Malware Analysis Report

2025-06-15 21:44

Sample ID 230411-zwjtaafd65
Target AnyDesk (DROPSY).exe
SHA256 f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e
Tags
agilenet
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

f0c95b09ead49d1fe42e25f6d4f8bbcd3492d28c8f508e45e59feb31f4011c3e

Threat Level: Shows suspicious behavior

The file AnyDesk (DROPSY).exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

agilenet

Loads dropped DLL

Obfuscated with Agile.Net obfuscator

Checks SCSI registry key(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-04-11 21:04

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-04-11 21:04

Reported

2023-04-11 21:05

Platform

win10v2004-20230220-en

Max time kernel

64s

Max time network

76s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /0

Network

Country Destination Domain Proto
US 8.8.8.8:53 176.122.125.40.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 assets.msn.com udp
NL 23.73.0.161:443 assets.msn.com tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 161.0.73.23.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 240.232.229.192.in-addr.arpa udp
US 20.42.73.24:443 tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 45.8.109.52.in-addr.arpa udp

Files

memory/3716-133-0x0000000000D60000-0x00000000015D0000-memory.dmp

memory/3716-134-0x00000000075A0000-0x0000000007B44000-memory.dmp

memory/3716-135-0x0000000005CF0000-0x0000000005D82000-memory.dmp

memory/3716-136-0x000000000A200000-0x000000000A210000-memory.dmp

memory/3716-137-0x0000000005D90000-0x0000000005D9A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/3716-145-0x00000000731D0000-0x0000000073259000-memory.dmp

memory/3716-146-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-147-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-149-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-151-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-153-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-155-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-157-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-159-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-161-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-163-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-165-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-167-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-169-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-171-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-173-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-175-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-177-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-179-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-181-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-183-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-185-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-187-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-189-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-191-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-193-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-195-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-197-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-199-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-201-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-203-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-205-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-207-0x0000000007100000-0x0000000007335000-memory.dmp

memory/3716-340-0x000000000A200000-0x000000000A210000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-04-11 21:04

Reported

2023-04-11 21:06

Platform

win7-20230220-en

Max time kernel

151s

Max time network

34s

Command Line

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe

"C:\Users\Admin\AppData\Local\Temp\AnyDesk (DROPSY).exe"

Network

N/A

Files

memory/1360-54-0x00000000005E0000-0x0000000000E50000-memory.dmp

memory/1360-55-0x0000000009A80000-0x0000000009AC0000-memory.dmp

memory/1360-56-0x00000000053C0000-0x0000000005604000-memory.dmp

memory/1360-57-0x00000000067A0000-0x00000000069DA000-memory.dmp

memory/1360-58-0x0000000000FF0000-0x0000000001000000-memory.dmp

memory/1360-59-0x0000000006600000-0x00000000066C8000-memory.dmp

\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

C:\Users\Admin\AppData\Local\Temp\ba012cba-2679-4da3-a26b-788d51617354\AgileDotNetRT.dll

MD5 14ff402962ad21b78ae0b4c43cd1f194
SHA1 f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256 fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512 daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b

memory/1360-66-0x0000000074610000-0x0000000074690000-memory.dmp

memory/1360-67-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-68-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-70-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-72-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-74-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-76-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-78-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-80-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-82-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-84-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-86-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-88-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-90-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-92-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-94-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-96-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-98-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-100-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-102-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-104-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-106-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-108-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-110-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-112-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-114-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-116-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-118-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-120-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-122-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-124-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-126-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-128-0x00000000067A0000-0x00000000069D5000-memory.dmp

memory/1360-571-0x0000000009A80000-0x0000000009AC0000-memory.dmp