Analysis

  • max time kernel
    152s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 19:06

General

  • Target

    d2b978578a093efd77c027fdca58f36ed4ae699fcd4edb768c2ebe0909c94b4b.exe

  • Size

    255KB

  • MD5

    e1977a4b5c58c9e084f11d6c8451c284

  • SHA1

    8eeb917d3be113836768e2ac57afcc390268686d

  • SHA256

    d2b978578a093efd77c027fdca58f36ed4ae699fcd4edb768c2ebe0909c94b4b

  • SHA512

    169adf8dbd93fab4ea782b8f8a2016439795cc81f842064eb46c364b988c9836f0c46a433ef6f3d65038eff6c4379d320ce4007d37453490bfd77a73433fa2fe

  • SSDEEP

    3072:MMDb50WrZa8jCgae5+VQkGdUQFDxePZ2SBaQJXkNRtXlNGKaUIQW/qlQBG3mmTJy:1xlZam+akqx6YQJXcNlEHUIQeE3mmBIb

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • UPX packed file 39 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 33 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 41 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2b978578a093efd77c027fdca58f36ed4ae699fcd4edb768c2ebe0909c94b4b.exe
    "C:\Users\Admin\AppData\Local\Temp\d2b978578a093efd77c027fdca58f36ed4ae699fcd4edb768c2ebe0909c94b4b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\rmxlnkdxah.exe
      rmxlnkdxah.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Windows security modification
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\SysWOW64\cquusbhc.exe
        C:\Windows\system32\cquusbhc.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:800
    • C:\Windows\SysWOW64\lsmyexzdchaobvo.exe
      lsmyexzdchaobvo.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c bipkymzeznoay.exe
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\SysWOW64\bipkymzeznoay.exe
          bipkymzeznoay.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:1004
    • C:\Windows\SysWOW64\cquusbhc.exe
      cquusbhc.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:808
    • C:\Windows\SysWOW64\bipkymzeznoay.exe
      bipkymzeznoay.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1516
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1976
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1972
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x5a8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    6577853098efcc144484365e7e2006c0

    SHA1

    c6df593de5734e36d902f340147ccbd89cd438f5

    SHA256

    57d65e0c06f4328678a30b77a6b2599f42ffafe3c724755ac31c2d8fbbfbe62b

    SHA512

    d133d0abd3f6991d9bfbe0f8a31e743922d5f831588346b5e7bcaebc0544ecfa83dfa5eac15c3b29c0028c66613fe56e0a99f111256b0725ce6ba440642216bd

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLN.DOC.exe

    Filesize

    255KB

    MD5

    6577853098efcc144484365e7e2006c0

    SHA1

    c6df593de5734e36d902f340147ccbd89cd438f5

    SHA256

    57d65e0c06f4328678a30b77a6b2599f42ffafe3c724755ac31c2d8fbbfbe62b

    SHA512

    d133d0abd3f6991d9bfbe0f8a31e743922d5f831588346b5e7bcaebc0544ecfa83dfa5eac15c3b29c0028c66613fe56e0a99f111256b0725ce6ba440642216bd

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    bc8b786b613c0e63c26ee844f066842b

    SHA1

    dec412653653692034efd82fe45c0b296e0f96c7

    SHA256

    d7b96689b604022b80bd2f29798536a03825363f1611db613cb2162bf81fbecb

    SHA512

    c9716a68efe39aaa5e9915a1aaa7aeb18aaf5f43d207b6c20b5920fc619debb76b782bc3ee2bedf55c7ea70429f9831a80c360cef208a92a262dad399c595615

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.DOC.exe

    Filesize

    255KB

    MD5

    bc8b786b613c0e63c26ee844f066842b

    SHA1

    dec412653653692034efd82fe45c0b296e0f96c7

    SHA256

    d7b96689b604022b80bd2f29798536a03825363f1611db613cb2162bf81fbecb

    SHA512

    c9716a68efe39aaa5e9915a1aaa7aeb18aaf5f43d207b6c20b5920fc619debb76b782bc3ee2bedf55c7ea70429f9831a80c360cef208a92a262dad399c595615

  • C:\Users\Admin\AppData\Roaming\OpenStart.doc.exe

    Filesize

    255KB

    MD5

    08da51fc39d51f8bc61c604bc75fecce

    SHA1

    9cc6b3855a7a3809bf1551c9a1060e0c1abe220f

    SHA256

    0b8e0b1343b0fe490bcccd92a05b1ef0de2b2bf4731fb5ab7d57a5f4efea18c9

    SHA512

    721349db4e9b002bb4821903324804df7106cc211aa6fc682c01904fe456dd22aa8b021f187edf64eb943c1bd2ba8825467a60e9e9e88798cc0b093963f49790

  • C:\Users\Admin\Downloads\JoinExport.doc.exe

    Filesize

    255KB

    MD5

    2ffd87de7ef782fd98e19d02275d4250

    SHA1

    d291c7f66775470f8ac521ec14dec44a59547c6c

    SHA256

    76f9e6451bacac85efea0797188244e444e182da82284734179d8f92abcfc00a

    SHA512

    de66672a4d006e5827f74356c81b1297f34600ba999112ce32d003727bfabc46c8207f46067969001da846cd2c937da28413d3a49c0e85bffddce884c7d77fbc

  • C:\Windows\SysWOW64\bipkymzeznoay.exe

    Filesize

    255KB

    MD5

    d31f90f57102c1215d9d70529fe66522

    SHA1

    524c2561c8c58d20ecfc0d8e1d7866562df8efaf

    SHA256

    5bb7720573835e18424ee2e176caf54b2a2dabe6860f8f49d58fe04623ac4359

    SHA512

    15e7097c530d34b4683c48001edde22d13b8da11f87616fd8df634a36be12a1a3c9dea912c03bb163685bb3f74e7d24c87f23f70550a3487e748070e8e048e6c

  • C:\Windows\SysWOW64\bipkymzeznoay.exe

    Filesize

    255KB

    MD5

    d31f90f57102c1215d9d70529fe66522

    SHA1

    524c2561c8c58d20ecfc0d8e1d7866562df8efaf

    SHA256

    5bb7720573835e18424ee2e176caf54b2a2dabe6860f8f49d58fe04623ac4359

    SHA512

    15e7097c530d34b4683c48001edde22d13b8da11f87616fd8df634a36be12a1a3c9dea912c03bb163685bb3f74e7d24c87f23f70550a3487e748070e8e048e6c

  • C:\Windows\SysWOW64\bipkymzeznoay.exe

    Filesize

    255KB

    MD5

    d31f90f57102c1215d9d70529fe66522

    SHA1

    524c2561c8c58d20ecfc0d8e1d7866562df8efaf

    SHA256

    5bb7720573835e18424ee2e176caf54b2a2dabe6860f8f49d58fe04623ac4359

    SHA512

    15e7097c530d34b4683c48001edde22d13b8da11f87616fd8df634a36be12a1a3c9dea912c03bb163685bb3f74e7d24c87f23f70550a3487e748070e8e048e6c

  • C:\Windows\SysWOW64\cquusbhc.exe

    Filesize

    255KB

    MD5

    0ef400e0f33c6460b6a3635533cdb3ce

    SHA1

    5705bc0d09946f9f1143299df590bb96cc1e4425

    SHA256

    4bd233af4312a7a37d61fa54f6ac8acaba610d77d10377e74adc5e6435051e84

    SHA512

    3f8b7327e83e5a947b37ea7ade6dbfd3e72f54ebe6e581d2afeaf868fa6c43162dcc8bd7de9ecec644e29b4dbf9cdb35664c2dce85f759959f13f4b7da1f2470

  • C:\Windows\SysWOW64\cquusbhc.exe

    Filesize

    255KB

    MD5

    0ef400e0f33c6460b6a3635533cdb3ce

    SHA1

    5705bc0d09946f9f1143299df590bb96cc1e4425

    SHA256

    4bd233af4312a7a37d61fa54f6ac8acaba610d77d10377e74adc5e6435051e84

    SHA512

    3f8b7327e83e5a947b37ea7ade6dbfd3e72f54ebe6e581d2afeaf868fa6c43162dcc8bd7de9ecec644e29b4dbf9cdb35664c2dce85f759959f13f4b7da1f2470

  • C:\Windows\SysWOW64\cquusbhc.exe

    Filesize

    255KB

    MD5

    0ef400e0f33c6460b6a3635533cdb3ce

    SHA1

    5705bc0d09946f9f1143299df590bb96cc1e4425

    SHA256

    4bd233af4312a7a37d61fa54f6ac8acaba610d77d10377e74adc5e6435051e84

    SHA512

    3f8b7327e83e5a947b37ea7ade6dbfd3e72f54ebe6e581d2afeaf868fa6c43162dcc8bd7de9ecec644e29b4dbf9cdb35664c2dce85f759959f13f4b7da1f2470

  • C:\Windows\SysWOW64\lsmyexzdchaobvo.exe

    Filesize

    255KB

    MD5

    5b611fcc9f17b2bde3e14a630d93b45d

    SHA1

    26798af84a9f5cd370aea757a5c854796ea68b11

    SHA256

    365dcabebdaf61f526550ea8c7172b6d84b845d495ce04f03c08a38f29481b76

    SHA512

    3fab3703bf3fb4d9ec3975698272c8060eb60b23922af53b0dd1e73e9f9d202fa49cabbc666d3c5719c52ecb420a18e36ebbd72163a8d06edee4dabeefdcb254

  • C:\Windows\SysWOW64\lsmyexzdchaobvo.exe

    Filesize

    255KB

    MD5

    5b611fcc9f17b2bde3e14a630d93b45d

    SHA1

    26798af84a9f5cd370aea757a5c854796ea68b11

    SHA256

    365dcabebdaf61f526550ea8c7172b6d84b845d495ce04f03c08a38f29481b76

    SHA512

    3fab3703bf3fb4d9ec3975698272c8060eb60b23922af53b0dd1e73e9f9d202fa49cabbc666d3c5719c52ecb420a18e36ebbd72163a8d06edee4dabeefdcb254

  • C:\Windows\SysWOW64\rmxlnkdxah.exe

    Filesize

    255KB

    MD5

    600fcad0e3004242f2314cc61855a22e

    SHA1

    3f524d4a7a348a7fdc9ec3c7dcfd250f6a50e1e0

    SHA256

    0f663563e0e81c7b362a2f36208fa0985eb209dcf8012a5f7c484b0e662a0485

    SHA512

    9c0ae92e17cd1c8468a3c3d4af2dc9a61962e4d79a94af91a8745e7099e35f1f185f3522e6274dd872384fe7ff549d34e325fd6de2a46fbf7dde3a18e5b4d606

  • C:\Windows\SysWOW64\rmxlnkdxah.exe

    Filesize

    255KB

    MD5

    600fcad0e3004242f2314cc61855a22e

    SHA1

    3f524d4a7a348a7fdc9ec3c7dcfd250f6a50e1e0

    SHA256

    0f663563e0e81c7b362a2f36208fa0985eb209dcf8012a5f7c484b0e662a0485

    SHA512

    9c0ae92e17cd1c8468a3c3d4af2dc9a61962e4d79a94af91a8745e7099e35f1f185f3522e6274dd872384fe7ff549d34e325fd6de2a46fbf7dde3a18e5b4d606

  • C:\Windows\mydoc.rtf

    Filesize

    223B

    MD5

    06604e5941c126e2e7be02c5cd9f62ec

    SHA1

    4eb9fdf8ff4e1e539236002bd363b82c8f8930e1

    SHA256

    85f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2

    SHA512

    803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7

  • \??\c:\Users\Admin\AppData\Roaming\OpenStart.doc.exe

    Filesize

    255KB

    MD5

    08da51fc39d51f8bc61c604bc75fecce

    SHA1

    9cc6b3855a7a3809bf1551c9a1060e0c1abe220f

    SHA256

    0b8e0b1343b0fe490bcccd92a05b1ef0de2b2bf4731fb5ab7d57a5f4efea18c9

    SHA512

    721349db4e9b002bb4821903324804df7106cc211aa6fc682c01904fe456dd22aa8b021f187edf64eb943c1bd2ba8825467a60e9e9e88798cc0b093963f49790

  • \Windows\SysWOW64\bipkymzeznoay.exe

    Filesize

    255KB

    MD5

    d31f90f57102c1215d9d70529fe66522

    SHA1

    524c2561c8c58d20ecfc0d8e1d7866562df8efaf

    SHA256

    5bb7720573835e18424ee2e176caf54b2a2dabe6860f8f49d58fe04623ac4359

    SHA512

    15e7097c530d34b4683c48001edde22d13b8da11f87616fd8df634a36be12a1a3c9dea912c03bb163685bb3f74e7d24c87f23f70550a3487e748070e8e048e6c

