Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-01-2024 04:25

General

  • Target

    6476bbf019b75400e65de9d79edcefb2.exe

  • Size

    70KB

  • MD5

    6476bbf019b75400e65de9d79edcefb2

  • SHA1

    f2bf1ffcdcaafcf91d9afb94e2f2d9bc723cb394

  • SHA256

    14bd4541137ec39fafa313003dbaa93d31ee5c1dcbc90e8287dc279683a9ba20

  • SHA512

    070adb617df5e85d460f5ba1c5c7da0a4ced96e80bc4182b780258710406ba7e2b58bb68bff427b352cee012930000dbd706564644ae4f4f43a328a53e611d3a

  • SSDEEP

    1536:1LHIlfH7Q6qRBwWa2qxQFZA+j6L0Ww+9:1oS6qcWjqazp6LNR

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 18 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 9 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 9 IoCs
  • Windows security bypass 2 TTPs 27 IoCs
  • Disables RegEdit via registry modification 18 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Windows security modification 2 TTPs 36 IoCs
  • Adds Run key to start application 2 TTPs 45 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 17 IoCs
  • Drops file in Windows directory 15 IoCs
  • Modifies Control Panel 54 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6476bbf019b75400e65de9d79edcefb2.exe
    "C:\Users\Admin\AppData\Local\Temp\6476bbf019b75400e65de9d79edcefb2.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1780
    • C:\WINDOWS\SysWOW64\shutdown.exe
      C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:692
    • C:\Windows\Black Hole.exe
      "C:\Windows\Black Hole.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2580
      • C:\WINDOWS\SysWOW64\shutdown.exe
        C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:424
    • C:\Windows\SysWOW64\Lubang Hitam.exe
      "C:\Windows\system32\Lubang Hitam.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1396
      • C:\Windows\SysWOW64\Lubang Hitam.exe
        "C:\Windows\system32\Lubang Hitam.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1752
      • C:\Windows\Black Hole.exe
        "C:\Windows\Black Hole.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Windows security modification
        • Adds Run key to start application
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2248
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4144
      • C:\WINDOWS\SysWOW64\shutdown.exe
        C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1972
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3304
      • C:\WINDOWS\SysWOW64\shutdown.exe
        C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2644
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3100
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4736
  • C:\WINDOWS\SysWOW64\shutdown.exe
    C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3824
  • C:\WINDOWS\SysWOW64\shutdown.exe
    C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4612
  • C:\WINDOWS\SysWOW64\shutdown.exe
    C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2076
  • C:\WINDOWS\SysWOW64\shutdown.exe
    C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
    1⤵
      PID:1752
      • C:\WINDOWS\SysWOW64\shutdown.exe
        C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:8
    • C:\WINDOWS\SysWOW64\shutdown.exe
      C:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\118202442607.bmp

      Filesize

      2.6MB

      MD5

      591cd62167ab88842a094f05dd3fccc2

      SHA1

      03227ab120c5eba47e05b8f35d7f47ab530ba845

      SHA256

      f2bf425f5120c4824215c888c2181ad0658ab91bede3aa89ca83ebdfbcc66170

      SHA512

      c1abbf412bdb1340407234ac57ffc1f7a810b4ba8e6e8fb2e07f425250c8a1ab583cef7343baf8af5c6edad814d0cbfcd4f4f08bfbd47cfd1f69461a740f81d1

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      70KB

      MD5

      3de70b97aef0be07447833dfe0d5459f

      SHA1

      b375e52d9cd5a6bd73a3b6865605efbcf5796171

      SHA256

      ebdbc2a42c361001472bf3b73bf461a7a406245734229524b5dc6cabee9de0f5

      SHA512

      7c2613c6039599ce9463dc7bbf84b0f2d8e0ec7f7085838cbef03bd5c2b379e0dd18112f00cc253d4425bcfb520460d7c77d2ac50468d22b5164cefd0253ac87

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

      Filesize

      70KB

      MD5

      2dfe05add7bc653ffb83e2fd8140ff97

      SHA1

      8736c292741b61d3fdcd2cbba8513d980f4ff949

      SHA256

      eb50ba8f5a50f325a1358e81f1824c945d0760e453894439cf84c51228da9230

      SHA512

      b6c90c51837b21ca957abc791249cb4049f466f61f29c2adda563def2b4999ec5417a953b3f7f3b96a649cef54b1eb998e651a29f372fcc9c1cd32e9d174f839

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE

      Filesize

      70KB

      MD5

      5124b426d9907ecbd487cdfdebac3866

      SHA1

      e0c560b202768382e98cd99e576f516be19d0502

      SHA256

      9ed1062f67c4a1df03b5a5c86a1068f9b1ec837ed746e2f16c1ca9dc70a11b59

      SHA512

      2731b91163b9ac7f4d7d57bcd0077d9183afa1eb66f508b83f776036cfc39383b110facea7cea5e8e1f6c4d75eba73fd40bce7854508add68c394a1d0a94993d

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

      Filesize

      70KB

      MD5

      efcbf246d4ae615ce237287958f218bd

      SHA1

      9ad2a935d3a032c11da3ba9e8769d5544eb46b4f

      SHA256

      8c8047ee29f5f311171bbc102e0a21ee838ab9176cf0427311e032ae3fb77677

      SHA512

      65574b97c329ecae5a9560520228e8903dc13afbc414b1011da5d637742242bbdce0aa226ffb5853ae4bda6cf3e9a66d4bf0fd41a1d175c6a128592cd8e0783e

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

      Filesize

      70KB

      MD5

      09cdeede6a3b0d54cc9ffd3c660d3805

      SHA1

      b94b69217d6816b1feff57fb7f4b819948e3fd9c

      SHA256

      aacf14ca01a9fa880474563664c81862a7c4edf0b6045d79a6af3488c432c12b

      SHA512

      86a77709a3d665d37d2c00c957b4fe35c6efb8a08d643cc91c0b6fc46deaf5046eddd78cfe23cf38b83395a111a702786ee23cf4ee64d95bc523edd72cae66dd

    • C:\Users\Admin\Local Settings\Application Data\lsass.exe

      Filesize

      57KB

      MD5

      432a4b7aa2bf0ae2283af298883096f8

      SHA1

      b8112ff1d411420bbf2dba4cb595008358ee0c39

      SHA256

      9d9c42325a84a42a8e13918da80d76c7f1f19a8830aa86f8b8aa6036969167e8

      SHA512

      f556db93098d2b4407bfff3fcee385940b1f52d93dfd97541799a3094b33b565a29ea4b04086ea948191289d8866df9bcca5cd73371748d719fe19284b9ff4b0

    • C:\Users\Admin\Local Settings\Application Data\services.exe

      Filesize

      20KB

      MD5

      01615a74bf170b30dea6ef349bb49e5e

      SHA1

      f699c177df44bf7e5c92689274c48a315f6180ef

      SHA256

      eda8e5ad54783fc81d020f8d88f4a7bafd30eb057ade72a241c30d3ce7adeac5

      SHA512

      15a8a290595fe83e3923091e6fb20efaa780af4b99f09d1b75bd52e3e97d381b180d339f9e255fbc0fb60e5ad7e9431e8a14d8ab6d2c5a3efee0031f1504d5be

    • C:\Users\All Users\Start Menu\Programs\Startup\Zero Code.pif

      Filesize

      32KB

      MD5

      95ff1b8b89d75e9470558864a919c5bf

      SHA1

      9f6152fac91b4671e5656c0e11597c2fa5051fad

      SHA256

      ab0d02d21bf877bae3ea186001f3a8d30c15f79c7c620c7dc723aed6c9fdc5ee

      SHA512

      2cfc410ee917adf32e00be319d8ad6c0a604a2f633a9ebde29b120cdfaf42865af9715237395c2af1973537f601881e92b7567fddf69b614b37229f726ab535a

    • C:\WINDOWS\Black Hole.txt

      Filesize

      1KB

      MD5

      6635e047c242e6d64b2716d81095bf5f

      SHA1

      5def5300f894e58bbb0caaa94680f7735ccd248d

      SHA256

      9757b4f406657c44fcbd40757d1ae06e833a8e1542ca976e6ae63578031b32bf

      SHA512

      c9bae9bf090e7c67fac53d061bb43c2091e991c8f568889463d0c1af8f48652c79c51785c0906705098b418b2d7a4b200580fb44091ecf8bf24d8b1b45a258c0

    • C:\WINDOWS\Hacked By Gerry.txt

      Filesize

      1KB

      MD5

      e067dafcbe64a95f5045a281397732db

      SHA1

      1af7095f98c486ca247449980000d06b04ffc50c

      SHA256

      b6085ee8c1f2de574973b9f3a7417257e25573c2b5228b5a8f87e3788e2733b6

      SHA512

      1b575d62fee219538f8d624ab833cbce0aee431559a0adfa1e3ce9cd4f5ab8a2887b394843ebf164c884ccbed5687d644474328471b23c28edba8f99ccf08b58

    • C:\Windows\Black Hole.exe

      Filesize

      70KB

      MD5

      17a2dd655dbf53a1ebb933f03104c2cd

      SHA1

      284e727a8c60683ebb4daabcaa13ed83733ba0f5

      SHA256

      f197d067a4ae42ab14823994158b3f31fb380f614d47a914815eb4d0631001fb

      SHA512

      ff95acdc127846a764b535a2ed3e3a1897183a42c4f2f3d2e6d9ae890405183c1cddd9c6042a11a60bf82f0b1ae414191e91f9bb7b657e203cab3dad61ac8cea

    • C:\Windows\Black Hole.exe

      Filesize

      70KB

      MD5

      2ae3b35854ea4b94fed5e1dc91db07e8

      SHA1

      ca69f0aee696e5136416bf6f822c5ab1c56116f2

      SHA256

      7c12815561b959a234cfe2fff8a767804c9eeedd70fa11a8a4ce4684caca0f9d

      SHA512

      5f5bfdbb8dd5feb4b02c990574ee8d2ea07e2e769765bf986eaef67b6a63454887ef4bc62f3c67d02edf1385854df0e670ed85df437b108f4451665672e73612

    • C:\Windows\MSVBVM60.DLL

      Filesize

      267KB

      MD5

      c052d81dd7c7502746772ba427cc3d48

      SHA1

      aa383b3aa9afdfd2a9fe9e83c69e962d20d94830

      SHA256

      97114188ecb3fbd024e0901c644b0f0f430e6c084ce3503bdef46491a0421bb1

      SHA512

      cc2e00522ddd83d04c49e45e43687a884325991dc79af734e2eb1c3b925662c378f2efcbba06cb2a57e4b65c3550c6225b969e346a318d2408c6b177b5753e8f

    • C:\Windows\SysWOW64\Destruction.scr

      Filesize

      61KB

      MD5

      5d2109527580cf43e27a0b0c96135e34

      SHA1

      d195a3dbcbd207d4e25b8082102f38c78b66a5f7

      SHA256

      9433103f9ce06726802f0ba227d3aa050ce924ecc97cc993185b2f7a2fe6541d

      SHA512

      1b6c8663278e21497b34bdf1372bbcb9d96f357ebe06ae5ca4616ba57cde650d1f3fbae7073a365b88916b551f9c04ad0dc404af86703ceb6b7a1c16d345ff54

    • C:\Windows\SysWOW64\Lubang Hitam.exe

      Filesize

      70KB

      MD5

      8753d68428fd49f3a2cf145f1f311e19

      SHA1

      0162811afea8848fc83f655a84db561f84364025

      SHA256

      bb3dd70b36c438a5f73ce0993900751b5b92fe9a03c557da87405964c1d20a52

      SHA512

      88f054cbfd7d93f27c95f87911d5197cb5309fa83997ec6e7abd7c03fa9c7227d8b1218eb3705efe105e7ee576c5ec3adedcb869c852239066b0b137d3161d7d

    • C:\Windows\SysWOW64\Lubang Hitam.exe

      Filesize

      70KB

      MD5

      6476bbf019b75400e65de9d79edcefb2

      SHA1

      f2bf1ffcdcaafcf91d9afb94e2f2d9bc723cb394

      SHA256

      14bd4541137ec39fafa313003dbaa93d31ee5c1dcbc90e8287dc279683a9ba20

      SHA512

      070adb617df5e85d460f5ba1c5c7da0a4ced96e80bc4182b780258710406ba7e2b58bb68bff427b352cee012930000dbd706564644ae4f4f43a328a53e611d3a

    • C:\Windows\msvbvm60.dll

      Filesize

      57KB

      MD5

      ec45e07f2948f1183e594fd76394b4ec

      SHA1

      7523ca7003d6cc31998398464f8168f6ce1e6eed

      SHA256

      d22cbaeeeea4a872ee8e0f2feafd183c6758dea920a87a542bd98be69359587c

      SHA512

      29950dbbba367f7202a327afa3a7ec77ad4daf4ec8b71f7bb7f4e4f9dcf1966a883f0f519a3c62610d6f0e121e13a2801f77ff3baff433bdef467b912f05a505

    • F:\Autorun.inf

      Filesize

      93B

      MD5

      4809daf962803cad2b891b94c195d3dd

      SHA1

      707bdd28edcf5e9e288959f62d4da8823777ec12

      SHA256

      3468667630714eb86464ecfe903b59a843670ade55b49ac9d653421b91bcf139

      SHA512

      c9c233b22a853ce17731cb3466f7e8234da4e3de0dec6cc48ed15232303d4f29c49770e20a7064ad9329f8d9d27f8d4b547443d837320f58ac230973bb7dd11f

    • F:\Read Me.txt

      Filesize

      3KB

      MD5

      5c462f1ea2917c0b502ae0761c0f60d8

      SHA1

      c1d15b093b2843528544d77dc0d9d4e3b8a85297

      SHA256

      09c76898e4fa4174c53c2ad514274b5d2ca636ec6f223be5fda4c6135ec4ac10

      SHA512

      e6219ccbabe77a4999ade79c7074753495da9c61d6451c53be34219cc19746ca9a0dadef3b47cd8859cd59604064af5e9fc2a5044780bcfebaaa13dc08c36bbc

    • memory/1396-372-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1396-76-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/1396-75-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1752-357-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1752-371-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1752-358-0x0000000000020000-0x0000000000022000-memory.dmp

      Filesize

      8KB

    • memory/1780-0-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1780-117-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/1780-524-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/1780-1-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/2248-520-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/2248-347-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/2248-348-0x0000000000020000-0x0000000000022000-memory.dmp

      Filesize

      8KB

    • memory/2580-67-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/2580-66-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/2580-87-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/2644-496-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/2644-119-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/3100-474-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/3100-112-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/3100-114-0x00000000001E0000-0x00000000001E2000-memory.dmp

      Filesize

      8KB

    • memory/3304-106-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/3304-449-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/4144-401-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/4144-93-0x00000000001C0000-0x00000000001C2000-memory.dmp

      Filesize

      8KB

    • memory/4144-91-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/4736-424-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB

    • memory/4736-99-0x00000000001E0000-0x00000000001E2000-memory.dmp

      Filesize

      8KB

    • memory/4736-98-0x0000000000400000-0x000000000046C000-memory.dmp

      Filesize

      432KB