Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2023 05:02

General

  • Target

    6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444.exe

  • Size

    5.8MB

  • MD5

    fc4cd218208f7901d5c462ecd066c57b

  • SHA1

    12fa7c06eefd67ef3bf1e4c4fd12ab80ddddc6b9

  • SHA256

    6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444

  • SHA512

    7ad501d74a98c5b3c10cae6405dcabcc2242d16263632f637ee2238f4d7dfe5dd9b8a862735525da2d613e3de874dfa69e1a729329560502140954a4bb2567fa

  • SSDEEP

    98304:yQ8ek0Yyc89jX5kvGdxMrG7gGEGT4PWBZsSneAJ:y9NP8h5YN/iHn

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 8 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444.exe
    "C:\Users\Admin\AppData\Local\Temp\6c3540f243e789505d3bcf5e19185b81fc558c626db3d4a4d9affab89df0d444.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2496
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3044
    • C:\Windows\DNomb\spolsvt.exe
      C:\Windows\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:332
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:312
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1324
    • C:\WINDOWS\DNomb\spolsvt.exe
      C:\WINDOWS\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\yh.png

    Filesize

    93KB

    MD5

    ead548883ee8720b59c3a115e05fa278

    SHA1

    9133f5f58a2701523f42b05a16640ceb29067980

    SHA256

    5fa6898d935607c8683e641c4cce757ff87675f7762af035698d64a26a9c3169

    SHA512

    dbedc9572a8f998bd7ce8d7f39aa0326998d7a56df293deaff3ce3eea60d11cef421c7e75d208bec55299735e57e32465a921a895b209a4dcc234e014765ffcc

  • C:\Users\Public\Documents\t\yh.png

    Filesize

    93KB

    MD5

    ead548883ee8720b59c3a115e05fa278

    SHA1

    9133f5f58a2701523f42b05a16640ceb29067980

    SHA256

    5fa6898d935607c8683e641c4cce757ff87675f7762af035698d64a26a9c3169

    SHA512

    dbedc9572a8f998bd7ce8d7f39aa0326998d7a56df293deaff3ce3eea60d11cef421c7e75d208bec55299735e57e32465a921a895b209a4dcc234e014765ffcc

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    488KB

    MD5

    d71cc496efbd74e35590f2a1c251d4fd

    SHA1

    ee178c642200be79b00784e5dda88512c5e48bc7

    SHA256

    9073d9d6f4788cdd63792aa8fe374519d5fddd59a750829c65981f2f59f08892

    SHA512

    18665449f6e3db4f4cdcd8e77501a74b0dee32f36318b86aeeff8916d7170cd116bf1b5c2266e1f78dc3194f3407dd6e457a8d9a364b286163af991842a79c01

  • C:\WINDOWS\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/1324-102-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1324-153-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/1324-225-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1324-163-0x0000000004050000-0x0000000004051000-memory.dmp

    Filesize

    4KB

  • memory/1324-159-0x0000000004390000-0x0000000004391000-memory.dmp

    Filesize

    4KB

  • memory/1324-156-0x0000000004360000-0x0000000004361000-memory.dmp

    Filesize

    4KB

  • memory/1324-150-0x0000000004140000-0x0000000004141000-memory.dmp

    Filesize

    4KB

  • memory/1324-147-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/1324-144-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/1324-141-0x0000000004160000-0x0000000004161000-memory.dmp

    Filesize

    4KB

  • memory/1324-138-0x0000000004330000-0x0000000004331000-memory.dmp

    Filesize

    4KB

  • memory/1324-135-0x00000000042C0000-0x00000000042C1000-memory.dmp

    Filesize

    4KB

  • memory/1324-132-0x00000000042E0000-0x00000000042E1000-memory.dmp

    Filesize

    4KB

  • memory/1324-129-0x0000000004150000-0x0000000004151000-memory.dmp

    Filesize

    4KB

  • memory/1324-113-0x0000000004130000-0x0000000004131000-memory.dmp

    Filesize

    4KB

  • memory/1324-126-0x0000000004070000-0x0000000004071000-memory.dmp

    Filesize

    4KB

  • memory/1324-123-0x00000000040F0000-0x00000000040F1000-memory.dmp

    Filesize

    4KB

  • memory/1324-115-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/1324-121-0x00000000042F0000-0x00000000042F2000-memory.dmp

    Filesize

    8KB

  • memory/1324-103-0x0000000077450000-0x0000000077452000-memory.dmp

    Filesize

    8KB

  • memory/1324-104-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/1324-105-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/1324-117-0x0000000004100000-0x0000000004101000-memory.dmp

    Filesize

    4KB

  • memory/1324-111-0x0000000004170000-0x0000000004171000-memory.dmp

    Filesize

    4KB

  • memory/1324-110-0x00000000040D0000-0x00000000040D1000-memory.dmp

    Filesize

    4KB

  • memory/1324-114-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/2496-48-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-55-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-58-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-61-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-62-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2496-52-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-50-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2496-67-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/3040-36-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/3040-19-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/3040-235-0x0000000000400000-0x0000000000E2B000-memory.dmp

    Filesize

    10.2MB

  • memory/3040-226-0x0000000000400000-0x0000000000E2B000-memory.dmp

    Filesize

    10.2MB

  • memory/3040-29-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/3040-38-0x0000000077460000-0x0000000077461000-memory.dmp

    Filesize

    4KB

  • memory/3040-26-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/3040-34-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/3040-21-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/3040-32-0x00000000002C0000-0x00000000002C1000-memory.dmp

    Filesize

    4KB

  • memory/3040-31-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/3040-24-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/3040-0-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3040-2-0x0000000000400000-0x0000000000E2B000-memory.dmp

    Filesize

    10.2MB

  • memory/3040-16-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/3040-14-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/3040-9-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3040-11-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3040-7-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3040-6-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3040-5-0x0000000000400000-0x0000000000E2B000-memory.dmp

    Filesize

    10.2MB

  • memory/3040-3-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/3044-77-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-79-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-84-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3044-81-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB