Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-01-2025 10:34

General

  • Target

    ffa40455ce4f3399c04bd60994fdd0852ef7a8504d8f5a1644925fb7291320d1.exe

  • Size

    337KB

  • MD5

    26dc676d5627f429799472e98139df8b

  • SHA1

    1916b0ed8ee03e7aadf15958728c2727e80bfbbe

  • SHA256

    ffa40455ce4f3399c04bd60994fdd0852ef7a8504d8f5a1644925fb7291320d1

  • SHA512

    e6be26019d360d386b1266f2078169480425de0df5dd16566cdd16608d742e78a983a5a5a6c919410c768fc7e8ee5e3614e24caafb8b3cfba67d565e51e851d8

  • SSDEEP

    3072:9sT3DXVo8M1e+sQPgYfc0DV+1BIyLK5jZWlfXXqyYwi8x4Yfc09:GTzlYIeP1+fIyG5jZkCwi8r

Malware Config

Extracted

Family

berbew

C2

http://crutop.nu/index.php

http://crutop.ru/index.php

http://mazafaka.ru/index.php

http://color-bank.ru/index.php

http://asechka.ru/index.php

http://trojan.ru/index.php

http://fuck.ru/index.php

http://goldensand.ru/index.php

http://filesearch.ru/index.php

http://devx.nm.ru/index.php

http://ros-neftbank.ru/index.php

http://lovingod.host.sk/index.php

http://www.redline.ru/index.php

http://cvv.ru/index.php

http://hackers.lv/index.php

http://fethard.biz/index.php

http://ldark.nm.ru/index.htm

http://gaz-prom.ru/index.htm

http://promo.ru/index.htm

http://potleaf.chat.ru/index.htm

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 36 IoCs
  • Berbew

    Berbew is a backdoor written in C++.

  • Berbew family
  • Njrat family
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 18 IoCs
  • Drops file in System32 directory 54 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 57 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffa40455ce4f3399c04bd60994fdd0852ef7a8504d8f5a1644925fb7291320d1.exe
    "C:\Users\Admin\AppData\Local\Temp\ffa40455ce4f3399c04bd60994fdd0852ef7a8504d8f5a1644925fb7291320d1.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Windows\SysWOW64\Bfhhoi32.exe
      C:\Windows\system32\Bfhhoi32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Windows\SysWOW64\Bclhhnca.exe
        C:\Windows\system32\Bclhhnca.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4572
        • C:\Windows\SysWOW64\Belebq32.exe
          C:\Windows\system32\Belebq32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4060
          • C:\Windows\SysWOW64\Cfmajipb.exe
            C:\Windows\system32\Cfmajipb.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Drops file in System32 directory
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2264
            • C:\Windows\SysWOW64\Chmndlge.exe
              C:\Windows\system32\Chmndlge.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:3596
              • C:\Windows\SysWOW64\Ceqnmpfo.exe
                C:\Windows\system32\Ceqnmpfo.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:1172
                • C:\Windows\SysWOW64\Chokikeb.exe
                  C:\Windows\system32\Chokikeb.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • System Location Discovery: System Language Discovery
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2976
                  • C:\Windows\SysWOW64\Ceckcp32.exe
                    C:\Windows\system32\Ceckcp32.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:1656
                    • C:\Windows\SysWOW64\Cajlhqjp.exe
                      C:\Windows\system32\Cajlhqjp.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1572
                      • C:\Windows\SysWOW64\Cdhhdlid.exe
                        C:\Windows\system32\Cdhhdlid.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:3876
                        • C:\Windows\SysWOW64\Ddjejl32.exe
                          C:\Windows\system32\Ddjejl32.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1688
                          • C:\Windows\SysWOW64\Dhfajjoj.exe
                            C:\Windows\system32\Dhfajjoj.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3160
                            • C:\Windows\SysWOW64\Dhhnpjmh.exe
                              C:\Windows\system32\Dhhnpjmh.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:4660
                              • C:\Windows\SysWOW64\Dobfld32.exe
                                C:\Windows\system32\Dobfld32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:4804
                                • C:\Windows\SysWOW64\Dfnjafap.exe
                                  C:\Windows\system32\Dfnjafap.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  • Suspicious use of WriteProcessMemory
                                  PID:4748
                                  • C:\Windows\SysWOW64\Dfpgffpm.exe
                                    C:\Windows\system32\Dfpgffpm.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    • Suspicious use of WriteProcessMemory
                                    PID:3824
                                    • C:\Windows\SysWOW64\Dddhpjof.exe
                                      C:\Windows\system32\Dddhpjof.exe
                                      18⤵
                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:528
                                      • C:\Windows\SysWOW64\Dmllipeg.exe
                                        C:\Windows\system32\Dmllipeg.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:4480
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 396
                                          20⤵
                                          • Program crash
                                          PID:4584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4480 -ip 4480
    1⤵
      PID:4012

