Analysis

  • max time kernel
    141s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2023 02:33

General

  • Target

    5ed392daaa42ef95bd7df6582454d30ab85dbd4d2b7f46ceb5d127f6e6367603.exe

  • Size

    1.5MB

  • MD5

    626a9092313eaaee518cf01fb4d4fd46

  • SHA1

    fbe5fea829104ed6e048bd494dcbfbc6c3ed9842

  • SHA256

    5ed392daaa42ef95bd7df6582454d30ab85dbd4d2b7f46ceb5d127f6e6367603

  • SHA512

    5b84e8c780d728c176e0612fad698c54f2b7199a09e9269a6bc997235444210dbc4983bd575d445aad076662d8caf7a43dd6e01c1e20674c1a5330b39ad24edf

  • SSDEEP

    24576:KyDbRh5v3Yf5WT1tZyGmMA8dkY6jsEpgI5kuxWL0CDa93T1tzTQIUfYFnCvH:Rvl6Wpt4Gh5kYamI5ku4LUT1hqqG

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ed392daaa42ef95bd7df6582454d30ab85dbd4d2b7f46ceb5d127f6e6367603.exe
    "C:\Users\Admin\AppData\Local\Temp\5ed392daaa42ef95bd7df6582454d30ab85dbd4d2b7f46ceb5d127f6e6367603.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1172
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2004
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1268

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
    Filesize

    1.3MB

    MD5

    1f10e8c1fe60db690126f8ac380a5011

    SHA1

    95136708c7b523ae45f9e2917f9a9cfaa7c527c3

    SHA256

    ee080f717bd10393d4a8f33bae8e17b1007119c0266e153bb8c253376db97d7b

    SHA512

    53fc5cbbf450df14d8d35b07c12ee253fddbbc7190cd8bc062427fa0468c272835157a4d525983c50706c1e6ffb33585cb5dcd7d263451b3da85cacafe494207

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
    Filesize

    1.3MB

    MD5

    1f10e8c1fe60db690126f8ac380a5011

    SHA1

    95136708c7b523ae45f9e2917f9a9cfaa7c527c3

    SHA256

    ee080f717bd10393d4a8f33bae8e17b1007119c0266e153bb8c253376db97d7b

    SHA512

    53fc5cbbf450df14d8d35b07c12ee253fddbbc7190cd8bc062427fa0468c272835157a4d525983c50706c1e6ffb33585cb5dcd7d263451b3da85cacafe494207

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
    Filesize

    871KB

    MD5

    104766d2040342d301574b4b5c9365f6

    SHA1

    1d0e7c28257eb75d0a6e76ac18bf6673d2338c6d

    SHA256

    1d4726cba19aed256c096039b60a4db5df83256c67a3302160d90a636c67c75e

    SHA512

    c4f357190b10bd01145cf2d84e9b90640af7f7322a4bf590c496cd15a1bcc17f36f2b2bcec046757f63d6a66c6aad0ef802213cd52911cb6428b552fce4c54c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
    Filesize

    871KB

    MD5

    104766d2040342d301574b4b5c9365f6

    SHA1

    1d0e7c28257eb75d0a6e76ac18bf6673d2338c6d

    SHA256

    1d4726cba19aed256c096039b60a4db5df83256c67a3302160d90a636c67c75e

    SHA512

    c4f357190b10bd01145cf2d84e9b90640af7f7322a4bf590c496cd15a1bcc17f36f2b2bcec046757f63d6a66c6aad0ef802213cd52911cb6428b552fce4c54c2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
    Filesize

    699KB

    MD5

    bbccc9a2034eed2de9727d4a17274dc6

    SHA1

    36b938c3d68c41d34170aaf98786c5468a717650

    SHA256

    3dda8a5eeef252ff43b708f124ec7e01f72bebce3f61117a7a5e1e261e40fd9d

    SHA512

    c37617755ed5de521c9fbf96d0faa239d721871147c9cdbda9873d33a33b63c4bf49516b96d30830a60fd6bbe5c5dfa503e932f7e7b12b7044b8950b7245b7f9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
    Filesize

    699KB

    MD5

    bbccc9a2034eed2de9727d4a17274dc6

    SHA1

    36b938c3d68c41d34170aaf98786c5468a717650

    SHA256

    3dda8a5eeef252ff43b708f124ec7e01f72bebce3f61117a7a5e1e261e40fd9d

    SHA512

    c37617755ed5de521c9fbf96d0faa239d721871147c9cdbda9873d33a33b63c4bf49516b96d30830a60fd6bbe5c5dfa503e932f7e7b12b7044b8950b7245b7f9

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
    Filesize

    300KB

    MD5

    ad154547639a11347321400148f3d47d

    SHA1

    6cdbe37faa9bf6243fd6973cbc23de7e7370acd3

    SHA256

    923bd42c3eb7dcc0bada3c513e1f6fb9b18325b1139a5e5c260b74c97a3f5225

    SHA512

    0f325de0b974216c0cd6f8102966e33507cda2935d6cc35826cefedeac954ec51db6907d0fc1feb7b5ae61b8665fdc0b9e01587e1ec174a744d7b19058b5577d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
    Filesize

    300KB

    MD5

    ad154547639a11347321400148f3d47d

    SHA1

    6cdbe37faa9bf6243fd6973cbc23de7e7370acd3

    SHA256

    923bd42c3eb7dcc0bada3c513e1f6fb9b18325b1139a5e5c260b74c97a3f5225

    SHA512

    0f325de0b974216c0cd6f8102966e33507cda2935d6cc35826cefedeac954ec51db6907d0fc1feb7b5ae61b8665fdc0b9e01587e1ec174a744d7b19058b5577d

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • C:\Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
    Filesize

    1.3MB

    MD5

    1f10e8c1fe60db690126f8ac380a5011

    SHA1

    95136708c7b523ae45f9e2917f9a9cfaa7c527c3

    SHA256

    ee080f717bd10393d4a8f33bae8e17b1007119c0266e153bb8c253376db97d7b

    SHA512

    53fc5cbbf450df14d8d35b07c12ee253fddbbc7190cd8bc062427fa0468c272835157a4d525983c50706c1e6ffb33585cb5dcd7d263451b3da85cacafe494207

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vm656421.exe
    Filesize

    1.3MB

    MD5

    1f10e8c1fe60db690126f8ac380a5011

    SHA1

    95136708c7b523ae45f9e2917f9a9cfaa7c527c3

    SHA256

    ee080f717bd10393d4a8f33bae8e17b1007119c0266e153bb8c253376db97d7b

    SHA512

    53fc5cbbf450df14d8d35b07c12ee253fddbbc7190cd8bc062427fa0468c272835157a4d525983c50706c1e6ffb33585cb5dcd7d263451b3da85cacafe494207

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
    Filesize

    871KB

    MD5

    104766d2040342d301574b4b5c9365f6

    SHA1

    1d0e7c28257eb75d0a6e76ac18bf6673d2338c6d

    SHA256

    1d4726cba19aed256c096039b60a4db5df83256c67a3302160d90a636c67c75e

    SHA512

    c4f357190b10bd01145cf2d84e9b90640af7f7322a4bf590c496cd15a1bcc17f36f2b2bcec046757f63d6a66c6aad0ef802213cd52911cb6428b552fce4c54c2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ou082700.exe
    Filesize

    871KB

    MD5

    104766d2040342d301574b4b5c9365f6

    SHA1

    1d0e7c28257eb75d0a6e76ac18bf6673d2338c6d

    SHA256

    1d4726cba19aed256c096039b60a4db5df83256c67a3302160d90a636c67c75e

    SHA512

    c4f357190b10bd01145cf2d84e9b90640af7f7322a4bf590c496cd15a1bcc17f36f2b2bcec046757f63d6a66c6aad0ef802213cd52911cb6428b552fce4c54c2

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
    Filesize

    699KB

    MD5

    bbccc9a2034eed2de9727d4a17274dc6

    SHA1

    36b938c3d68c41d34170aaf98786c5468a717650

    SHA256

    3dda8a5eeef252ff43b708f124ec7e01f72bebce3f61117a7a5e1e261e40fd9d

    SHA512

    c37617755ed5de521c9fbf96d0faa239d721871147c9cdbda9873d33a33b63c4bf49516b96d30830a60fd6bbe5c5dfa503e932f7e7b12b7044b8950b7245b7f9

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\Ng861369.exe
    Filesize

    699KB

    MD5

    bbccc9a2034eed2de9727d4a17274dc6

    SHA1

    36b938c3d68c41d34170aaf98786c5468a717650

    SHA256

    3dda8a5eeef252ff43b708f124ec7e01f72bebce3f61117a7a5e1e261e40fd9d

    SHA512

    c37617755ed5de521c9fbf96d0faa239d721871147c9cdbda9873d33a33b63c4bf49516b96d30830a60fd6bbe5c5dfa503e932f7e7b12b7044b8950b7245b7f9

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
    Filesize

    300KB

    MD5

    ad154547639a11347321400148f3d47d

    SHA1

    6cdbe37faa9bf6243fd6973cbc23de7e7370acd3

    SHA256

    923bd42c3eb7dcc0bada3c513e1f6fb9b18325b1139a5e5c260b74c97a3f5225

    SHA512

    0f325de0b974216c0cd6f8102966e33507cda2935d6cc35826cefedeac954ec51db6907d0fc1feb7b5ae61b8665fdc0b9e01587e1ec174a744d7b19058b5577d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\145245259.exe
    Filesize

    300KB

    MD5

    ad154547639a11347321400148f3d47d

    SHA1

    6cdbe37faa9bf6243fd6973cbc23de7e7370acd3

    SHA256

    923bd42c3eb7dcc0bada3c513e1f6fb9b18325b1139a5e5c260b74c97a3f5225

    SHA512

    0f325de0b974216c0cd6f8102966e33507cda2935d6cc35826cefedeac954ec51db6907d0fc1feb7b5ae61b8665fdc0b9e01587e1ec174a744d7b19058b5577d

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\291112808.exe
    Filesize

    478KB

    MD5

    b4139c53d5d1011b9247d181d685605a

    SHA1

    73c1422a6d800f951916104d7a7748a018f4fa4c

    SHA256

    4de3f77d94b87613a28c05b36f336eeae9ae74f3162c49f65979ea0a4ad38feb

    SHA512

    c65e23d0a2406e8516a1d15f6cd6c8350c7d5c2e068d273e495acba01ef2a462654958865a4e678509649768c5d4bf5f3832e0df1a58ff7ede7220e04eb6251e

  • \Windows\Temp\1.exe
    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • memory/1172-126-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-152-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-110-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-114-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-112-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-116-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-118-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-120-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-128-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-104-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-124-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-122-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-132-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-130-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-138-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-136-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-142-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-140-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-134-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-150-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-148-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-146-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-154-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-108-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-156-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-158-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-144-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-162-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-160-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-2227-0x0000000001FE0000-0x0000000001FEA000-memory.dmp
    Filesize

    40KB

  • memory/1172-106-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-102-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-100-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-99-0x0000000002200000-0x0000000002251000-memory.dmp
    Filesize

    324KB

  • memory/1172-98-0x0000000004B70000-0x0000000004BB0000-memory.dmp
    Filesize

    256KB

  • memory/1172-97-0x0000000004B70000-0x0000000004BB0000-memory.dmp
    Filesize

    256KB

  • memory/1172-96-0x0000000004B70000-0x0000000004BB0000-memory.dmp
    Filesize

    256KB

  • memory/1172-95-0x0000000002200000-0x0000000002256000-memory.dmp
    Filesize

    344KB

  • memory/1172-94-0x0000000001F70000-0x0000000001FC8000-memory.dmp
    Filesize

    352KB

  • memory/1268-2501-0x0000000000870000-0x00000000008BC000-memory.dmp
    Filesize

    304KB

  • memory/1268-2503-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1268-2507-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1268-2505-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/1268-2510-0x0000000004DC0000-0x0000000004E00000-memory.dmp
    Filesize

    256KB

  • memory/2004-2243-0x00000000008D0000-0x00000000008DA000-memory.dmp
    Filesize

    40KB