Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 12:27
Static task
static1
Behavioral task
behavioral1
Sample
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe
Resource
win7-20220812-en
General
-
Target
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe
-
Size
119KB
-
MD5
6a28e5d59704120b1fed4a972d7ad56e
-
SHA1
e3dba778f11929b8616e45f2028b59052931e4cd
-
SHA256
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
-
SHA512
28d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
SSDEEP
1536:pgZut8Y0mh2VAaasBMfjrzpGUqVKpkhzRMecpqx+cnzkZ/qGjtc6B73Gdp+tIVRl:pQut/dzzpfqukhzvHkZ/qovBjG6gRl
Malware Config
Extracted
xtremerat
tsw.no-ip.biz
Signatures
-
Detect XtremeRAT payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1188-69-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-70-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-72-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-74-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-76-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-77-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/1188-73-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-79-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1188-81-0x0000000010000000-0x000000001004A000-memory.dmp family_xtremerat behavioral1/memory/1072-102-0x000000001000D0F4-mapping.dmp family_xtremerat behavioral1/memory/1072-107-0x0000000010001000-0x000000001000E000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
audioadg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run audioadg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audioadg.exe" audioadg.exe -
Executes dropped EXE 5 IoCs
Processes:
explorer.exeexplorer.exeaudioadg.exeWmiprwsd.exeWmiprwsd.exepid process 984 explorer.exe 1188 explorer.exe 1792 audioadg.exe 384 Wmiprwsd.exe 1072 Wmiprwsd.exe -
Deletes itself 1 IoCs
Processes:
explorer.exepid process 984 explorer.exe -
Loads dropped DLL 6 IoCs
Processes:
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exeexplorer.exeaudioadg.exeWmiprwsd.exepid process 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe 984 explorer.exe 1792 audioadg.exe 1792 audioadg.exe 384 Wmiprwsd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
audioadg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\System\\audioadg.exe" audioadg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
explorer.exeWmiprwsd.exedescription pid process target process PID 984 set thread context of 1188 984 explorer.exe explorer.exe PID 384 set thread context of 1072 384 Wmiprwsd.exe Wmiprwsd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
explorer.exeaudioadg.exeWmiprwsd.exepid process 984 explorer.exe 1792 audioadg.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe 384 Wmiprwsd.exe 1792 audioadg.exe 984 explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exeexplorer.exeaudioadg.exeWmiprwsd.exedescription pid process Token: SeDebugPrivilege 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe Token: SeDebugPrivilege 984 explorer.exe Token: SeDebugPrivilege 1792 audioadg.exe Token: SeDebugPrivilege 384 Wmiprwsd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
explorer.exepid process 1188 explorer.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exeexplorer.exeaudioadg.exeWmiprwsd.exedescription pid process target process PID 1720 wrote to memory of 984 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe explorer.exe PID 1720 wrote to memory of 984 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe explorer.exe PID 1720 wrote to memory of 984 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe explorer.exe PID 1720 wrote to memory of 984 1720 91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1188 984 explorer.exe explorer.exe PID 984 wrote to memory of 1792 984 explorer.exe audioadg.exe PID 984 wrote to memory of 1792 984 explorer.exe audioadg.exe PID 984 wrote to memory of 1792 984 explorer.exe audioadg.exe PID 984 wrote to memory of 1792 984 explorer.exe audioadg.exe PID 1792 wrote to memory of 384 1792 audioadg.exe Wmiprwsd.exe PID 1792 wrote to memory of 384 1792 audioadg.exe Wmiprwsd.exe PID 1792 wrote to memory of 384 1792 audioadg.exe Wmiprwsd.exe PID 1792 wrote to memory of 384 1792 audioadg.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe PID 384 wrote to memory of 1072 384 Wmiprwsd.exe Wmiprwsd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe"C:\Users\Admin\AppData\Local\Temp\91c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe"C:\Users\Admin\AppData\Local\Temp\System\audioadg.exe"3⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeC:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeC:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exe5⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\SysInfo.txtFilesize
102B
MD58904b1262dd68fb84b689fc763abdd2a
SHA1ccfda0d01fc656fbe3e356d7c24c1c25422ff9aa
SHA2561c5a7073fb1eb3988a6ef165e2fa49df1d0096e251987abcd9d32d1aa65db821
SHA5125552c83c38d045952d2b690b06e9d6abea48f8e8b451e3f9eac9737d8c1f3bca75c4449e1766c77ff12f1cc56adf04cf86fc168716ef747f8f65e5940f8066a9
-
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
C:\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
C:\Users\Admin\AppData\Local\Temp\System\audioadg.exeFilesize
11KB
MD51f9234338e847b29201862570c2a2a93
SHA18ed760481ce31b5d46ea85c9a44e8a3087dd2026
SHA2565ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7
SHA51254ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65
-
C:\Users\Admin\AppData\Local\Temp\System\audioadg.exeFilesize
11KB
MD51f9234338e847b29201862570c2a2a93
SHA18ed760481ce31b5d46ea85c9a44e8a3087dd2026
SHA2565ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7
SHA51254ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
\Users\Admin\AppData\Local\Temp\System\Wmiprwsd.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
\Users\Admin\AppData\Local\Temp\System\audioadg.exeFilesize
11KB
MD51f9234338e847b29201862570c2a2a93
SHA18ed760481ce31b5d46ea85c9a44e8a3087dd2026
SHA2565ce7899fc7539800b70a5e90254cf5b087f955f33bf30da909611e1ff9b009b7
SHA51254ba3dff6d448a6f8298f3f58b0ef085a15a9e829ae54cd85c8643168314f9ccdb206a7ca0ceb82951b3d04d6b7134662c3c382304942d3caeee15267520ef65
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exeFilesize
119KB
MD56a28e5d59704120b1fed4a972d7ad56e
SHA1e3dba778f11929b8616e45f2028b59052931e4cd
SHA25691c3880df0e705b267c198f4f15ba593a67db1f590f768e0b5b6176d3ce91b15
SHA51228d5a459224f22415ff161bd639327a5af040ac023ef0d8d0d73789f1d793dc1b1f436f5be149882a04364d7556a0c3ed17a7bc7e92b38464e6d8ed6f6bb3c85
-
memory/384-109-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/384-88-0x0000000000000000-mapping.dmp
-
memory/384-112-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/984-71-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/984-58-0x0000000000000000-mapping.dmp
-
memory/984-110-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1072-102-0x000000001000D0F4-mapping.dmp
-
memory/1072-107-0x0000000010001000-0x000000001000E000-memory.dmpFilesize
52KB
-
memory/1188-72-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-81-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-79-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-73-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-77-0x000000001000D0F4-mapping.dmp
-
memory/1188-76-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-74-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-70-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-69-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-67-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1188-66-0x0000000010000000-0x000000001004A000-memory.dmpFilesize
296KB
-
memory/1720-55-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1720-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmpFilesize
8KB
-
memory/1720-64-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1792-108-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB
-
memory/1792-83-0x0000000000000000-mapping.dmp
-
memory/1792-111-0x00000000744F0000-0x0000000074A9B000-memory.dmpFilesize
5.7MB