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\Bclhhnca.exe

      Filesize

      337KB

      MD5

      a90dcb0ec82afef95bd1dc1e217e5f5c

      SHA1

      3c1e923ba931fcbf5d84cc425fb093ad7f450d62

      SHA256

      979859adcd26a4a15697c2c04c82a0bd5be5d8efe8778eeea374ead1e53abbec

      SHA512

      7bdbabb51834ecc2c363cc7256019ecbd786ed3c4f5aee7ba5a88526a52f2db3f556742fb397093994621209918c37e762dd968b48c66028a6ae42c5468c5c74

    • C:\Windows\SysWOW64\Belebq32.exe

      Filesize

      337KB

      MD5

      a77ef0b820d24eda78ca365c0eaa0eaa

      SHA1

      5f13308527a5574916c1c4e04404dbd883e8ffb0

      SHA256

      cc0a3f16118e7ee72b9acc6f20dc9924e4eba008840bd649026ad9b98ed5d62f

      SHA512

      e65d5bce4830449bee5b3d8528450afd2d6bb1057c5b6ca1b85f377df82eff0827e33d2f3f96df42eaa3a367ee48b938629a9b0d7c9f38fb8c99913197dafbe7

    • C:\Windows\SysWOW64\Bfhhoi32.exe

      Filesize

      337KB

      MD5

      e18edc1d9da3225037a4a408b93316d4

      SHA1

      6d4402b69f907bf3ac362f26a628f164319c3b2c

      SHA256

      9d8cdda3898dacd338bfef324862d35b37fc3c598b5ff9db23978faee494b8c9

      SHA512

      020f2ed3ff86e04bc08d59612625a389bdca89902aadec3cd9c4fd781419e1c3b929b5cbde73a1d7c50fb529303cb2e4c316a6de2bf18f9374c35e8cb5d6d660

    • C:\Windows\SysWOW64\Cajlhqjp.exe

      Filesize

      337KB

      MD5

      c9b39fb70eab19f6df14c357f2334362

      SHA1

      f09b3afa520e0a6e5903c153522e23f1244509cb

      SHA256

      95e601cdbcddc9dd3e7071222e99f6b70521ed5200b7c1a8f5e20b807ce355ab

      SHA512

      5ce884841786dfd0de01451f3345d0c2014fb5366d7589e980fe27258065c6dfeb9642f782f6144458ca5f5a6f19f4f877f4533d8dc7b3268f0dcdb5515c0075

    • C:\Windows\SysWOW64\Cdhhdlid.exe

      Filesize

      337KB

      MD5

      a2ffd7e7277642bd941f33a61b813632

      SHA1

      00f230e0a41ffaeec2a775424ce64c5bf7b0aa4a

      SHA256

      3ad595fb73900082b4df1211acf22d14833986d0ab33a2aadf7a45892053099d

      SHA512

      4288a9ab44f3f533b69fc28392e51c8899a0c695cad7f071fbd413a3b1695388654cbc41cfba07a002c607445bc4223d85eb1a675d656112f421f7e13f1b3795

    • C:\Windows\SysWOW64\Ceckcp32.exe

      Filesize

      337KB

      MD5

      fd677cf8f261b5ea3575cde39ce47d7e

      SHA1

      d3ee97117f84537ab546364054785d9739b598d4

      SHA256

      ed21fe5cb68582cc4aa88509d692e93ab72e84f4d153f90d0af1810f14c5899d

      SHA512

      7dbcd8e0970791f16f462c071fbf43b8d21bdc71cd816b3fc2b73d145f87e664523f7294355b7ae691ae764b4ad1650916a6f4abdf06bfe1e625fb2da52d8593

    • C:\Windows\SysWOW64\Ceqnmpfo.exe

      Filesize

      337KB

      MD5

      f04086713efc29d20b9027b7e2166036

      SHA1

      b5dbe1d31070a4f4ae2d8c66ded69acccf709f7f

      SHA256

      f4de3abb77febcf0ff630297a397d39149a2ce5ed17b35a7bcdec78614b7b827

      SHA512

      cf4b952fc45c17afeb046edea8ceb05c5135d71914ec4f10f87e85a09b3520e6d4dd44fb0ee38207b64a21193237fe2666b2c0da9d3eda4ab34ded6a6708c100

    • C:\Windows\SysWOW64\Cfmajipb.exe

      Filesize

      337KB

      MD5

      741cee17223f462ae377e8c2983f76b7

      SHA1

      7d4b509a6200bcd1c64db39fea48bfcc0d3494d7

      SHA256

      2bbbd4d768ee1af62c1759c455e2d3f6dd9c3b56afe0fe2e6df3ab447a528f2a

      SHA512

      82f45443e6b38a52fdb91e63dc8896dc49dd88ec16d273fd80d8d8d57368139ec581d4f615dd7da10f3ff29516252fcdf4ba1004a4b51a77ec509115d6d211fc

    • C:\Windows\SysWOW64\Chmndlge.exe

      Filesize

      337KB

      MD5

      92aed63cfbcacb2bb6459bd0876d12eb

      SHA1

      116d58e49786eb60e5b05d999a4b713625385b38

      SHA256

      9f1b8e8d79096fc38ceebdb0cd840a6a4861032a8f690c1498f03b1b4d21eab7

      SHA512

      68c9aa78ea218c1b1818204398f2ebc59e4869fd4d58658a81500df27f4c5646408025c7dac068b62d7564f1843987af914bf27f162ac15c725374098e9c607e

    • C:\Windows\SysWOW64\Chokikeb.exe

      Filesize

      337KB

      MD5

      0cbd71e25b56f3123565004f3b00e4a1

      SHA1

      ab537f1273905ffcc3c910ee6411c80c4ad0fe05

      SHA256

      ae2562a5af29227a69a7d4e93772a2c434c5c7f02a1a43c9a34b2eadc232d600

      SHA512

      300edcd3813a6b775e528d7fec376be55577cb1b577ce62a1d2c4393163045f2fc4fdfe5b4a9d32a8d5ad04ca0a69ea73aed2acd3468ef845d117c0ee4bd483f

    • C:\Windows\SysWOW64\Dddhpjof.exe

      Filesize

      337KB

      MD5

      7847a09322163b0398dc1ee26ccacade

      SHA1

      8577761bd92a34d9627e4f099bc8cf81936e8c46

      SHA256

      2631c5f881537e6e4c4f1689bed8e927d7dd758e122299ef372f73c237b8cbcd

      SHA512

      7b576b1d02c15547c4d17233dac0331608b2b2fdbdd5744d484e9e8b26ad238a1e6b89d07dcc5a7d2bfc72b2bb699fbdffb3c7f45caee517f84bc2b801c34cd5

    • C:\Windows\SysWOW64\Ddjejl32.exe

      Filesize

      337KB

      MD5

      ad02bede562e557fbdd5538906530864

      SHA1

      8306a67c07a5fa50ce0f04775c46e76daf117e76

      SHA256

      410aab5444b5341c0e98f04fd2771e79baff01af0656bce21c1d68cb64c6fa3e

      SHA512

      1038d3d1742904b09445394dffc1a56607c0f4236950ac319cd17c5d06fedccd730d2fb08524a7004a9f68edf34a5c7efc0849ffc6ad9402705891a1662d44f1

    • C:\Windows\SysWOW64\Dfnjafap.exe

      Filesize

      337KB

      MD5

      bc2a6655ee6e4ef48d1b66e4c4324f03

      SHA1

      bea952ac0caaa7ec2b605cb5c5d688515b6a81e1

      SHA256

      0fc431eab3a09479942b83f78bb597a6112d481f9152c1e1e93c96815519053f

      SHA512

      fcd8e82e7fbf99e3b64e4367154da5107211d14aabe60d9256c41fe70304a7627a6b267761f7d671187c79e51dd0e30cee174418bd600e925d542e06e607700c

    • C:\Windows\SysWOW64\Dfpgffpm.exe

      Filesize

      337KB

      MD5

      8f38fccacb333a3c74cfbc2f487ded52

      SHA1

      142fa2f85a1130f9ec5503a155ab659ce5d6fa57

      SHA256

      2e53274d27a51d3fa12fa020d1ad047fd2e9dea72a8a02b5b4128f833a95fb9a

      SHA512

      db58a0b3b3506b7753a443bc5e21f638bd93509432c786336de23ba773bbb01c03783490eef6d109e81ae28b91d0b02dcf9dac5dc6ba5a8888dc2b8124716566

    • C:\Windows\SysWOW64\Dhfajjoj.exe

      Filesize

      337KB

      MD5

      1c3ec0cceaff12e8e002effbe25a25ca

      SHA1

      e842e683cc9eef91dca7852d1da38f313c17db01

      SHA256

      b35ee5a59d5719ce563bd2ec0680bfd3a5bdaa150da8295c800bfc63072c2e95

      SHA512

      b29cc5904704abb0e06798780bbfc5eb8b4ed42a517ca1f1de9d4d4e0b55ae464bb159820c2e7df9bf4022435a28d092e2489de8317d54043bf4ec84233ea0f0

    • C:\Windows\SysWOW64\Dhhnpjmh.exe

      Filesize

      337KB

      MD5

      307785d4192ec936ef17f4cfc36550ea

      SHA1

      5b576703dabc19de1c46f8f1f0903055714cd31f

      SHA256

      082f1d4e0a59e4d728ea331df6451325a543d1aa985f11deebfa6e5f64440e64

      SHA512

      9756e7e0f6b3d6e8092396c7fcbb53dc84079e1a57cf648940ad72eb7a98fc3d04e729a80663c531142c0b628f504f36d8576a3332f2c0cdb555b09ce1e631d2

    • C:\Windows\SysWOW64\Dmllipeg.exe

      Filesize

      337KB

      MD5

      0f50121fde2bc6b826dfad2083e6cd0c

      SHA1

      6d11bd65b134b96bcf8a4c743c4133bee3470629

      SHA256

      a3a4928a6a04ac65863fe4416c306c18b22d108e4a140f0946d3ad4e71a637b2

      SHA512

      86bc941da9bf2ba0385fbbd95ebc62f0ad70612a1dc8e1900c62c0d25a136d7f5f251506ff42e38b6905c7d1dea4fb5e4d62c848c01fabfb627ec76600299cdc

    • C:\Windows\SysWOW64\Dobfld32.exe

      Filesize

      337KB

      MD5

      2a6822e29d0bf80c3f90f355d7d7bc8b

      SHA1

      22fbf2001b4cbc5e52b76dc390083f62c964e50e

      SHA256

      b93c8ba63c40dd4f8d474b9f6d768a32947f963e13715d7a82a8ec2590bd82bb

      SHA512

      fc8d6b68f7b5e383fb4d5f4e347415b56f5e575746cf582ad02c01aa5fa2c57a70181858a17f5ccf99a771b2cd0338ec17ff71bd452dcf88c76d97d23c9f8e74

    • memory/32-182-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/32-1-0x0000000000431000-0x0000000000432000-memory.dmp

      Filesize

      4KB

    • memory/32-0-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/528-136-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/528-149-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/544-9-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/544-180-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1172-170-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1172-49-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1572-72-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1572-164-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1656-166-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1656-64-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1688-88-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/1688-160-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2264-33-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2264-174-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2976-168-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/2976-56-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3160-96-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3160-158-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3596-172-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3596-40-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3824-151-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3824-128-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3876-81-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/3876-162-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4060-176-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4060-25-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4480-148-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4480-144-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4572-178-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4572-16-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4660-104-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4660-156-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4748-120-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4748-153-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4804-113-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB

    • memory/4804-157-0x0000000000400000-0x0000000000433000-memory.dmp

      Filesize

      204KB