  • \Windows\SysWOW64\bipkymzeznoay.exe

    Filesize

    255KB

    MD5

    d31f90f57102c1215d9d70529fe66522

    SHA1

    524c2561c8c58d20ecfc0d8e1d7866562df8efaf

    SHA256

    5bb7720573835e18424ee2e176caf54b2a2dabe6860f8f49d58fe04623ac4359

    SHA512

    15e7097c530d34b4683c48001edde22d13b8da11f87616fd8df634a36be12a1a3c9dea912c03bb163685bb3f74e7d24c87f23f70550a3487e748070e8e048e6c

  • \Windows\SysWOW64\cquusbhc.exe

    Filesize

    255KB

    MD5

    0ef400e0f33c6460b6a3635533cdb3ce

    SHA1

    5705bc0d09946f9f1143299df590bb96cc1e4425

    SHA256

    4bd233af4312a7a37d61fa54f6ac8acaba610d77d10377e74adc5e6435051e84

    SHA512

    3f8b7327e83e5a947b37ea7ade6dbfd3e72f54ebe6e581d2afeaf868fa6c43162dcc8bd7de9ecec644e29b4dbf9cdb35664c2dce85f759959f13f4b7da1f2470

  • \Windows\SysWOW64\cquusbhc.exe

    Filesize

    255KB

    MD5

    0ef400e0f33c6460b6a3635533cdb3ce

    SHA1

    5705bc0d09946f9f1143299df590bb96cc1e4425

    SHA256

    4bd233af4312a7a37d61fa54f6ac8acaba610d77d10377e74adc5e6435051e84

    SHA512

    3f8b7327e83e5a947b37ea7ade6dbfd3e72f54ebe6e581d2afeaf868fa6c43162dcc8bd7de9ecec644e29b4dbf9cdb35664c2dce85f759959f13f4b7da1f2470

  • \Windows\SysWOW64\lsmyexzdchaobvo.exe

    Filesize

    255KB

    MD5

    5b611fcc9f17b2bde3e14a630d93b45d

    SHA1

    26798af84a9f5cd370aea757a5c854796ea68b11

    SHA256

    365dcabebdaf61f526550ea8c7172b6d84b845d495ce04f03c08a38f29481b76

    SHA512

    3fab3703bf3fb4d9ec3975698272c8060eb60b23922af53b0dd1e73e9f9d202fa49cabbc666d3c5719c52ecb420a18e36ebbd72163a8d06edee4dabeefdcb254

  • \Windows\SysWOW64\rmxlnkdxah.exe

    Filesize

    255KB

    MD5

    600fcad0e3004242f2314cc61855a22e

    SHA1

    3f524d4a7a348a7fdc9ec3c7dcfd250f6a50e1e0

    SHA256

    0f663563e0e81c7b362a2f36208fa0985eb209dcf8012a5f7c484b0e662a0485

    SHA512

    9c0ae92e17cd1c8468a3c3d4af2dc9a61962e4d79a94af91a8745e7099e35f1f185f3522e6274dd872384fe7ff549d34e325fd6de2a46fbf7dde3a18e5b4d606

  • memory/552-80-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/552-109-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/800-118-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/800-93-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/800-115-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/808-117-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/808-82-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/808-107-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1004-92-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1004-114-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1516-91-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1516-113-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1720-79-0x00000000032F0000-0x0000000003390000-memory.dmp

    Filesize

    640KB

  • memory/1720-74-0x00000000032F0000-0x0000000003390000-memory.dmp

    Filesize

    640KB

  • memory/1720-54-0x00000000765B1000-0x00000000765B3000-memory.dmp

    Filesize

    8KB

  • memory/1720-71-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1720-81-0x00000000032F0000-0x0000000003390000-memory.dmp

    Filesize

    640KB

  • memory/1720-95-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/1972-96-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmp

    Filesize

    8KB

  • memory/1972-119-0x0000000002650000-0x0000000002660000-memory.dmp

    Filesize

    64KB

  • memory/1976-116-0x000000007146D000-0x0000000071478000-memory.dmp

    Filesize

    44KB

  • memory/1976-97-0x0000000072A01000-0x0000000072A04000-memory.dmp

    Filesize

    12KB

  • memory/1976-98-0x0000000070481000-0x0000000070483000-memory.dmp

    Filesize

    8KB

  • memory/1976-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1976-102-0x000000007146D000-0x0000000071478000-memory.dmp

    Filesize

    44KB

  • memory/2012-108-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB

  • memory/2012-78-0x0000000000400000-0x00000000004A0000-memory.dmp

    Filesize

    640KB