Analysis
-
max time kernel
144s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe
Resource
win10v2004-20220721-en
General
-
Target
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe
-
Size
45KB
-
MD5
ad090589116ae6ba1efb9d09ec7fb098
-
SHA1
f9efe2e2591204800787907583a88b2a87348b49
-
SHA256
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18
-
SHA512
37572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
msnmsgrss.exemsnmsgrss.exepid process 1596 msnmsgrss.exe 1396 msnmsgrss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "msnmsgrss.exe" 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exemsnmsgrss.exedescription pid process target process PID 2040 set thread context of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 1596 set thread context of 1396 1596 msnmsgrss.exe msnmsgrss.exe -
Drops file in Windows directory 2 IoCs
Processes:
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exedescription ioc process File created C:\Windows\msnmsgrss.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe File opened for modification C:\Windows\msnmsgrss.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d08680b066a5d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "366096228" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AE0BBDC1-1159-11ED-B5E1-5A3151DE7991} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007647cecb75a30445a6fd9fb68eba542700000000020000000000106600000001000020000000e353caa666b4f6203f0a6f9ac95fe1a7dd8ea068ac2067601a8296934c2f10f1000000000e8000000002000020000000826afb5662363d6362bea179941be4d619ae83d3ec00c07e25c4440a3dedc93c20000000100c43d41a84a1be1832b8da0b963f5b25581fcb9b7bd00301230280a6b32aca40000000fecb6656be35d509f05a488898358808b756f9a61617d73277c5615075107c6252cea5ad5ddc40946c7cf98e8e89b52b1c0bc953c93f113c31edcf85eaa3ee05 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Internet Explorer\DOMStorage\facebook.com IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1012 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1012 iexplore.exe 1012 iexplore.exe 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE 1888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exemsnmsgrss.exeexplorer.exeiexplore.exedescription pid process target process PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 2040 wrote to memory of 1000 2040 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe PID 1000 wrote to memory of 1572 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe explorer.exe PID 1000 wrote to memory of 1572 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe explorer.exe PID 1000 wrote to memory of 1572 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe explorer.exe PID 1000 wrote to memory of 1572 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe explorer.exe PID 1000 wrote to memory of 1596 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe msnmsgrss.exe PID 1000 wrote to memory of 1596 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe msnmsgrss.exe PID 1000 wrote to memory of 1596 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe msnmsgrss.exe PID 1000 wrote to memory of 1596 1000 5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1596 wrote to memory of 1396 1596 msnmsgrss.exe msnmsgrss.exe PID 1740 wrote to memory of 1012 1740 explorer.exe iexplore.exe PID 1740 wrote to memory of 1012 1740 explorer.exe iexplore.exe PID 1740 wrote to memory of 1012 1740 explorer.exe iexplore.exe PID 1012 wrote to memory of 1888 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1888 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1888 1012 iexplore.exe IEXPLORE.EXE PID 1012 wrote to memory of 1888 1012 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe"C:\Users\Admin\AppData\Local\Temp\5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exeC:\Users\Admin\AppData\Local\Temp\5d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" http://www.facebook.com3⤵
-
C:\Windows\msnmsgrss.exe"C:\Windows\msnmsgrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\msnmsgrss.exeC:\Windows\msnmsgrss.exe4⤵
- Executes dropped EXE
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.facebook.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1012 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
340B
MD59de0f82c7a16fc6113f3d2324701cd8b
SHA11d5d2dd9ebbf68eac0e94dcb4005f3ec3f45c97d
SHA2566be8cbf3b0608e576b15ca5519a2e54ed22a0ae8fd335714ddab681fc889a5a7
SHA5120abce989cb76fb1ba1d4ec7e769f0e36ff5e654bf24b1aa4a5e51e1f45d0bec09dd13df7261aa0422642d4901ad0b540fbf90e620d2ec8ff0ed6979eb92b304e
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3uhj3kn\imagestore.datFilesize
11KB
MD510457677fc5b7af39a2f8f800e3c2563
SHA161aa2744929fad1c60d6633af8932bd8b3f144f6
SHA256b6a36136f505f94c5618d45ab689ecb66ffa5def1a6feca692e3932a6a78010a
SHA512574b27439ccac920ec6ded9ba94fdd5cb707ed7e5a7b86f92d3b2f79d86b6cd93edca355ce794205c48131105901c433f69d8903563367548621c54b328debb0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KWR5JGZC.txtFilesize
605B
MD5cfbbdad481382ac91b4294e7e6737255
SHA18652ee37030b5c7f41acebe9f59bcc66f3ba960d
SHA256521a06454657862e7ae47631773ebeeb4d0b2673895fb329d8718dfe4d4a82ae
SHA512560a9246605958c0b2388b721cd52770f91507c757c0afd58b83e3a44bd345bd0cb6768c01a0d6044ffc8c1fc570bf0a6f0384eefef1a30b460a1d48ebfdfb86
-
C:\Windows\msnmsgrss.exeFilesize
45KB
MD5ad090589116ae6ba1efb9d09ec7fb098
SHA1f9efe2e2591204800787907583a88b2a87348b49
SHA2565d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18
SHA51237572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3
-
C:\Windows\msnmsgrss.exeFilesize
45KB
MD5ad090589116ae6ba1efb9d09ec7fb098
SHA1f9efe2e2591204800787907583a88b2a87348b49
SHA2565d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18
SHA51237572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3
-
C:\Windows\msnmsgrss.exeFilesize
45KB
MD5ad090589116ae6ba1efb9d09ec7fb098
SHA1f9efe2e2591204800787907583a88b2a87348b49
SHA2565d63b837589720da7e45a9cff617488eb1e29a39e7ec23de28d495a799d4fc18
SHA51237572a0131d2d3910fd8bca4bf35982626d61fb0c5ab442c002607fc0c3a312e29f9f571b70faa5e7d8e86ce471b4ad724b7fe1e2f24892ca623de391476e2b3
-
memory/1000-60-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-64-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-65-0x00000000763E1000-0x00000000763E3000-memory.dmpFilesize
8KB
-
memory/1000-63-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-61-0x0000000000405232-mapping.dmp
-
memory/1000-84-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-58-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-57-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-55-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1000-54-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1396-83-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1396-87-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/1396-77-0x0000000000405232-mapping.dmp
-
memory/1572-85-0x0000000074C91000-0x0000000074C93000-memory.dmpFilesize
8KB
-
memory/1572-66-0x0000000000000000-mapping.dmp
-
memory/1596-67-0x0000000000000000-mapping.dmp
-
memory/1740-86-0x000007FEFC211000-0x000007FEFC213000-memory.dmpFilesize
8KB