Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 19:40

General

  • Target

    Bloxstrapv281.exe

  • Size

    11.9MB

  • MD5

    0be784b86944b7a9bf441f7a162c5063

  • SHA1

    c9c4b60ceecbecd97ccfbb32a5ace6792b13b87e

  • SHA256

    554ba8585577dce1573b9b1a43607fed63d70f8cd38e9ab7bf7b8df219453ad1

  • SHA512

    f4381fc9164629e93c0e5f459b99831c6b1825640104081a0370136e3d539fbc9bedab89b459b4583aec75ed5352abafbd05fbcdfc8d64819b8f9e2abe4b2086

  • SSDEEP

    98304:o1qZ+pv3Tscod5DFasb/r5vGWD3EOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTlGK:o1qZ+pLscVsb/r5vGlObAbN0t

Malware Config

Extracted

Family

darkcomet

Botnet

Guest16

C2

saw-shirts.gl.at.ply.gg:4164

Mutex

DC_MUTEX-F54S21D

Attributes
  • InstallPath

    Bloxstrap.exe

  • gencode

    3zEvf95rCogr

  • install

    true

  • offline_keylogger

    true

  • persistence

    false

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bloxstrapv281.exe
    "C:\Users\Admin\AppData\Local\Temp\Bloxstrapv281.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\BLOXSTRAP-V2.8.1 (1).EXE
      "C:\Users\Admin\AppData\Local\Temp\BLOXSTRAP-V2.8.1 (1).EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win7-x64&apphost_version=6.0.35&gui=true
        3⤵
        • System Time Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2592 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1896
    • C:\Users\Admin\AppData\Local\Temp\BLOXSTRAP.EXE
      "C:\Users\Admin\AppData\Local\Temp\BLOXSTRAP.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Windows\SysWOW64\notepad.exe
          notepad
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    337b8f492921f705f1e3b1848f034e21

    SHA1

    ae42ccb6f2cfbe257186bb45588de3fe7c975276

    SHA256

    2e2dc41b135a839d014e822c900f596b61cf2345ef6cea0af1c925de9b8835ee

    SHA512

    689b3cab4fdef5da06ef2a38bba8aac6038e08c8ee67fa26e03f0be4e21d631e6f05b150dac5e02a0d62190517b032ffb4c040bf520b20d84211f63bb2ba00b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca27067ba68c2b0c2fb89a1ce469eeb2

    SHA1

    9ef92641f6c104187a9147f1b694bc9709d26d12

    SHA256

    154fd6c4dd457f10200e96bfd44bfae4e9688c09f9a49bedadf3d0a12737c76b

    SHA512

    313175eed01c9bfdd5b168ef8f7a6c2981984c4de830fe6271eb2e71d580560b298c297b3a9b5fcea8049b6f70e7001e9bdd1150e181e5d12ed3aac9c03577b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c63771cff0def2f25d4d189775cbb30d

    SHA1

    b3041f5c5cd9fea4cb36b124a182bf37baeed3e0

    SHA256

    a6edde2ad4b44c5d574a1d2f3da830371e096009e146593cc88e5524f2d46f09

    SHA512

    dafe452b3119b11e6890b5d85a4a1084e957f35601534c020cb0bf06d3bf969f707aa20d85c35ffb3367a16edff329103fea9c56288745970baf3e0772ba1676

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e7a8b5b97e39c97787c82e82cd6fca4

    SHA1

    c05fcc655385bafa5746c39c7ee50f85fea216e5

    SHA256

    099e9cd0ba1a586766314270fd9fcbe1c30327c25f2634ed28f55cc3f376a025

    SHA512

    7d778d17a210a29785b07d97bf51db78dc0a49740bdbc2dbaf80b3d07d197cf88806d105cd9175985d4c590474a45ae2a45e66a9a10d1495b7405e6c37c8fc74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13950e46652d1e048417725744f4c089

    SHA1

    01e3a4a86058f3a3a18264c1b14fd15d33661e96

    SHA256

    64962ed5c1dbd9de0e94550e30448a7ca4356bd0df93883e02dc0fe36c31cd20

    SHA512

    2cfbda7b11520c13d94c8fb8a5d5879b6f61e5d6747ed3dfa06612cd166be4c7dee48710c8f6e9122df4ccb91e5dc2a4b372eb407d431cd4ff3b2871d7dd44c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cbbd3f01a1183b244fb30224561622a

    SHA1

    fd93a320761f96bbda4e2a3f3e2b3fda87af29ba

    SHA256

    3199e6457606209fcfebb07209e1b891212d04dded2a3c3646c44126ba0905db

    SHA512

    2460d46d2f4c0d7821e5903cfb1460f07d6ab90722aa998b859bc3230ea44fc5028659e1be2992eb28bd0037efb2cddb46c232b505a73a16404d3b032e352a15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3faa6c94cff7470f9894ab6df3b6a800

    SHA1

    79d289241f78ab10987c6dcfd8dfde4db2bba2a0

    SHA256

    2bff9e31531d927315d8c43aa7ea5a2484b1355bfcec7e54ce2329bb1ac86a56

    SHA512

    808e7caedff858adc2cd4c2d34d7f3d6f4e3fbf07dc254a18a3bf4da93c702ebd50c0794f07242fc198033097b01fc36517fe0abc90b184fba83de3bdcdbc319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc3da5dd8f0d5f98cd64f8abd48aec3a

    SHA1

    d167efe42a10c899ae6d39ddba3551e094b707b6

    SHA256

    507b01bb6cf9a7179bc3cc11a8a7f912d14061f1184f228d7dd1694d75d0deb1

    SHA512

    66921edaf3c9ff76c444552b40ed027b39c49d978041be7cc09088bf30e512e93785c42ccf8799d7c2820b629dfc59c078af58ecd601f58389b8ef448eaf4727

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d92a6396b3ee37e66bd3ea9831ef5a1f

    SHA1

    acd980455903750e00b28078a8fb66ae819cfffa

    SHA256

    da26692257b683b44e5ed3530007aa03e66e24bcbdf92e70ea5356f5d2dce259

    SHA512

    9dd4aa6e890d78e2ba68d5e3078d06766cd0300df5d639db0f4ea175b00dc522c2c7d4078cfba495ae3abacae0d1cf12deae00350bc9b36e6701c69f1ef68dcf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    432fd2c0f427511fb90b81275ac996fa

    SHA1

    f845a1ff275db0584332566f909bf8bd712ea13c

    SHA256

    c480c2e2614c657cadd6c9325ea2f5afa204e8b2950d7bb463831131329ff22c

    SHA512

    769128d5f12aa079de0caf44e544660f8b12ed843e9d5e24e2f803ec9887b8440f8d3092f44dec16e3a1485d52d49f73f39c672a833de26854be57d83235163d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f606586b59ad60c0a687769f5425b518

    SHA1

    42d52335d7697129f196641380d6e61b3adaa651

    SHA256

    c75a33cc5b492cfc769e3150911aa7f368f67577315deb1f6861f7cbec29dc19

    SHA512

    bb9f95669ab7dc232148d634c02c5e8ad4c259e98d88f1d7c7769378967727f714e2d30dd4938c345458ec7772e783e5239a30332ea3ab75bfd6889d3b9b1833

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e89513c3e85e69241dface5d23c75b66

    SHA1

    aa8664f45cf49a989a7aca333ca035c7112ab651

    SHA256

    de767b15f9978f2e9f2b88a728715dffb3764f98065bd4219fc9298efccb4117

    SHA512

    ac79951b190c65c7c4c9c46aeedeae647c5da2281444453fe7b496cff94357770c2356e30567d2086641b2c448f66166b0c03e613884112bf3bc1cbec8990169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1213033e459fb71ea195d6aca7431af

    SHA1

    01a802d06aa17465f90663f3ed227f570a95307f

    SHA256

    4ab556c3fc5c0ff3725b27ddb10fd99f77334e57aab3be2881111c6dce18b44f

    SHA512

    804b261d4c1e5bb7d495be4cce44eced4e353d77238b0cb5196c68f40c579f6c647c7694ceebbcaa18963f0151adb17b39fd62d9014be974089cb8fe59003078

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5daddad47b27ff13f3a66f1b5e590660

    SHA1

    1884cc2a802a25b60528c9498203856cb84e791e

    SHA256

    f2bfb13c04126ce82d0cdab59d58fc68cc28cb3f6bfd1ad0ee44d9e76709ccfd

    SHA512

    a98b632eff1a2c7f7be472d67b9bab7bcd0bbf9c5d36a7a1b63f6a8459917e5d72857b0ac20d3235c74e2d183e1e412073d5a5223771cbcf9b8dad90f690dbf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b3c6b6dd9549f65704b420d2d98141aa

    SHA1

    20665e4d3769812fd003ad5783b22757ea3acc77

    SHA256

    cd2fd0fd738b648e1936ab61cb5ce5884ade5787f50f799a45a264e98f70ec16

    SHA512

    d220a1f7b24c149676ccf643418e8362ade99aa01defdf299742e6b5978af546f3209867cd0828fb978385b5aafd815b982f793c5cfc272165e070789a797e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f556049d404a9e8a311e9413a33138bc

    SHA1

    a5c6ec77e92a248f8afdc8cab33ba447cbdb5a47

    SHA256

    18f38f2e75e6c0f2bcae3716ebb5277ec3a66246a3afb0e570308c5211d5632b

    SHA512

    dd04eaebeed284aeea84338346d2b255cb47e50536e51a8570b4e83685777519432623a2a44e27197d9818266c0ff4c9a836c7c477c42a78b7c375cfc3a5fb49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f1188887e35f71731a054a9620e4e8d

    SHA1

    271345e266358730d553ea93bca2b6bf76fee3a4

    SHA256

    a79a4d69c1a7d30f49d99f12cfba75da15c916cb66df03125a6da7f52dc572a9

    SHA512

    194686354ecf0e7c296e8b076574484513fdfddcc77ae9929cf7490534df6798fe1f876f411ae15e07417a7497ff1d7a7fcafd0c686a364525a2014b355bde61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7952e9537fea8a1a0ac0931188102f97

    SHA1

    4ee9e0f2ecdd75646273b2b768dbcc0db73d0958

    SHA256

    459e05186682aee7401996900a0aa41543e1ae1dabaf1e456cc33ff0b3e099a0

    SHA512

    ab4fe4cabb0ea73733c5e1e9186c397af5bfa5f743c51f2873114ada9462ce8bc72e5c604f21277ee95bb69794af6e022b722d6707a5f0861f6d720457b76153

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e6d5297b63a4d51ad0e9e2750a20d0e

    SHA1

    7895fc594b629e178e6866df8c2feeb79ed898e0

    SHA256

    9e9a6698e1664a6150bc4a5085230c75b792865ecead98b36cf786e223bde05e

    SHA512

    d060f5513b7ae1b62f8c26e6b8230c71ca6850775fdf77a677ed1ae2d92e20641d4411d57e431256677982db6eb9c714441195da37de42f4a6242a5a3466916a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b71490a338ef2cd0da6343f63fa074da

    SHA1

    8bf2af500d1a9f59f4f854a46c857113d798040e

    SHA256

    f0c55898458f37beda8a29baa6fff1d5c02a87f5e72ffafcfee2b98eb79dfa33

    SHA512

    29be732967ad7bea354d2e9cecbdc19c1ad597444732e3acf088bfe3ee2c1ee4e0414bb71b86dd1d350e2e2b20a2b636e4d63e6ea4a38d245dcfeb4a0ff8dbd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f3a6a7a1d2e769b4eb0c4fc0f44f1e6

    SHA1

    225a0e4b2c1a0bd944d17302d2de08349f4115c9

    SHA256

    fa29a753604e50bb088585233768a3ce84bb798036e4c26d5cbc2ff438620726

    SHA512

    6182de340aa80ee59a1b5aab6c197002ffa33cf1ff11241c09772b31f26441f408cc25dcad9d97fe31804964bfec9cdd681c702c74c9dc04771a60e07ce68bd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1756e6279b93207d19cc9801144cfe6b

    SHA1

    02365b7580400d3db372207d9779d2772284a4db

    SHA256

    f555adca787a5f3d13f53b5ebe29ee5164aa939814f379496658534107cfbab4

    SHA512

    cbdf0751dcc3b95282b61aa5bec76994fc7ae7b54d5bbced92f00b996a1c51891a9dfa3344ab0c1a68bd28960b250fc1e343729fb33746762a864bd96bf33c67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df631416c4931445c7f2242d52496867

    SHA1

    5581791222bd2b2890fc3615e898e71f21d369a3

    SHA256

    c49f9dda7cf2a7c8d58e7b59b797be3fd2d2e13d03ad10a723b1ee225bb1ee48

    SHA512

    4e31b77d88009adf6c74dea20ca22d1ad873bf00c1bc9dccca85d3e4a6fd782f703223d17af0093d0a7579528ec29e3d40e42196082bb8c1fb5fe57c60481e29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    901512a28f7b96edb1a2abdcb41a36ca

    SHA1

    39dad74c2cd13fcff3452882f63f0af9b572068d

    SHA256

    20d20e4b54e97f338a57a06abc795bf3423c33c600add982f504008fd23d6bf2

    SHA512

    84c9f048baa029b26cf2d348b66d07e8ae686db0bd490b569b4376ce961618a3f28055958a59d881988ffee4f6de99d7ec7bd23d109cfed34d2ff92f9d4d79ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b05dd85e247abf98194de1c1c8cebd80

    SHA1

    bbf78d51e688fb107e8da73884b3a33332d9d368

    SHA256

    9e212880297ef4956c1b95373ca6333ed4a0fc8fba471adc672a4703f89748a6

    SHA512

    9d14d37542ecd327d756a93824b3dfaead63529fe96d31b96d29154d5b77bc96b47f39f4d8fa5ffcfdb07d16a65ecd24c2474bae0c6062eab2b78e8bc1b17f53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95bdabb5872d66c2eaf0321df1c61f86

    SHA1

    02f5b8743ffbd49dd30658954e265204888d2852

    SHA256

    09e02e531f6c97e9177ea58545861c52ebe912168dbc7f1efb9f1676003d46ed

    SHA512

    5e8dff219e47b03b5d2a040dbc41ea9ea8fc07019c10bb9f6850a447dd92df84eefb9b596cb9d8d77fd398856ab18e3d3996939305f3d631b6a395bb457ecd94

  • C:\Users\Admin\AppData\Local\Temp\CabDE3E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDEEF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\BLOXSTRAP-V2.8.1 (1).EXE

    Filesize

    11.1MB

    MD5

    60246a70b28a9d7ef6a2dfe009e48075

    SHA1

    8dd51b8460307f785690008657918540a8ee4998

    SHA256

    e9091fa15944a451e792674cf408e400a5e6391cd31160040210b494bd723f17

    SHA512

    551ffebc64b11e21a234b3ac5a1e103e5cf0ff4fd4d5b71628d0c4215b24fbca946cc7dc14571667214dca86ae9c3327c928b996be456529f84bb2f4a0901e5f

  • \Users\Admin\AppData\Local\Temp\BLOXSTRAP.EXE

    Filesize

    660KB

    MD5

    4d734f4366e741c2dcdffeb170b267ff

    SHA1

    b659aa63fb1799294df03af19a7f3656afbf78ac

    SHA256

    7035b553d2a0117d081c5d567710d6fc10c7de2b37880502cc1c20613ccc39f2

    SHA512

    aea127a538d10b9dec114f105728b1c2edeb10b32ab34afc257acdbac65eed82b44dabb35914cd4313b170270f01fd2b120494b76fe656fe8abe9e1b06e84819

  • memory/1852-16-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2112-17-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2732-56-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2732-18-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB