Analysis

  • max time kernel
    170s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 08:25

General

  • Target

    eefb7e6f07e9cc6b7a631250a9832a73d3341a5cd89a8c1a979ef9621c682de4.exe

  • Size

    4.9MB

  • MD5

    0f1c2db4971cb37da97ed6dff6f071b8

  • SHA1

    1a11434db84ab8189cca0e73c439ed862de17df0

  • SHA256

    eefb7e6f07e9cc6b7a631250a9832a73d3341a5cd89a8c1a979ef9621c682de4

  • SHA512

    7797adf05623c865710681f0b4572dbd39e30c996dbfe959b732c07fe646fc829c7004f94ff8884c1687b98863b84bb3c04573a87d95d9a627777c8f6a21d8fd

  • SSDEEP

    49152:TWpFbzP8NKERLbzZAbS+r8StQmMqRSYtPZOpiz+13zcQWQY0JxX3Sr:

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • HawkEye

    HawkEye is a malware kit that has seen continuous development since at least 2013.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eefb7e6f07e9cc6b7a631250a9832a73d3341a5cd89a8c1a979ef9621c682de4.exe
    "C:\Users\Admin\AppData\Local\Temp\eefb7e6f07e9cc6b7a631250a9832a73d3341a5cd89a8c1a979ef9621c682de4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      "C:\Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:756
    • C:\Users\Admin\AppData\Local\Temp\shit1.exe
      "C:\Users\Admin\AppData\Local\Temp\shit1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:268
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:780
        • C:\Users\Admin\AppData\Local\Temp\svchost.exe
          C:\Users\Admin\AppData\Local\Temp\svchost.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1080
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\svchost.exe" +s +h
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1524
            • C:\Windows\SysWOW64\attrib.exe
              attrib "C:\Users\Admin\AppData\Local\Temp\svchost.exe" +s +h
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:1056
        • C:\Users\Admin\AppData\Local\Temp\System\audidgi.exe
          C:\Users\Admin\AppData\Local\Temp\System\audidgi.exe
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1096
          • C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
            C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1332
            • C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
              C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
              6⤵
                PID:1528

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Hidden Files and Directories

    2
    T1158

    Defense Evasion

    Modify Registry

    2
    T1112

    Hidden Files and Directories

    2
    T1158

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      Filesize

      3.3MB

      MD5

      c71ec4e7e42f810231ffaf2643484ecd

      SHA1

      dca40605bc151e66d6e4defb29aef1d2ced08b23

      SHA256

      1bc6921b6cd30f7df4a8d66014d7b10aa3f6d1ae33135fd60761e595a1539da3

      SHA512

      b6785786603531e023a1025a5c82056c17516c37d742136abe63c526e1b8da7b416b786b209f14f2d493500f3fc45f69814cb0a8af91e98eb67d02ebc5a0f160

    • C:\Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      Filesize

      3.3MB

      MD5

      c71ec4e7e42f810231ffaf2643484ecd

      SHA1

      dca40605bc151e66d6e4defb29aef1d2ced08b23

      SHA256

      1bc6921b6cd30f7df4a8d66014d7b10aa3f6d1ae33135fd60761e595a1539da3

      SHA512

      b6785786603531e023a1025a5c82056c17516c37d742136abe63c526e1b8da7b416b786b209f14f2d493500f3fc45f69814cb0a8af91e98eb67d02ebc5a0f160

    • C:\Users\Admin\AppData\Local\Temp\SysInfo.txt
      Filesize

      43B

      MD5

      b0286a1c04471719f24882f7ed58fd57

      SHA1

      7551ded53321d4a3b7a79a806881464ffef2495f

      SHA256

      698a4c31ef1fcbb33b9138c0da62cc91771e03610170dcabbfc983fb30e2626d

      SHA512

      1892d5703c8326b7ae56c6c5935fcbf83adbe0c586cb1fa9b61e10144e251aa1cacdfcb6be42261855b58bfe401ac3cadfbf4a796fe7fa2d606a177574aaf5db

    • C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\System\audidgi.exe
      Filesize

      8KB

      MD5

      514efe550078fbedb88e23774742e295

      SHA1

      971bcc5648e1a70ef6a9a7c909663d2e01a31473

      SHA256

      673528eae87d1f48f9a8238de868e8f44aa92575744259a7a3e8b5ac34ca9ca2

      SHA512

      b952bd54f348b7d39b1a2f2a322068d31a4837988aceb09821bd6f54216f79f356868497b44f17e060e3fc6c5b130caaf247a64dc0bb49569ba4b8472cf34451

    • C:\Users\Admin\AppData\Local\Temp\System\audidgi.exe
      Filesize

      8KB

      MD5

      514efe550078fbedb88e23774742e295

      SHA1

      971bcc5648e1a70ef6a9a7c909663d2e01a31473

      SHA256

      673528eae87d1f48f9a8238de868e8f44aa92575744259a7a3e8b5ac34ca9ca2

      SHA512

      b952bd54f348b7d39b1a2f2a322068d31a4837988aceb09821bd6f54216f79f356868497b44f17e060e3fc6c5b130caaf247a64dc0bb49569ba4b8472cf34451

    • C:\Users\Admin\AppData\Local\Temp\shit1.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\shit1.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      Filesize

      3.3MB

      MD5

      c71ec4e7e42f810231ffaf2643484ecd

      SHA1

      dca40605bc151e66d6e4defb29aef1d2ced08b23

      SHA256

      1bc6921b6cd30f7df4a8d66014d7b10aa3f6d1ae33135fd60761e595a1539da3

      SHA512

      b6785786603531e023a1025a5c82056c17516c37d742136abe63c526e1b8da7b416b786b209f14f2d493500f3fc45f69814cb0a8af91e98eb67d02ebc5a0f160

    • \Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      Filesize

      3.3MB

      MD5

      c71ec4e7e42f810231ffaf2643484ecd

      SHA1

      dca40605bc151e66d6e4defb29aef1d2ced08b23

      SHA256

      1bc6921b6cd30f7df4a8d66014d7b10aa3f6d1ae33135fd60761e595a1539da3

      SHA512

      b6785786603531e023a1025a5c82056c17516c37d742136abe63c526e1b8da7b416b786b209f14f2d493500f3fc45f69814cb0a8af91e98eb67d02ebc5a0f160

    • \Users\Admin\AppData\Local\Temp\HMA-Pro-VPN-2.6.6-install.exe
      Filesize

      3.3MB

      MD5

      c71ec4e7e42f810231ffaf2643484ecd

      SHA1

      dca40605bc151e66d6e4defb29aef1d2ced08b23

      SHA256

      1bc6921b6cd30f7df4a8d66014d7b10aa3f6d1ae33135fd60761e595a1539da3

      SHA512

      b6785786603531e023a1025a5c82056c17516c37d742136abe63c526e1b8da7b416b786b209f14f2d493500f3fc45f69814cb0a8af91e98eb67d02ebc5a0f160

    • \Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\System\WmiPrwSE.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\System\audidgi.exe
      Filesize

      8KB

      MD5

      514efe550078fbedb88e23774742e295

      SHA1

      971bcc5648e1a70ef6a9a7c909663d2e01a31473

      SHA256

      673528eae87d1f48f9a8238de868e8f44aa92575744259a7a3e8b5ac34ca9ca2

      SHA512

      b952bd54f348b7d39b1a2f2a322068d31a4837988aceb09821bd6f54216f79f356868497b44f17e060e3fc6c5b130caaf247a64dc0bb49569ba4b8472cf34451

    • \Users\Admin\AppData\Local\Temp\nstC14E.tmp\InstallOptions.dll
      Filesize

      14KB

      MD5

      325b008aec81e5aaa57096f05d4212b5

      SHA1

      27a2d89747a20305b6518438eff5b9f57f7df5c3

      SHA256

      c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

      SHA512

      18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

    • \Users\Admin\AppData\Local\Temp\nstC14E.tmp\System.dll
      Filesize

      11KB

      MD5

      c17103ae9072a06da581dec998343fc1

      SHA1

      b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

      SHA256

      dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

      SHA512

      d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

    • \Users\Admin\AppData\Local\Temp\nstC14E.tmp\UserInfo.dll
      Filesize

      4KB

      MD5

      7579ade7ae1747a31960a228ce02e666

      SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

      SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

      SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

    • \Users\Admin\AppData\Local\Temp\nstC14E.tmp\UserInfo.dll
      Filesize

      4KB

      MD5

      7579ade7ae1747a31960a228ce02e666

      SHA1

      8ec8571a296737e819dcf86353a43fcf8ec63351

      SHA256

      564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

      SHA512

      a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • \Users\Admin\AppData\Local\Temp\svchost.exe
      Filesize

      282KB

      MD5

      777832f3251ed4ada9f6ba4f63ac82c5

      SHA1

      4f15d60c9139150376683cd940d590432980dd07

      SHA256

      85f366402734f34f39c1e759d56ce9365a2e59d77708ef70f3ade4c5f601a9d1

      SHA512

      8ba6d92d654312d9c322cd42be987c90ac2de28b3890989eabc8f59e9b207beb1eb1de8dc3d5e066d2dc33826e22b8338d1bd8a15463519180ee40f11c21d7a2

    • memory/268-79-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/268-60-0x0000000000000000-mapping.dmp
    • memory/756-58-0x00000000757E1000-0x00000000757E3000-memory.dmp
      Filesize

      8KB

    • memory/756-56-0x0000000000000000-mapping.dmp
    • memory/780-80-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/780-110-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/780-73-0x0000000000000000-mapping.dmp
    • memory/1056-109-0x0000000000000000-mapping.dmp
    • memory/1080-87-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-107-0x000000000047C000-0x00000000004B7000-memory.dmp
      Filesize

      236KB

    • memory/1080-113-0x000000000047C000-0x00000000004B7000-memory.dmp
      Filesize

      236KB

    • memory/1080-91-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-88-0x00000000004B67B0-mapping.dmp
    • memory/1080-83-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-86-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-100-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-102-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-103-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1080-84-0x0000000000400000-0x00000000004B8000-memory.dmp
      Filesize

      736KB

    • memory/1096-105-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/1096-92-0x0000000000000000-mapping.dmp
    • memory/1096-111-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/1332-106-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/1332-98-0x0000000000000000-mapping.dmp
    • memory/1332-112-0x0000000073D90000-0x000000007433B000-memory.dmp
      Filesize

      5.7MB

    • memory/1504-55-0x000007FEFB8A1000-0x000007FEFB8A3000-memory.dmp
      Filesize

      8KB

    • memory/1504-54-0x000007FEF3E70000-0x000007FEF4893000-memory.dmp
      Filesize

      10.1MB

    • memory/1524-108-0x0000000000000000-mapping.dmp