Analysis
-
max time kernel
259s -
max time network
268s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29-07-2023 04:47
Behavioral task
behavioral1
Sample
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe
Resource
win7-20230712-en
General
-
Target
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe
-
Size
6.5MB
-
MD5
7af7284a37272c65e64b2deb41f6aed9
-
SHA1
c82659430ea52e5c9950811ca5aeea129c1979cc
-
SHA256
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
-
SHA512
4522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
SSDEEP
196608:ixKD4IVKYElaRkJoAulL+2FQTBhTMi4f6:i8Z4Y/k9QL9wEp6
Malware Config
Extracted
amadey
3.85
45.9.74.166/b7djSDcPcZ/index.php
45.9.74.141/b7djSDcPcZ/index.php
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
bstyoops.exebstyoops.exebstyoops.exebstyoops.exebstyoops.exebstyoops.exepid process 1212 bstyoops.exe 2756 bstyoops.exe 2020 bstyoops.exe 2632 bstyoops.exe 1884 bstyoops.exe 2808 bstyoops.exe -
Loads dropped DLL 1 IoCs
Processes:
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exepid process 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe -
Processes:
resource yara_rule behavioral1/memory/1732-55-0x0000000001090000-0x0000000001A90000-memory.dmp vmprotect behavioral1/memory/1732-61-0x0000000001090000-0x0000000001A90000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect \Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/1732-74-0x0000000001090000-0x0000000001A90000-memory.dmp vmprotect behavioral1/memory/1212-76-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/1212-82-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/1212-85-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/2756-88-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2756-95-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2756-98-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/2020-101-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2020-106-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2020-109-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/2632-113-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2632-118-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2632-121-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/1884-125-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/1884-130-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/1884-133-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe vmprotect behavioral1/memory/2808-137-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2808-141-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect behavioral1/memory/2808-144-0x00000000008F0000-0x00000000012F0000-memory.dmp vmprotect -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exebstyoops.exebstyoops.exebstyoops.exebstyoops.exebstyoops.exebstyoops.exepid process 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe 1212 bstyoops.exe 2756 bstyoops.exe 2020 bstyoops.exe 2632 bstyoops.exe 1884 bstyoops.exe 2808 bstyoops.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exepid process 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exebstyoops.execmd.exetaskeng.exedescription pid process target process PID 1732 wrote to memory of 1212 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe bstyoops.exe PID 1732 wrote to memory of 1212 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe bstyoops.exe PID 1732 wrote to memory of 1212 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe bstyoops.exe PID 1732 wrote to memory of 1212 1732 0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe bstyoops.exe PID 1212 wrote to memory of 2384 1212 bstyoops.exe schtasks.exe PID 1212 wrote to memory of 2384 1212 bstyoops.exe schtasks.exe PID 1212 wrote to memory of 2384 1212 bstyoops.exe schtasks.exe PID 1212 wrote to memory of 2384 1212 bstyoops.exe schtasks.exe PID 1212 wrote to memory of 2244 1212 bstyoops.exe cmd.exe PID 1212 wrote to memory of 2244 1212 bstyoops.exe cmd.exe PID 1212 wrote to memory of 2244 1212 bstyoops.exe cmd.exe PID 1212 wrote to memory of 2244 1212 bstyoops.exe cmd.exe PID 2244 wrote to memory of 1864 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 1864 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 1864 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 1864 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2904 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2904 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2904 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2904 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2812 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2812 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2812 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2812 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2352 2244 cmd.exe cmd.exe PID 2244 wrote to memory of 2348 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2348 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2348 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2348 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2868 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2868 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2868 2244 cmd.exe cacls.exe PID 2244 wrote to memory of 2868 2244 cmd.exe cacls.exe PID 2836 wrote to memory of 2756 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2756 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2756 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2756 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2020 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2020 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2020 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2020 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2632 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2632 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2632 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2632 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 1884 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 1884 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 1884 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 1884 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2808 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2808 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2808 2836 taskeng.exe bstyoops.exe PID 2836 wrote to memory of 2808 2836 taskeng.exe bstyoops.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe"C:\Users\Admin\AppData\Local\Temp\0eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN bstyoops.exe /TR "C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "bstyoops.exe" /P "Admin:N"&&CACLS "bstyoops.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c2868ed41c" /P "Admin:N"&&CACLS "..\c2868ed41c" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "bstyoops.exe" /P "Admin:R" /E4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:N"4⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c2868ed41c" /P "Admin:R" /E4⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {9BFFA1C3-6BE2-4956-8BE1-F832AAC4B4B0} S-1-5-21-722410544-1258951091-1992882075-1000:MGKTNXNO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeC:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
C:\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
\Users\Admin\AppData\Local\Temp\c2868ed41c\bstyoops.exeFilesize
6.5MB
MD57af7284a37272c65e64b2deb41f6aed9
SHA1c82659430ea52e5c9950811ca5aeea129c1979cc
SHA2560eb30e2c25357b3fec262f5dea83c92a7236337dd87dd3fe06ac8e8d5e205d04
SHA5124522c233933c8287bb10807508e98be615025f9ec614ac1f4928822fcbb98e50a0b09f43f688333e61a7da00ab156cbd747a19aba580c91db5bc4a759c9dabcc
-
memory/1212-82-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/1212-80-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1212-85-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/1212-76-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/1212-78-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1212-81-0x0000000077CA0000-0x0000000077CA1000-memory.dmpFilesize
4KB
-
memory/1732-60-0x0000000077CA0000-0x0000000077CA1000-memory.dmpFilesize
4KB
-
memory/1732-55-0x0000000001090000-0x0000000001A90000-memory.dmpFilesize
10.0MB
-
memory/1732-74-0x0000000001090000-0x0000000001A90000-memory.dmpFilesize
10.0MB
-
memory/1732-61-0x0000000001090000-0x0000000001A90000-memory.dmpFilesize
10.0MB
-
memory/1732-59-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1732-54-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1732-57-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1732-64-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1884-126-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1884-129-0x0000000077CA0000-0x0000000077CA1000-memory.dmpFilesize
4KB
-
memory/1884-128-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1884-130-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/1884-125-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/1884-133-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2020-101-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2020-106-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2020-109-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2632-121-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2632-118-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2632-116-0x0000000077CA0000-0x0000000077CA1000-memory.dmpFilesize
4KB
-
memory/2632-113-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2756-98-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2756-95-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2756-93-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2756-92-0x0000000077CA0000-0x0000000077CA1000-memory.dmpFilesize
4KB
-
memory/2756-90-0x0000000000130000-0x0000000000131000-memory.dmpFilesize
4KB
-
memory/2756-88-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2808-137-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2808-141-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB
-
memory/2808-144-0x00000000008F0000-0x00000000012F0000-memory.dmpFilesize
10.0MB