Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2023 07:05

General

  • Target

    9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634.exe

  • Size

    180KB

  • MD5

    c874f6337df1d8205b7972eb329d62a4

  • SHA1

    862f07f883d1804f0cfc557a0017319c1e3d083d

  • SHA256

    9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634

  • SHA512

    d90884fb2e77dd986bacd979330073dbb2daddde7f45187d6f464b88f4cb40fc04f512dbb885df90145eae6d1a189476d1aa24952ef52393c7241be8874f9df0

  • SSDEEP

    3072:UJfyTicyCTvl/iwRtpXTnamb0E2HIIO0FEpzY8NmYvWrEjYzu3aWuIo/3ZJ8fS7Q:U41yclqLmwjTqVNmYv3MzAuIoXkSi39e

Malware Config

Signatures

  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 10 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • ASPack v2.12-2.42 5 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634.exe
    "C:\Users\Admin\AppData\Local\Temp\9fb41fed082d86fcc8b615b5dcd468864f69efbe9be4965788083eb1cdfb6634.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:832
    • C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe
      C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 2 &start "" "C:\Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe" /chs
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1656
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 2
          4⤵
          • Runs ping.exe
          PID:1908
        • C:\Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe
          "C:\Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe" /chs
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1792
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Users\Admin\AppData\Local\Temp\670533_qx_wg.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:848
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo y"
              6⤵
                PID:1420
              • C:\Windows\SysWOW64\cacls.exe
                cacls "C:\Users\Admin\AppData\Local\Temp\╬ó╣ñ" /E /C /G Admin:f
                6⤵
                  PID:608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_96EEC010953ED454BBCDFA69FC071E7C

        Filesize

        1KB

        MD5

        a655fdae006ca77642910bc5acc5c285

        SHA1

        eb3b4f65a62a5649e2be0c33fffbe6ce83dab6a5

        SHA256

        ab4799d287e96922fc3e879ba60e35d612ba2a8880f544bc21bb4a3f508ffc93

        SHA512

        dcebd7fde07c277b5146fdf5bfcbb0456ac63ba6d8e35da1b5780dffabee0386f9d957d04026fa3f1bafddfba50985b81d290715d574e3331ca45b26089f9008

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\45253D621EA9F2E0253B4AF8D44565CD_F410F43D170C54FDB8C1624B217AED2E

        Filesize

        1KB

        MD5

        76312d68ab0f6b4c9d3ad9ea89e0d8ba

        SHA1

        2cf4dcfdea10d5694542f50b1a7f2b5c8c5fcb73

        SHA256

        6320a1242cccd9cf6798a8ecc00d2ba264804d9ef87b15d6744371ab01ca2b62

        SHA512

        8311df918bacdd60c9666a41dc0f2557a56b9ccff603a0c33acc3218c0427ab30a0d9a81d71d3e30cdeae055df6660e4847ed50d0a5f3de1054b2c83dfa43d22

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4B3D1CD03E2BE9D4F9CDDE390F5EFE31_E1A4AA592F67FEC11A273850E67747CD

        Filesize

        1KB

        MD5

        af97cb065c33327b97963f0478cc5bfd

        SHA1

        00963025580bc89d55cfc33622ead53d841aefd9

        SHA256

        85455ddbe5b11c63ef0610cefc83c4bde3102a9833763e090b2e16fea2029eaf

        SHA512

        2b57d2fac76618c672be8c3f1e12867f8346d958b791ea8de75717c591991354a6e4569f31b758848aa8a52d91eec307bf8e9ab613cafd76dfdd2db63f1c1e8e

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACF244F1A10D4DBED0D88EBA0C43A9B5_BA1AB6C2BDFDF57799E8116E4002D001

        Filesize

        1KB

        MD5

        26c9fe0e6a419a1039d78bce28dcf60d

        SHA1

        cd17407350ea7ebdaf392aeee8a68241b30325e4

        SHA256

        98f2a5df44492b1c3b94d757c1336defd7b9b8de9c2380490027fe1de084834b

        SHA512

        558706114b8d88dec588f0424960c3f78b9f5ec74197e1658f5e98ca924dfe316a48402820513890781737376988de771ce23b5d052e3d5e1cbfe4677fc46af3

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_96EEC010953ED454BBCDFA69FC071E7C

        Filesize

        516B

        MD5

        14b76dc026d683e1d64e76c5fdebaafa

        SHA1

        8ccada9de3c96d79352ea63e2c33768e28aff9cc

        SHA256

        aed6d8e3a9b879422a03f69278456c485c4af2fda34f6ba36d78abb16143c889

        SHA512

        95f3f946d10ad6257f1570c8db0667338679d4a8f2592a1c21ee42a6c27db0683725848f5aba749dac2b6efc25f4b609ec2e9c8d0ffd4d83d216c6bfa4f9489a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\45253D621EA9F2E0253B4AF8D44565CD_F410F43D170C54FDB8C1624B217AED2E

        Filesize

        516B

        MD5

        2cb3929dca3a6da00149be76e79a6e66

        SHA1

        60aae5dd9f283b35b67febef062550d04dfe3d69

        SHA256

        39e0546e092d0221257f7f929e545036dddc847bc75965cef942972786181b20

        SHA512

        a94286732a9ef700d3e7132fe4b4f395e6e00fa558ea8f138d45413200d4def3c2c12ee7b7aafd96161ad28d5221002046146e6763a77c9e829de53c83daebdd

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4B3D1CD03E2BE9D4F9CDDE390F5EFE31_E1A4AA592F67FEC11A273850E67747CD

        Filesize

        528B

        MD5

        0a3e93eced5c5b0acfd0888228b720b6

        SHA1

        84baa79e6c8f2a421247cc058672b9db51648dad

        SHA256

        c67259f9b43cad5236f15465b1af28655685789402fd312e9dac9dcd6d046d03

        SHA512

        de00ba0d3b3936eb64523da8dc96f53eb22156569e8714fbc06c90def98b26e749e83edbd9b730270c89fca89f3ffe9518b3da626351e10fcfc3d8a9741c688a

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        44b048763d9d7fd62559516bd7eba76b

        SHA1

        18767392da2d19d70a6329b968af6449265459cb

        SHA256

        0708544af97ea146e4ba0858c9961bac60336ca872f6426b907267cbc007fd39

        SHA512

        845fff3f4f00a901e86d3951d609ee43784a087eba1556a3d315eed1fcec221abb3b04bd356bfc8af8cff5d41520d9408e3ae0a58bdfc3c39748a629e90d6e13

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACF244F1A10D4DBED0D88EBA0C43A9B5_BA1AB6C2BDFDF57799E8116E4002D001

        Filesize

        492B

        MD5

        1b3d0e36c709d8bbe21d73b7717e69d7

        SHA1

        8e4b50149ce4b58f885d990dbe24af3a8b5ce90b

        SHA256

        823a64c31ce4a6f84a56a48941fdbf0212c0a4a02acf69610f8222404b75c1b1

        SHA512

        1e17ab6f495646f93b7c18eb02de040818ece0cb853b6a2d4bb4603d891d759df0bde22bc3bf19e4c2d1fcf0f5a5ebc851b3317d2c9832743d257d61393c8204

      • C:\Users\Admin\AppData\Local\Temp\670533_qx_wg.bat

        Filesize

        70B

        MD5

        959fafc7c4593dc36171314631f01ff4

        SHA1

        d69cef67e95b70f82e9538da06cef2b06d87ec11

        SHA256

        ba81c36e5f52016887cd1f330abbf15f2e7276817fad6994c9ade48fb883a51f

        SHA512

        0c596c7b59da065dff224ef27d06035a2b590faa5ead0f370f7de81d9e7e1ce2e0a572a66f0aae8527208f712d61c64df432b28e5844dad10b24baad24d62d59

      • C:\Users\Admin\AppData\Local\Temp\670533_qx_wg.bat

        Filesize

        70B

        MD5

        959fafc7c4593dc36171314631f01ff4

        SHA1

        d69cef67e95b70f82e9538da06cef2b06d87ec11

        SHA256

        ba81c36e5f52016887cd1f330abbf15f2e7276817fad6994c9ade48fb883a51f

        SHA512

        0c596c7b59da065dff224ef27d06035a2b590faa5ead0f370f7de81d9e7e1ce2e0a572a66f0aae8527208f712d61c64df432b28e5844dad10b24baad24d62d59

      • C:\Users\Admin\AppData\Local\Temp\Cab844D.tmp

        Filesize

        61KB

        MD5

        fc4666cbca561e864e7fdf883a9e6661

        SHA1

        2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

        SHA256

        10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

        SHA512

        c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

      • C:\Users\Admin\AppData\Local\Temp\΢¹¤\up.inf

        Filesize

        1KB

        MD5

        9f4cbf33efb7cd1b8a4323800ae02960

        SHA1

        c8128e3eb81433cf4c9d40291373e56a5933ad70

        SHA256

        1e1f3026d51943a9bf013335df8385c33d87692d361e9c2b89c9d186f064629b

        SHA512

        62dd8c97198385fc23f3c9468f691b5836ceea1a60c2e7fa6f9b7967edd7489a02f12b650d084bbeff9eee107c3edab5ce6dee43105e0ed79b46c5b508c4172e

      • C:\Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe

        Filesize

        24.5MB

        MD5

        526ef55269daac8bd2490fab820bcf91

        SHA1

        3e9f974439b311e0c52567f1aa003d5c7745e87b

        SHA256

        95d54b03800efc9757c873acf9b169eddee1ffc3959046f2fa8b02d9549b8813

        SHA512

        8df878e483ce2da347d62bc3cce1b53d4f3c223ab33aa8946550a2920ea167f60313be38c40614f931d531442b2ca65fb8b36f5c0307a7ebe473bcb61a3c1643

      • C:\Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe

        Filesize

        24.5MB

        MD5

        526ef55269daac8bd2490fab820bcf91

        SHA1

        3e9f974439b311e0c52567f1aa003d5c7745e87b

        SHA256

        95d54b03800efc9757c873acf9b169eddee1ffc3959046f2fa8b02d9549b8813

        SHA512

        8df878e483ce2da347d62bc3cce1b53d4f3c223ab33aa8946550a2920ea167f60313be38c40614f931d531442b2ca65fb8b36f5c0307a7ebe473bcb61a3c1643

      • C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe

        Filesize

        286KB

        MD5

        3978a6625faa574ec9a2b09d45b1cdd0

        SHA1

        f95e264f57d8b91f1ced87fed46d7a767adcab91

        SHA256

        5eef523496f78a2e4168e49364c916c36db2ad1d22f39af70a2325882cde95ba

        SHA512

        0f2aae1775bd1029294cefb14d980e183426a074ae1be901b8c0e9111be86b836b1e95d6076a00c1217e7d4b305e333ad4006a7d85105df3a0e5bbdb36404680

      • C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe

        Filesize

        286KB

        MD5

        3978a6625faa574ec9a2b09d45b1cdd0

        SHA1

        f95e264f57d8b91f1ced87fed46d7a767adcab91

        SHA256

        5eef523496f78a2e4168e49364c916c36db2ad1d22f39af70a2325882cde95ba

        SHA512

        0f2aae1775bd1029294cefb14d980e183426a074ae1be901b8c0e9111be86b836b1e95d6076a00c1217e7d4b305e333ad4006a7d85105df3a0e5bbdb36404680

      • C:\Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe

        Filesize

        286KB

        MD5

        3978a6625faa574ec9a2b09d45b1cdd0

        SHA1

        f95e264f57d8b91f1ced87fed46d7a767adcab91

        SHA256

        5eef523496f78a2e4168e49364c916c36db2ad1d22f39af70a2325882cde95ba

        SHA512

        0f2aae1775bd1029294cefb14d980e183426a074ae1be901b8c0e9111be86b836b1e95d6076a00c1217e7d4b305e333ad4006a7d85105df3a0e5bbdb36404680

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0FHV2UE1.txt

        Filesize

        139B

        MD5

        aacaa2165465bf0c15f59f31ba11c159

        SHA1

        1840ee299678e5ca46835d6134fdaa3439cd9f0b

        SHA256

        a693fb2f2da3c065fa71a1c0fbe4cb95365adb6b6235c8672e0f39e6e10920cf

        SHA512

        feba776c61a3d50a057ca04e7357943c98136bc7ed5bf8ce15ffe590099f2c64dafae862b29d9f9b5cd55e5ac2a98ed85418d044d493dd9104b7c21e920e47bb

      • C:\Users\Admin\Documents\WgChat\Chats_gy.dat

        Filesize

        464B

        MD5

        e0a4e1a83a9cde9fbc391335f71c76b6

        SHA1

        2804335ed85dbaf6ad06b36fee72a6568326b07a

        SHA256

        92fc40a4d401787854266750cbb831c1850adfbd25f230f73073c58679bb7530

        SHA512

        28782e18d65de9ed53a27323d7f26ae084a33dc6d020bda4579c8f03de577dd342d168e9f45211970bf8948814218435aaa72a63f23be471bec9ee44f346ed83

      • \Users\Admin\AppData\Local\Temp\΢¹¤\΢¹¤4.0.26.exe

        Filesize

        24.5MB

        MD5

        526ef55269daac8bd2490fab820bcf91

        SHA1

        3e9f974439b311e0c52567f1aa003d5c7745e87b

        SHA256

        95d54b03800efc9757c873acf9b169eddee1ffc3959046f2fa8b02d9549b8813

        SHA512

        8df878e483ce2da347d62bc3cce1b53d4f3c223ab33aa8946550a2920ea167f60313be38c40614f931d531442b2ca65fb8b36f5c0307a7ebe473bcb61a3c1643

      • \Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe

        Filesize

        286KB

        MD5

        3978a6625faa574ec9a2b09d45b1cdd0

        SHA1

        f95e264f57d8b91f1ced87fed46d7a767adcab91

        SHA256

        5eef523496f78a2e4168e49364c916c36db2ad1d22f39af70a2325882cde95ba

        SHA512

        0f2aae1775bd1029294cefb14d980e183426a074ae1be901b8c0e9111be86b836b1e95d6076a00c1217e7d4b305e333ad4006a7d85105df3a0e5bbdb36404680

      • \Users\Admin\AppData\Local\Temp\×Ô¶¯Éý¼¶_tm.exe

        Filesize

        286KB

        MD5

        3978a6625faa574ec9a2b09d45b1cdd0

        SHA1

        f95e264f57d8b91f1ced87fed46d7a767adcab91

        SHA256

        5eef523496f78a2e4168e49364c916c36db2ad1d22f39af70a2325882cde95ba

        SHA512

        0f2aae1775bd1029294cefb14d980e183426a074ae1be901b8c0e9111be86b836b1e95d6076a00c1217e7d4b305e333ad4006a7d85105df3a0e5bbdb36404680

      • memory/832-92-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/832-84-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/832-102-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/832-54-0x0000000000400000-0x000000000044D000-memory.dmp

        Filesize

        308KB

      • memory/964-150-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/964-157-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/964-105-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/964-103-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/964-109-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/964-104-0x0000000000400000-0x00000000004E7000-memory.dmp

        Filesize

        924KB

      • memory/1656-251-0x0000000002160000-0x0000000003FDB000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-166-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-200-0x0000000000260000-0x0000000000261000-memory.dmp

        Filesize

        4KB

      • memory/1792-169-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-168-0x0000000000270000-0x0000000000271000-memory.dmp

        Filesize

        4KB

      • memory/1792-173-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-171-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-170-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-177-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-175-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-181-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-179-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-185-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-183-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-189-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-187-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-197-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-195-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-167-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-203-0x0000000000290000-0x0000000000291000-memory.dmp

        Filesize

        4KB

      • memory/1792-204-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-202-0x00000000002A0000-0x00000000002A1000-memory.dmp

        Filesize

        4KB

      • memory/1792-199-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-206-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-193-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-210-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-214-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-212-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-208-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-191-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB

      • memory/1792-165-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-164-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-163-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-162-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-252-0x0000000000400000-0x000000000227B000-memory.dmp

        Filesize

        30.5MB

      • memory/1792-254-0x0000000010000000-0x000000001003E000-memory.dmp

        Filesize

        248KB