Analysis

  • max time kernel
    192s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 05:33

General

  • Target

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe

  • Size

    504KB

  • MD5

    be3d13f691e348661f833cb0887884db

  • SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

  • SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

  • SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • SSDEEP

    12288:22iwn/ND7S3xI66S/H3UyKxWn2hJ+MRmhhhCX:2213Sed0XjhkX

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 13 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 54 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Drops file in System32 directory 21 IoCs
  • Drops file in Windows directory 21 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe
    "C:\Users\Admin\AppData\Local\Temp\edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe
      "C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe" "c:\users\admin\appdata\local\temp\edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4468
      • C:\Users\Admin\AppData\Local\Temp\xikwben.exe
        "C:\Users\Admin\AppData\Local\Temp\xikwben.exe" "-c:\users\admin\appdata\local\temp\edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2664
      • C:\Users\Admin\AppData\Local\Temp\xikwben.exe
        "C:\Users\Admin\AppData\Local\Temp\xikwben.exe" "-c:\users\admin\appdata\local\temp\edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:2300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dykgvibpnxxfeivuk.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\kixwoearsfitvcsunvge.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\mivsiwqfepqzzessjp.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\qqhicuslodivziaezjwwno.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\wqbwkwobyhgnloay.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\xikwben.exe

    Filesize

    700KB

    MD5

    0d69d41ad3facdf8f42afb5bbc41a1f0

    SHA1

    3a48a15d638a03c2bfb8b771649b25bcddb62bac

    SHA256

    265c1129be8ef94cdf1200a9f3b441a1624f1a4332cf5778eba3b0b5f7afed94

    SHA512

    4427f4ce2de9f3c529161e087d8492ba3b46a738138cdbd0aacf11e65dfae2e511380b0dd42d1aa01c20ad952aea235ec28b92f9aef9fd2194d7c1a3418d249a

  • C:\Users\Admin\AppData\Local\Temp\xikwben.exe

    Filesize

    700KB

    MD5

    0d69d41ad3facdf8f42afb5bbc41a1f0

    SHA1

    3a48a15d638a03c2bfb8b771649b25bcddb62bac

    SHA256

    265c1129be8ef94cdf1200a9f3b441a1624f1a4332cf5778eba3b0b5f7afed94

    SHA512

    4427f4ce2de9f3c529161e087d8492ba3b46a738138cdbd0aacf11e65dfae2e511380b0dd42d1aa01c20ad952aea235ec28b92f9aef9fd2194d7c1a3418d249a

  • C:\Users\Admin\AppData\Local\Temp\xikwben.exe

    Filesize

    700KB

    MD5

    0d69d41ad3facdf8f42afb5bbc41a1f0

    SHA1

    3a48a15d638a03c2bfb8b771649b25bcddb62bac

    SHA256

    265c1129be8ef94cdf1200a9f3b441a1624f1a4332cf5778eba3b0b5f7afed94

    SHA512

    4427f4ce2de9f3c529161e087d8492ba3b46a738138cdbd0aacf11e65dfae2e511380b0dd42d1aa01c20ad952aea235ec28b92f9aef9fd2194d7c1a3418d249a

  • C:\Users\Admin\AppData\Local\Temp\xuigxmhxxjlvwcrskrb.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe

    Filesize

    320KB

    MD5

    ec8193ceb304277269b76922ebc9a288

    SHA1

    c858acaaa65efa7eb1926777f9d7c2347f25d1ac

    SHA256

    3f7872146be0cd218fb35a1c21288ddec6b600f4d9fb32689e9eeddda9565952

    SHA512

    29276691be89b7bc08b48427acb804143aea808c90b5ee6680af95d42d4a5596918401c30c62ef64f3809d5b4fa93b4ca69c9218c9037f8d7f4c74499b060529

  • C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe

    Filesize

    320KB

    MD5

    ec8193ceb304277269b76922ebc9a288

    SHA1

    c858acaaa65efa7eb1926777f9d7c2347f25d1ac

    SHA256

    3f7872146be0cd218fb35a1c21288ddec6b600f4d9fb32689e9eeddda9565952

    SHA512

    29276691be89b7bc08b48427acb804143aea808c90b5ee6680af95d42d4a5596918401c30c62ef64f3809d5b4fa93b4ca69c9218c9037f8d7f4c74499b060529

  • C:\Users\Admin\AppData\Local\Temp\zyoohyvnpdhtwevysbnmc.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\dykgvibpnxxfeivuk.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\kixwoearsfitvcsunvge.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\mivsiwqfepqzzessjp.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\qqhicuslodivziaezjwwno.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\wqbwkwobyhgnloay.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\xuigxmhxxjlvwcrskrb.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\SysWOW64\zyoohyvnpdhtwevysbnmc.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\dykgvibpnxxfeivuk.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\dykgvibpnxxfeivuk.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\kixwoearsfitvcsunvge.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\kixwoearsfitvcsunvge.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\mivsiwqfepqzzessjp.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\mivsiwqfepqzzessjp.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\qqhicuslodivziaezjwwno.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\qqhicuslodivziaezjwwno.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\wqbwkwobyhgnloay.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\wqbwkwobyhgnloay.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\xuigxmhxxjlvwcrskrb.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\xuigxmhxxjlvwcrskrb.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\zyoohyvnpdhtwevysbnmc.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • C:\Windows\zyoohyvnpdhtwevysbnmc.exe

    Filesize

    504KB

    MD5

    be3d13f691e348661f833cb0887884db

    SHA1

    5af090e88891dfadf6a78a7c2caef9cd5875c3d0

    SHA256

    edc35736d57f8f3b025ba64cb94f85123b62b73c3dd795df6235edc8f47d00ab

    SHA512

    fadcd7e4d7c76803dbe22f2110ac89ceeab56ffb25b0f78bd8c94d63759f0e7f89036197791d3b3ad0bd9b87ee700ee504c304e01227b97aa86b41037bb2c91a

  • memory/4992-133-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/4992-132-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB