Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/10/2022, 23:09

General

  • Target

    378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe

  • Size

    489KB

  • MD5

    a1b068d24c66f0965990bfda13074eb5

  • SHA1

    91d5b0771aff8bed98f0aae3239532989d08e584

  • SHA256

    378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e

  • SHA512

    1f94c3756e93748bb8c1ba13cf09f44f9ee61855871e546ccf6a4fa24edde50cfee54f91135780b7d19f81e3c07185c82813482531e8f4bce4f275ee4a9dd08c

  • SSDEEP

    12288:wSTURpWedRofFPydxEf62gpWxEMi/dvTj:wST8pWwofQxEf62gMEMi/dvTj

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe
    "C:\Users\Admin\AppData\Local\Temp\378a90f74866c69640b4d9067204e90de354f45f8a6d4a7b734bb6ea18e04a4e.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\program files (x86)\internet explorer\wmpscfgs.exe
      "C:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4228
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4492
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3476
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1008
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:3296
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2248
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:17416 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2340
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:17424 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4576

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9

            Filesize

            1KB

            MD5

            1298dd13007bef0086a54e4e99e5ad5a

            SHA1

            39615e688e8662296692f7b58a4608f21f29eed4

            SHA256

            6af14ecfcbc14019a7372593e29ce9587fcb5f7d4daccef01d06543f73178d6e

            SHA512

            0a9c81ef3412eda67ca21426aa9dd3485ca437ca08466d71673fefa40d1949d3ab2664a1fc2bc8f860e18e1fcac34de039c76f31f2d3c0c6f6785103ff95e990

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

            Filesize

            1KB

            MD5

            ff66093efe58fade3c2bf4560820c345

            SHA1

            4cc87b4d3c8ba2d6c86becc1decba7df26d3ae90

            SHA256

            f737f1bf6a70089c1025524a26a271080e3767be910facbac3b493b7bc568474

            SHA512

            a1cf45721de5ff6deaa396435e11d997e7b3f6bdb4ff70b1c210453278775968d55f9b885389e3f4f0b810e0bc2df34a87fbf698438e131bda9199950ed6aacd

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

            Filesize

            1KB

            MD5

            1d098255a63d9b3c0f9d02a30a9c2884

            SHA1

            2d108db0eaea286147c6dfd078063d3b6b2a9cfb

            SHA256

            3d14d5299b60dd090c9d4ec92f24e1bb1d2059e4495398edd83ca0b3d2e142f3

            SHA512

            e3e6da4f0e3623de908c825b045ce7021584f76a0f27551e19cd757f4b5f85f493ea7ea41f3969672e44bdcefb8ff0cd60ce7305daa18021110f8e4fa730ce2e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_280D9A2E08E812570A3CEDFF43DB10E1

            Filesize

            472B

            MD5

            b4ded5812e05504cc00fe8fbe84f15f4

            SHA1

            0dc42fa74a67e7d0a56cb443fe8eab00a9d74ab5

            SHA256

            270f810160a5e4309084e76c3657d97f4f4bd490b35fb9f1bda2f9c856f4f27b

            SHA512

            a22a7fc998bdcffb36492ae3edf41a0c88e42b682972de7c271662a42dd0f6a345f522a4a132364d58039fe669926f6edb5a9b222714fbe2c4ca7087adf7172c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

            Filesize

            724B

            MD5

            f569e1d183b84e8078dc456192127536

            SHA1

            30c537463eed902925300dd07a87d820a713753f

            SHA256

            287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413

            SHA512

            49553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_7DD59375F5F188E24150CF26FFD79104

            Filesize

            472B

            MD5

            891dcd676f5a41f8f5ec98ea8c60592b

            SHA1

            474dac82dd2c818fe63055bdba7e715c0d9d32fe

            SHA256

            53afbf41908f20707746b5df8819067747374c47bfedcea13916d106989df34f

            SHA512

            a7025f093f48e5ada1e6ad778ad7f49c526ac006768e05a02d9cb1921c0fbb6fc109f12d6306d0f911c0c8aa08c7b0e5a8c6c4385d76b961b6e635e8b452f32c

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8

            Filesize

            472B

            MD5

            d3bd8bc0b77639c72e6566716b7fc31e

            SHA1

            967b1da7fbb4a5272d68401fb8772e0b1f893e2d

            SHA256

            f25481873c253ccfb163d8b193c150906b37b3f680fd904545d112acbf14edd1

            SHA512

            b48bc20b62b80be82a9134a233dc0d34f7654276a888235791eab154de468f04f10fcadd28714091c1f710351c92383f29e3a5f8155e45412fbee3b04bb40525

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0684275E946EA5A526A0B9446D8D1B31_8BC55A34553CE38DA9A256FD39734BE9

