Analysis

  • max time kernel
    159s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 21:33

General

  • Target

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71.exe

  • Size

    68KB

  • MD5

    ee5efe8092f313535790ce2105e7188a

  • SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

  • SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

  • SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • SSDEEP

    768:+RImfYdewbz6GUHNdCdbUC0i0VPfDm0T71nDLZElEF3i9ASULR41OtLeFF16jNQH:+RImfYdeRQon2QwmphdJ+HJuM

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 20 IoCs
  • Adds Run key to start application 2 TTPs 20 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71.exe
    "C:\Users\Admin\AppData\Local\Temp\b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\WINDOWS\svchost.exe
      C:\WINDOWS\svchost.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\WINDOWS\svchost.exe
        C:\WINDOWS\svchost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1536
      • C:\WINDOWS\lsass.exe
        C:\WINDOWS\lsass.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3772
        • C:\WINDOWS\svchost.exe
          C:\WINDOWS\svchost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2952
        • C:\WINDOWS\lsass.exe
          C:\WINDOWS\lsass.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1092
        • C:\WINDOWS\csrss.exe
          C:\WINDOWS\csrss.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\WINDOWS\svchost.exe
            C:\WINDOWS\svchost.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:5040
          • C:\WINDOWS\lsass.exe
            C:\WINDOWS\lsass.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:176
          • C:\WINDOWS\csrss.exe
            C:\WINDOWS\csrss.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2716
          • C:\Windows\SysWOW64\service.exe
            C:\Windows\system32\\service.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3512
            • C:\WINDOWS\svchost.exe
              C:\WINDOWS\svchost.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3496
            • C:\WINDOWS\lsass.exe
              C:\WINDOWS\lsass.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:4692
            • C:\WINDOWS\csrss.exe
              C:\WINDOWS\csrss.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1916
            • C:\Windows\SysWOW64\service.exe
              C:\Windows\system32\\service.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2692
        • C:\Windows\SysWOW64\service.exe
          C:\Windows\system32\\service.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2152
      • C:\WINDOWS\csrss.exe
        C:\WINDOWS\csrss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3232
      • C:\Windows\SysWOW64\service.exe
        C:\Windows\system32\\service.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4576
    • C:\WINDOWS\lsass.exe
      C:\WINDOWS\lsass.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4464
    • C:\WINDOWS\csrss.exe
      C:\WINDOWS\csrss.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3336
    • C:\Windows\SysWOW64\service.exe
      C:\Windows\system32\\service.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\WINDOWS\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\WINDOWS\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\WINDOWS\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\SysWOW64\service.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\csrss.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\lsass.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • C:\Windows\svchost.exe

    Filesize

    68KB

    MD5

    ee5efe8092f313535790ce2105e7188a

    SHA1

    8a3f3d18d247b87034b562e5554e030867e6afc5

    SHA256

    b25da798c598034e21ab485219ba8eb0bd1aa90ef05569c0ad9375f8dce2cd71

    SHA512

    5d41de036f05c1eab717bbdfcccacecdb5cdedafcfb42f02001f21e80dbc5380a6fc4d21ddf8848e3fd27e40ed140773cb93ffcaccd16068dde6a8d5171fcb6d

  • memory/176-172-0x0000000000000000-mapping.dmp

  • memory/176-179-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1092-158-0x0000000000000000-mapping.dmp

  • memory/1092-163-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1536-150-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1536-148-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1536-143-0x0000000000000000-mapping.dmp

  • memory/1916-205-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1916-200-0x0000000000000000-mapping.dmp

  • memory/2152-216-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2152-210-0x0000000000000000-mapping.dmp

  • memory/2692-209-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2692-204-0x0000000000000000-mapping.dmp

  • memory/2716-177-0x0000000000000000-mapping.dmp

  • memory/2716-182-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2952-154-0x0000000000000000-mapping.dmp

  • memory/2952-160-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3232-217-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3232-214-0x0000000000000000-mapping.dmp

  • memory/3284-147-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3284-241-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3284-135-0x0000000000000000-mapping.dmp

  • memory/3336-230-0x0000000000000000-mapping.dmp

  • memory/3336-234-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3496-196-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3496-190-0x0000000000000000-mapping.dmp

  • memory/3504-235-0x0000000000000000-mapping.dmp

  • memory/3504-239-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3512-244-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3512-183-0x0000000000000000-mapping.dmp

  • memory/3512-189-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3540-132-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3540-240-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3772-187-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/3772-149-0x0000000000000000-mapping.dmp

  • memory/3772-242-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4380-164-0x0000000000000000-mapping.dmp

  • memory/4380-188-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4380-243-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4464-224-0x0000000000000000-mapping.dmp

  • memory/4464-229-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4576-226-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4576-220-0x0000000000000000-mapping.dmp

  • memory/4692-199-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4692-194-0x0000000000000000-mapping.dmp

  • memory/5040-168-0x0000000000000000-mapping.dmp

  • memory/5040-174-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB