Filesize

        5.7MB

      • memory/240-59-0x0000000000000000-mapping.dmp

      • memory/240-71-0x0000000073EC0000-0x000000007446B000-memory.dmp

        Filesize

        5.7MB

      • memory/240-76-0x0000000000BC0000-0x0000000000C17000-memory.dmp

        Filesize

        348KB

      • memory/240-81-0x0000000000BC0000-0x0000000000C17000-memory.dmp

        Filesize

        348KB

      • memory/832-131-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/832-125-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/832-137-0x0000000005410000-0x0000000005467000-memory.dmp

        Filesize

        348KB

      • memory/832-110-0x0000000000000000-mapping.dmp

      • memory/832-143-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/832-144-0x0000000005410000-0x0000000005467000-memory.dmp

        Filesize

        348KB

      • memory/832-114-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/924-117-0x0000000000000000-mapping.dmp

      • memory/924-139-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/924-130-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1076-138-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1076-140-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1076-134-0x0000000000000000-mapping.dmp

      • memory/1252-72-0x000007FEF2A80000-0x000007FEF3B16000-memory.dmp

        Filesize

        16.6MB

      • memory/1252-75-0x0000000000356000-0x0000000000375000-memory.dmp

        Filesize

        124KB

      • memory/1252-73-0x000007FEFBB81000-0x000007FEFBB83000-memory.dmp

        Filesize

        8KB

      • memory/1252-70-0x000007FEF3EF0000-0x000007FEF4913000-memory.dmp

        Filesize

        10.1MB

      • memory/1252-66-0x0000000000000000-mapping.dmp

      • memory/1256-88-0x0000000024010000-0x0000000024072000-memory.dmp

        Filesize

        392KB

      • memory/1492-126-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1492-113-0x0000000000230000-0x0000000000287000-memory.dmp

        Filesize

        348KB

      • memory/1492-120-0x0000000024160000-0x00000000241C2000-memory.dmp

        Filesize

        392KB

      • memory/1492-105-0x00000000240F0000-0x0000000024152000-memory.dmp

        Filesize

        392KB

      • memory/1492-94-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1492-82-0x0000000000400000-0x0000000000457000-memory.dmp

        Filesize

        348KB

      • memory/1492-78-0x0000000000000000-mapping.dmp

      • memory/1492-85-0x0000000024010000-0x0000000024072000-memory.dmp

        Filesize

        392KB

      • memory/1756-99-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1756-91-0x0000000000000000-mapping.dmp

      • memory/1756-93-0x0000000071441000-0x0000000071443000-memory.dmp

        Filesize

        8KB

      • memory/1756-129-0x0000000003BE0000-0x0000000003C37000-memory.dmp

        Filesize

        348KB

      • memory/1756-141-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1756-142-0x0000000003BE0000-0x0000000003C37000-memory.dmp

        Filesize

        348KB

      • memory/1756-128-0x0000000003BE0000-0x0000000003C37000-memory.dmp

        Filesize

        348KB

      • memory/1756-100-0x0000000024080000-0x00000000240E2000-memory.dmp

        Filesize

        392KB

      • memory/1912-54-0x0000000076041000-0x0000000076043000-memory.dmp

        Filesize

        8KB