Analysis

  • max time kernel
    40s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2022 22:19

General

  • Target

    75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe

  • Size

    2.5MB

  • MD5

    57558ede05dc703f669117b413c41bff

  • SHA1

    d2395b980e87f8cae96f6aaa67e57202a3932c38

  • SHA256

    75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6

  • SHA512

    c5eed69ffdf69cef434fc37b4b56ffe57f7023b3e444edc7d35b46041385297a6775f16c41289f22498b48dea937ec692156c072b6bd6927b447cbe9bab83b20

  • SSDEEP

    49152:yGwRpLlxzVu/GTuoZgdwb+bL6z2zzyIochMdjxkouiLMa8sU9A7BKHEf:yGwR1AGyoZgdTbtzzroUMksUcAkf

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe
    "C:\Users\Admin\AppData\Local\Temp\75220c700957c780cd35f7c30cbc8af8867902e97b850f487fab091a6b8226f6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\system32\mode.com
        mode 65,10
        3⤵
          PID:1476
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e file.zip -p28212181714525110601836129965 -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1820
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_6.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1560
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_5.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:944
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_4.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:904
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_3.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:460
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_2.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1048
        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
          7z.exe e extracted/file_1.zip -oextracted
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of AdjustPrivilegeToken
          PID:1540
        • C:\Windows\system32\attrib.exe
          attrib +H "alex.exe"
          3⤵
          • Views/modifies file attributes
          PID:1044
        • C:\Users\Admin\AppData\Local\Temp\main\alex.exe
          "alex.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\alex.exe

      Filesize

      21KB

      MD5

      cbd2a802e34a5467650dd732e5e21377

      SHA1

      b17ecde7faf42c6146ff5cbabce1ec71ede9caff

      SHA256

      0aeb02c7a288bf9987f400be557151ff19daf912f153cdf7ab679e813f116d9a

      SHA512

      f11425c8e5ecffb32a0fa70ae3415e2b8c50b93a96b0c4d2c443d4c9265eca396716308b76b0529c500aa8f5e7b4bc9957cac129b4cea199fd6a7a5ec6530cb5

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

      Filesize

      2.1MB

      MD5

      9cc34b4afaeb90f7399b4e5532367f92

      SHA1

      bd2037168dc14e881cf7532b29efd2e828a7ef76

      SHA256

      9202f4434be105cfd9a85810b7b387d6a639e8380b9cc2db5bbfccdac1ab1bc5

      SHA512

      3c0b8e64cb05df66cac8f6c120aa1c6e302da9a8b03ddd397b3248c2307fb3e76aff01234a3a67c3fb167cb705b1f9f87ada442f104458208a5e8cd5bd522bfc

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\alex.exe

      Filesize

      21KB

      MD5

      cbd2a802e34a5467650dd732e5e21377

      SHA1

      b17ecde7faf42c6146ff5cbabce1ec71ede9caff

      SHA256

      0aeb02c7a288bf9987f400be557151ff19daf912f153cdf7ab679e813f116d9a

      SHA512

      f11425c8e5ecffb32a0fa70ae3415e2b8c50b93a96b0c4d2c443d4c9265eca396716308b76b0529c500aa8f5e7b4bc9957cac129b4cea199fd6a7a5ec6530cb5

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

      Filesize

      9KB

      MD5

      2eabc967e66c565f03c711da5cfd7d8a

      SHA1

      abfbd38c3253583fb270a2cd33f0bd0461e2fdaf

      SHA256

      83e88dabcbc3e5d435afec31090a6a93060c2530e23e2aaf489f387e4d9df849

      SHA512

      c2dedddbb8cd5ee668b3e55f0f232b0dddc1a97caa90383cc6d5fafcc94ceafcad2c0b05eaf08ecc4094ff87507b98fae9d7c1ba8ff0732114a1c869ea218592

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

      Filesize

      9KB

      MD5

      103025d721083b6e96647537a32f324c

      SHA1

      352e421353ad0fc60a383dd13bdebe994c90dd87

      SHA256

      a6d096610ed0dd2441d469b46bc6530c76847393910c52bd54912f145b8c54e2

      SHA512

      4575334d516a3502685a2638d9b9e658d21de934da85105d3aa52ead62fb7082765362d35fddec2ac8e3104c2d9be0c9879274ca7b12b92c14b890b62ee1e414

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

      Filesize

      9KB

      MD5

      8836c2b6163cdb8436d89c46c3659ad0

      SHA1

      0cf1cc64e8cb3a38323b69b7ec5f03f91941c7bc

      SHA256

      097d44c585356f91252993fdd96aed5c7b2ff2403ad00a9ca7d44a0fea509e4c

      SHA512

      4134b885f659e4d4d17baad18c68c111a61b090d43a8d7ba1ce1c5e1949b7b66369250f07ed203474d1d7924f1a21ccfb948f44b3d7a11a1aef1d71b71df6c2c

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

      Filesize

      9KB

      MD5

      d2e218eafb0057822ddd2fba4d4e33de

      SHA1

      02a7c85aabe751e9adbf204fc3c23a2cec3e5304

      SHA256

      7e8579ed998348999448e08aee494e176752b9d7c8ebbeb3fc8b8ce0740af0ce

      SHA512

      fe0137502f8b057d0394610c55e25b5e490abbd951b6693dd3b8a8276dd5fa27e2102b8dc65b22cdf83f8704ae4bb42506c9d698fc098d9dcd0ce71fde4fdc5d

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

      Filesize

      10KB

      MD5

      a59e4eb4886d43cd1759f270045aea0a

      SHA1

      dc00f1e3a60e55326d60b6c5d15113ffe5cb01aa

      SHA256

      be91343a2da94bd756fa17a8b382bffbc8e6c53c1d1add8fbb9cbf999ce268f5

      SHA512

      e792066d8475fe4396e882325b75872fabad58c30952a9ae10561d42ec20acd84fbf12265ecbc723a12d4feb887a5cff7976935f7b844959747c6b5e358f9dd7

    • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_6.zip

      Filesize

      1.5MB

      MD5

      c7931f8404e34185077c7ee1cf1d264d

      SHA1

      d388f217b92bf12e76fe33b62ae6c4c745f82d71

      SHA256

      c9fe94bd6703cc48e40c641db94ec2c22aecbd2586867daea6cc4f19048e56c4

      SHA512

      4b40584d9661795345dd578cfbbb3782504130e13d5c8160e344a6d3713a2476c49e257d1ab6bfd0436097ef6a73ef83634c0e730ebf1178a277c042a6c1cbb2

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      1.5MB

      MD5

      94efe2b6efb68da045a6d4f89b6cb51e

      SHA1

      38559a3a60a440ab84555949b237f71e11afd0fd

      SHA256

      a59a8796b7236d4793245e8f44f51da2664f2ec208de79fcc3a5e4c665a51864

      SHA512

      014ab758c1249c862f64d185d3da833765177179359e386c9f4c17a02c0118e829fa538efcf56f7b8f31fd6e5e35a480b07099e6c6cba35f419ad158c43ed193

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      450B

      MD5

      ff66a3d7b38116501a72bca822c5792b

      SHA1

      db6b9f7480c4820b3c89413b230d730cefb3828f

      SHA256

      b436f8182477005e4a193a99a90a2ae162dac2eb7f9efbe82fb6e5df24c794c0

      SHA512

      20a569ea86c701b432be35ca9f031e9b104443fe57c19f6590c41bef639ef5ef7a33b8c2f50f11c02d23e3cde4a0da6f22f612f7eb10b9c9023052c36d7f9cc9

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      1.6MB

      MD5

      72491c7b87a7c2dd350b727444f13bb4

      SHA1

      1e9338d56db7ded386878eab7bb44b8934ab1bc7

      SHA256

      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

      SHA512

      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • \Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • memory/1488-54-0x0000000076681000-0x0000000076683000-memory.dmp

      Filesize

      8KB

    • memory/1680-99-0x0000000000ED0000-0x0000000000EDC000-memory.dmp

      Filesize

      48KB