Analysis

  • max time kernel
    165s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2023 17:09

General

  • Target

    https://pixeldrain.com/u/nNz5zRSr

Score
10/10

Malware Config

Signatures

  • Detects Eternity stealer 8 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Program crash 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://pixeldrain.com/u/nNz5zRSr
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3844
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3844 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2356
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 460 -p 4844 -ip 4844
    1⤵
      PID:5096
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4844 -s 1752
      1⤵
      • Program crash
      PID:4552
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3632
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Eternity.rar"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1428
        • C:\Users\Admin\AppData\Local\Temp\7zO49518FE7\Eternity.exe
          "C:\Users\Admin\AppData\Local\Temp\7zO49518FE7\Eternity.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Users\Admin\AppData\Local\Temp\dcd.exe
            "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
            4⤵
            • Executes dropped EXE
            PID:496
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 5008 -s 1968
            4⤵
            • Program crash
            PID:2788
        • C:\Users\Admin\AppData\Local\Temp\7zO495DBCD7\Eternity.exe
          "C:\Users\Admin\AppData\Local\Temp\7zO495DBCD7\Eternity.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5096
          • C:\Users\Admin\AppData\Local\Temp\dcd.exe
            "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
            4⤵
            • Executes dropped EXE
            PID:984
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 5096 -s 1956
            4⤵
            • Program crash
            PID:3244
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 180 -p 5008 -ip 5008
      1⤵
        PID:408
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 416 -p 5096 -ip 5096
        1⤵
          PID:4844

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

          Filesize

          1KB

          MD5

          42e493532601b859a82b8934e5a4e0ee

          SHA1

          9f4f6edf5d1698f96da6f3c6739842cf5a309584

          SHA256

          b08ae431053c136eca72d66af5c32a71df51508211b361b01c46f2f92fec19e4

          SHA512

          229c71b235b88dea46ad453b52759f4f638e360b6376cdc16a25740df639c3a58b7be280c2508acffd2de3d23ff79b639d83aa72839cf4eccb40be0c86efdf76

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\q7s3h6i\imagestore.dat

          Filesize

          2KB

          MD5

          07e716174489efa16687941748fb6db9

          SHA1

          8f9292d4e763f9d5274c8c5399eb5739daee5da3

          SHA256

          dec76a85dcda099e67f6165b413242d68e04a2a29ea116a83b2eab7e997719e6

          SHA512

          903353cf1aafad0273296b8276e2bc805d3f63afbccca529887f00a0d586cf2e2f1af9821c52d32888dcf1a93090f2e2e6e28585c61a2a6bddcf8ed6e8d4e9ac

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

          Filesize

          28KB

          MD5

          ae1b7041bc1ae85a18f358a0f6144469

          SHA1

          e65bbe398a1326d2ead6be2918d00cf6cc8e0435

          SHA256

          1fe9215357e5c86aa3a98ca8b86a197884b577bad442d9aaf093bc798eaa4e02

          SHA512

          7e0a2e2f4a73b7cfc50c4c460ab2c9412a041aee11594ba561ca68121f1154f0dbca3bd2bb12d484fdbea2c206f06370cba333bf41ffd6bd02f20effbda16dac

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

          Filesize

          28KB

          MD5

          ae1b7041bc1ae85a18f358a0f6144469

          SHA1

          e65bbe398a1326d2ead6be2918d00cf6cc8e0435

          SHA256

          1fe9215357e5c86aa3a98ca8b86a197884b577bad442d9aaf093bc798eaa4e02

          SHA512

          7e0a2e2f4a73b7cfc50c4c460ab2c9412a041aee11594ba561ca68121f1154f0dbca3bd2bb12d484fdbea2c206f06370cba333bf41ffd6bd02f20effbda16dac

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BMP3ERH\analytics[1].js

          Filesize

          50KB

          MD5

          4507839525a19180914799b08fb5fa5b

          SHA1

          738d7e47e47a102e67d09efa63408d21aaf02245

          SHA256

          e7b90d32907f89c49e9e2a2ccca95133277f756f13a14187936d9b948ff67b44

          SHA512

          124bb24b26ede426ac7ef14db40ff894ddea6eb9c7a5bf408fd83b116bd55ec86b51b6839d5eec7ec0f481aab940795006005b4534dff6cc0f3a6560f7cf9bea

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\Eternity[1].rar

          Filesize

          526KB

          MD5

          763838789e63681b46fceb8f01f5515c

          SHA1

          2186d68551b76d765099d3ba02d492430ecf6cdc

          SHA256

          a63e61e1d52cb2d1476b9daf46c217ca743d6668aafbe62873f9dde77924d0ee

          SHA512

          ee6c8d84cc2208d3c0c742268127a675348137c720923c6a1a9207a0e5580f81826997f3422809f8ad90d2671921c2afdda640502e1a2684172ec4ca7197c3c6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\installer.min[1].js

          Filesize

          55KB

          MD5

          ced5a467b22c7032264668ce0e5ddc5a

          SHA1

          3a9214d2064e38e0a923d3dfe4b83abaf17e5ea6

          SHA256

          0c5eced08133a23ca23b18dd8f824f3c021d3ad996a093ffdddebb1fb4dff3ca

          SHA512

          538af644eb70e621aa3155bd5c6e70b8c9d49ad5bf954ddc1a7e9118973a484a9497dd56191f6202b3823e07eb49f7f9139b0f778c9c42fbfe7016bb66070c01

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\layout[1].css

          Filesize

          13KB

          MD5

          cd0d637a8961831d10aa7fc49bcfa507

          SHA1

          96e0a949718d42085edce6a5f8948298a2226ea4

          SHA256

          7343607aeeb6d2eedeea5d0c60cb49c4369ce08c5cd43bc36d984a7bd8d5c1a0

          SHA512

          20ce98c43dbdac58f74f530baf1dad5bceb6148232b83541b80a2b65455cafe1fed2f4cc8d2d0824a590864d0532267c5ff13ff4afe33c9072d6ace179327084

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\K941J8ND\theme[1].css

          Filesize

          2KB

          MD5

          881087a5afe76d3ef92d55eb230fd139

          SHA1

          005a0fad7f25f721f607d8938e746c5bc907ff93

          SHA256

          5e14124956620974b9641531f2e5a4f94a460ffb160134ebde5698587c503757

          SHA512

          11140a7ec1cd5a5bd5b1bb4cdcec4dede3df7c9cfb4960d7edaf7962c84f99e6ee4ae55cd2e1bf58e21d0c2b0af8e2853c3475f33f2ed6d1b1af83448ef9abb6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\ScrollMagic.min[1].js

          Filesize

          18KB

          MD5

          955abe8cf2e241745bee38b92bebc76c

          SHA1

          414b13e1866a94eaef2643a5167381bbe2aa7699

          SHA256

          09756f2d963931cd3831e019d7dfc7a71dc6ec0e02ed4cf6232c46e3b40a9909

          SHA512

          0a8289ae94a67e9262adbe1198e622b78b01f031713a0c808854ee91a3c2101e3003c61586a7d4b05d5666531b8b5a51dcc8bb53af5d29fd34c36c17bfebed51

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\animation.gsap.min[1].js

          Filesize

          2KB

          MD5

          fbc6fd5e2fc6409c75f602320cb5909e

          SHA1

          a37d2d19425526b6f9dc1873525afb437cefe25f

          SHA256

          eca64f6a9419a07b0638c88ac89f7b1c7b8d6f16865291df6f668d200064a233

          SHA512

          1092f44a35a17423ae8f70d554b5204b8a0ffe41355706567b09469d42d60f6a174434da921d8a21b73ef6862b6fc8d6ead14ff2b85a373ad4e5b090c39c5801

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\autotrack[1].js

          Filesize

          24KB

          MD5

          5e6539fd0b1c0778a5254a4ed1305db8

          SHA1

          6dfe476e85112334a53d16c11e319a7422d8396e

          SHA256

          449f80795c70e94fa7457ba00a62eeae62ce7efe0abab9681b379833aafed838

          SHA512

          003d9e211cca5c2ff77eb9a2c275796697c931ef1361d7013b010ecd41e304c33bd3f538105241c3a69224853b5aa45021596b3766fa13b9143ca82aaa23fc60

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\intersection-observer.min[1].js

          Filesize

          5KB

          MD5

          936a7c8159737df8dce532f9ea4d38b4

          SHA1

          8834ea22eff1bdfd35d2ef3f76d0e552e75e83c5

          SHA256

          3ea95af77e18116ed0e8b52bb2c0794d1259150671e02994ac2a8845bd1ad5b9

          SHA512

          54471260a278d5e740782524392249427366c56b288c302c73d643a24c96d99a487507fbe1c47e050a52144713dfeb64cd37bc6359f443ce5f8feb1a2856a70a

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V6GB5GU8\pixeldrain_32[1].png

          Filesize

          1KB

          MD5

          c12563aae9ed51b8d876ea939e41e3e3

          SHA1

          d48f4c7e6ab60d83729e756208a8ff390357d6ff

          SHA256

          74687b1cbd9ea90486306538a02ed5d32749d9b889d3327f4c53a803777fff49

          SHA512

          52e4d7f4f599dcdc17ccbd6178ac4a708ba1ddb01c5d20a4e801c02b29eb7858d48857f47a1dbfffbb7c04b78b596fadf4fb210219435e57332ecb8f524e2687

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\favicon-16x16[1].png

          Filesize

          695B

          MD5

          7fc6324199de70f7cb355c77347f0e1a

          SHA1

          d94d173f3f5140c1754c16ac29361ac1968ba8e2

          SHA256

          97d4556f7e8364fb3e0f0ccf58ab6614af002dfca4fe241095cf645a71df0949

          SHA512

          09f44601fa449b1608eb3d338b68ea9fd5540f66ea4f3f21534e9a757355a6133ae8fb9b4544f943ca5c504e45a3431bf3f3d24de2302d0439d8a13a0f2d544f

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\main.min[1].css

          Filesize

          128KB

          MD5

          a102d97a0e1eb05ea3c17c5861c1c181

          SHA1

          219df7bc27f992adcab3d7b638273e2d6566a91e

          SHA256

          7d974c598541f3d077a841b8beb66b21867c64b061eec8904b773b844c066b75

          SHA512

          3fabd0ff04a5e8a7ed0bcfd7b1386cecd6aabed9abea318deb4737bd71354f3c334edf2cfa7be0c13ac417de5982c25d271121aca9e23584dbf29f2965791c53

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\Y624AVVJ\plausible[1].js

          Filesize

          1KB

          MD5

          8210a7fad4cf5a22ec34f49fd6cfa0a4

          SHA1

          46cae8011201b868af95b9d91a76839a2ac51a18

          SHA256

          ae4216bfc85c99ffd32e7745f0d7d4cd5f57b714f3a4911176b8cd78a176c97c

          SHA512

          2c9edbb4ecbcf22ed614b3707c4b8c30f6f6b23700b48df3ac23f3b3a029d6f28f51def075a918f596812a61a49a479bbd26326acef472133531fd5e1e919f17

        • C:\Users\Admin\AppData\Local\Temp\7zO49518FE7\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\AppData\Local\Temp\7zO49518FE7\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\AppData\Local\Temp\7zO49518FE7\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\AppData\Local\Temp\7zO495DBCD7\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\AppData\Local\Temp\7zO495DBCD7\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\AppData\Local\Temp\dcd.exe

          Filesize

          227KB

          MD5

          b5ac46e446cead89892628f30a253a06

          SHA1

          f4ad1044a7f77a1b02155c3a355a1bb4177076ca

          SHA256

          def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

          SHA512

          bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

        • C:\Users\Admin\AppData\Local\Temp\dcd.exe

          Filesize

          227KB

          MD5

          b5ac46e446cead89892628f30a253a06

          SHA1

          f4ad1044a7f77a1b02155c3a355a1bb4177076ca

          SHA256

          def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

          SHA512

          bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

        • C:\Users\Admin\AppData\Local\Temp\dcd.exe

          Filesize

          227KB

          MD5

          b5ac46e446cead89892628f30a253a06

          SHA1

          f4ad1044a7f77a1b02155c3a355a1bb4177076ca

          SHA256

          def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

          SHA512

          bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

        • C:\Users\Admin\AppData\Local\Temp\dcd.exe

          Filesize

          227KB

          MD5

          b5ac46e446cead89892628f30a253a06

          SHA1

          f4ad1044a7f77a1b02155c3a355a1bb4177076ca

          SHA256

          def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

          SHA512

          bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Eternity.exe

          Filesize

          894KB

          MD5

          4ad5be8df04cccacdce2e2b831ced605

          SHA1

          4b2550e9d417c5087ecf905e75453802958f793e

          SHA256

          9bb36572e3776058b18428d777ef645256463521dea900c79471ddf8c995fdab

          SHA512

          3427cc1dfadda6c1a886b719c609a6c3488d4b39031e5d0ac21de15d8af4c702a9de4ee8fea8a9f8762d9fb599321308543707e3ea08df77165f834606855bcf

        • C:\Users\Admin\Downloads\Eternity.rar.5wm1yo2.partial

          Filesize

          526KB

          MD5

          763838789e63681b46fceb8f01f5515c

          SHA1

          2186d68551b76d765099d3ba02d492430ecf6cdc

          SHA256

          a63e61e1d52cb2d1476b9daf46c217ca743d6668aafbe62873f9dde77924d0ee

          SHA512

          ee6c8d84cc2208d3c0c742268127a675348137c720923c6a1a9207a0e5580f81826997f3422809f8ad90d2671921c2afdda640502e1a2684172ec4ca7197c3c6

        • memory/5008-360-0x000000001B620000-0x000000001B630000-memory.dmp

          Filesize

          64KB

        • memory/5008-359-0x000000001B620000-0x000000001B630000-memory.dmp

          Filesize

          64KB

        • memory/5008-358-0x000000001B620000-0x000000001B630000-memory.dmp

          Filesize

          64KB

        • memory/5008-357-0x00000000013D0000-0x00000000013D1000-memory.dmp

          Filesize

          4KB

        • memory/5008-356-0x000000001B630000-0x000000001B680000-memory.dmp

          Filesize

          320KB

        • memory/5008-355-0x0000000000A60000-0x0000000000B46000-memory.dmp

          Filesize

          920KB

        • memory/5096-379-0x0000000000770000-0x0000000000771000-memory.dmp

          Filesize

          4KB

        • memory/5096-380-0x000000001B620000-0x000000001B630000-memory.dmp

          Filesize

          64KB

        • memory/5096-388-0x000000001AF80000-0x000000001AF90000-memory.dmp

          Filesize

          64KB

        • memory/5096-389-0x000000001AF80000-0x000000001AF90000-memory.dmp

          Filesize

          64KB