            Filesize

            458B

            MD5

            b4759a7d261b0d9024068274e0e5b167

            SHA1

            2023daedf411219f668ea525468a1006413c5c77

            SHA256

            35afc456e293af1cd73b4934f4827de1bd66a04758cf44176e64385eaa91085a

            SHA512

            5993df96268dbea2ed026626dec330856657b859ec40a5bcf8f1afeaf8574287af972e0f06cc0f5d7487b96cef8f3f7d4852f3e1840a4d10c0e21b77ab177249

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

            Filesize

            450B

            MD5

            e72a9e040c9be2264c2ce7f6df0b01d6

            SHA1

            4b16bc651b2cd809d23c23342fe57c2fe149d292

            SHA256

            ed80d3863fc9d356db8726b0a160a8450c6fb4cd2523f1da51be9dc31f29bff2

            SHA512

            812c8b73ef9c2b67679777af5a5130b0be0d5b57fc7adb3f13b581ed1463ae3aa5ba679a0822f17dfab60ec73989e6c3f819f9a499e5e3554cc23e93e3bd516e

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

            Filesize

            410B

            MD5

            3a8a30861aacdd3cc8813e195dee1485

            SHA1

            62b56cf6bf1b14f2b141e9b90d64176e6c0f7cca

            SHA256

            270b2e11b4f918fcdd86d638ec887da15f8c16e14eb143adde7ed8e6b141774f

            SHA512

            700b3a0bfa9b95161ddf3d4ef5af7c04453e5be83377b0242162c62a6a985ac2b5753b3467c040db837b9bd2029dc4952ca340e7d816a253cd9903774e5e8a90

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_280D9A2E08E812570A3CEDFF43DB10E1

            Filesize

            402B

            MD5

            2813f428e99f0326ab45bc9b8203df3c

            SHA1

            fb30246891c7bb89e7973383b56367a172d54eef

            SHA256

            14f7b2a68140a154bd9b16abf925b6557a8aef3e8457605ac3043a773ce0854d

            SHA512

            8ab858bd2d8e836fab98d91180fedf34e4aad0b23d16100d832baa3d65e13f2b7c38ba66e079f6fb6c4f84d96f5b3771799d9acac689ec34e8a51244b701dcf1

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

            Filesize

            392B

            MD5

            c87b39b5d18d3ed06b4018c8bd01de11

            SHA1

            7d2fb70a9ab836032dd4f92f15e28a8d5d14f2c8

            SHA256

            3f3c1aceec44af93aa8765b040bf2fc0b3a4b1460a97c10c757e0ed1b37aa910

            SHA512

            9db2f41345b39c9e81f35ba3ac10cd09b7274cefa470d37fd7e1d5c4650d2f9970f2d63e808dbfb363aef855c9ee274d1661cc2ac7417df90d33bd4e9e74e37d

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_7DD59375F5F188E24150CF26FFD79104

            Filesize

            402B

            MD5

            d8f23270ad99c8e6f6d9afd09d8a7800

            SHA1

            2aea8527f9e9bd8ff4886f6c4ef212fe3161399b

            SHA256

            dec3a46e814db7e4af7444ed2824c6edc5ff8cd3f5c2d482c8c73daed703d035

            SHA512

            eb2fd1244367b0fdf1ff5e8f45a257fe1024aed5c9130146d151bd99790abdd6555fbadca95143969b69a63b238d6a3af7fd8918338846be824dfeeaf957eef2

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_871E11B76822F93FE2DBF907A5A1D9A8

            Filesize

            402B

            MD5

            35469f457162fdcd23024939db935148

            SHA1

            379cddf2bbb78f53304db9b5d2a531ac1d2a27a8

            SHA256

            bf17b16cedb5db8c1293ae3d2d23de9124158ea2faf3ceee304c7a44a24c7367

            SHA512

            f925d314ccca5e9bcccf57474e9df3e5e35536889e821a9846b42ca625329ccfa29e17fcd3601fa3e3d237883ec266996fdd2d384e4d64d87b4bace8f5698ae1

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\47NRIJ2V\chevron[1].svg

            Filesize

            200B

            MD5

            11b3089d616633ca6b73b57aa877eeb4

            SHA1

            07632f63e06b30d9b63c97177d3a8122629bda9b

            SHA256

            809fb4619d2a2f1a85dbda8cc69a7f1659215212d708a098d62150eee57070c1

            SHA512

            079b0e35b479dfdbe64a987661000f4a034b10688e26f2a5fe6aaa807e81ccc5593d40609b731ab3340e687d83dd08de4b8b1e01cdac9d4523a9f6bb3acfcba0

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBR7CLLA\2.5940ae1c.chunk[1].js

            Filesize

            418KB

            MD5

            04bb6e8d9135d976f28e9ba68fbc6f67

            SHA1

            fe386efd5e23414c48e37d3dbfe340f1ae5d4d4a

            SHA256

            b81d40ef3e5928c7bee6ec287ecebfea17f6d62b277916f0b70d223fa4881d18

            SHA512

            aa21f0744d9e6d286506e425af6f1ea091ebcbe3c671fe339d5c3c18e541323cada2182fae79e3c910aabf4d225142b2bd8458b890322e07f4f9084cf686fbd5

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBR7CLLA\caf[1].js

            Filesize

            146KB

            MD5

            90e31b91e01f6fd11ba277eaf81960d4

            SHA1

            160dd211beb572554110101a91287e9192006a06

            SHA256

            d945f7dd8cd2da98fb79c6e552d8e5d3f2e83d52334796d143118cfb723febd6

            SHA512

            39f16434f547d9c195fc9d995de06d0904a792b25400d1a8f4ef1d9c0414f90c887ee6044188bbde56f8fc752d372c965cf9225a616a5bb2a41048f0c4d42691

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MBR7CLLA\main.4e219663.chunk[1].js

            Filesize

            273KB

            MD5

            87b518e8e45487e774f8d47f2dc0026f

            SHA1

            e5da4365a7867737da9b39ef021cf9f35d12cc5b

            SHA256

            1ef669d1914ecf9299396df700b34839c61c6bb24297dc6b4284820eb5f2e5d9

            SHA512

            7b8b1c87c0eb5ab34d515df4880b88dcc5bf7c6b5089349bcf05cd2bb82a0152ba7ebd21fa45fabbc460076543e7e563f881234d3b1dbe66188e98d01a8c7d4f

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PREIF6EH\search[1].svg

            Filesize

            391B

            MD5

            a6ad6e65373db8c1b1f154c4c83f8ce5

            SHA1

            84cc007d6d682c589e1e1f87482a5278830f3000

            SHA256

            920a378947204498c122722933b3a4b67788a2b6fade8bd0d47cf830eeee0563

            SHA512

            09b6d4711c284b1a04c9c4d874f3d1ddfc876c1491fb2aa283a13505bcdbfe90b02731d0b7ad5f492b1dda2161a4afe20040801ea634d2727cde84319adfb1d2

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZX6MAMIN\caf[1].js

            Filesize

            146KB

            MD5

            256bc6121c38c7c35712f49893cca7fc

            SHA1

            3bb52cda7a9817bd8c771231560c5bc44e9b419e

            SHA256

            0a32c848b24d44141809c13ec71c713b92ff69f0f783bfe7f223e72914d3835e

            SHA512

            b42bf8de968f655f08b3425a6ad91dde7a96715e18bd0809405345063f771c39d88eb4097f66285f905ce4203870c38c948ce20d09908cf5b5393c9874daf1fe

          • C:\program files (x86)\internet explorer\wmpscfgs.exe

            Filesize

            528KB

            MD5

            1fd5926e7bb64c0109f530da012b482b

            SHA1

            a84fc98b0911a52b37573e6a84a63024381bbd13

            SHA256

            95b728c5db8f5391d5466744ad5e33e02d8c330d0a715fd62bc4434c6a93c2c3

            SHA512

            1b73832c2b242ab12d5f337690b7b5ae531a4fe2246ba072f170c2c78a2b69e4b8ea6cbef1a7d917d629046366088e07412a030c4cc310baac0c2daf27daed9b

          • \??\c:\program files (x86)\adobe\acrotray .exe

            Filesize

            542KB

            MD5

            8e9e8a26f2a785209a321d6a4d17c648

            SHA1

            1fc900f9ef24e0907f09330f441369fecfc7fec5

            SHA256

            a0016c3f2748102052b3a3318f25c9ecd4635bb16dde3297f5a366e8c9568676

            SHA512

            63c83a774af764d516b694a8505c6273270c703e2af185cdad420f9d27c759653b680e9a927fdd4f6d0731874c3ad97e85a58e3445c572698d5d3b82da3da166

          • \??\c:\program files (x86)\adobe\acrotray.exe

            Filesize

            542KB

            MD5

            9c7074260fa4c65104e4680f37f10b88

            SHA1

            4ef730b414eeaafccd8deac2a0f6f6ba1b55fade

            SHA256

            56b1bc26df199df322b2cf01663281c5fc2a4d6ba7f3a543d472407f34bf753c

            SHA512

            b2b3e8718dadcec04b4cab381dfa587c84e3e6c2914d2e9c36da3cb0db3e9bb85345b5b59e20375ae7d7838a0bbdc44211662fef01f6e2809a7a93226a229d69

          • memory/544-132-0x0000000010000000-0x0000000010010000-memory.dmp

            Filesize

            64KB