Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2023 19:43

General

  • Target

    2e494e4c3d836328a67e497d81ca0652b586094846d6d0505134613820e14e6b_JC.exe

  • Size

    1.0MB

  • MD5

    4d3d3e269b3fe6c81e7fd330ebcc3a9a

  • SHA1

    63ff1af264a84a72e4699d22b05df60456ef8f00

  • SHA256

    2e494e4c3d836328a67e497d81ca0652b586094846d6d0505134613820e14e6b

  • SHA512

    abfd58e804826ff9f508eee7682d5af5c7c002323f0ce09d6ce028d1d56fc60249e7c4c4b9745e4ffc4e19e95d764c41c17c60c79f8eca1bfde9dd921589d28a

  • SSDEEP

    24576:OyR9ZHgujQTMsuKIpBcm5zZvRuLkNWy0YdQD7He7D:dJouK+VzFRuRyED7He

Malware Config

Signatures

  • Detects Healer an antivirus disabler dropper 4 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e494e4c3d836328a67e497d81ca0652b586094846d6d0505134613820e14e6b_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\2e494e4c3d836328a67e497d81ca0652b586094846d6d0505134613820e14e6b_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1208
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1624
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2292
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5701320.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5701320.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2076
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:2688
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 268
                  8⤵
                  • Program crash
                  PID:2572
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 276
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
    Filesize

    971KB

    MD5

    f223a28b1f313f619b81151202bddcbc

    SHA1

    7d9a4dcd7ce5ab8d7944e99e62b1df3956fcd5bc

    SHA256

    38d95f69b7862526448a4e0773b678b18f312523598f21a941849891ccec8741

    SHA512

    8b53042558b174a6fc5d2c270dbe2164553bf66cc73046324e7519cda202451e7c9c3611739977bb200a244438d2299bfc79d5cfb083eaab30e327757c216ccc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
    Filesize

    971KB

    MD5

    f223a28b1f313f619b81151202bddcbc

    SHA1

    7d9a4dcd7ce5ab8d7944e99e62b1df3956fcd5bc

    SHA256

    38d95f69b7862526448a4e0773b678b18f312523598f21a941849891ccec8741

    SHA512

    8b53042558b174a6fc5d2c270dbe2164553bf66cc73046324e7519cda202451e7c9c3611739977bb200a244438d2299bfc79d5cfb083eaab30e327757c216ccc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
    Filesize

    789KB

    MD5

    aaf9b677f97bbff4bcddaf0e9457f6f0

    SHA1

    9f1ed41baa5d799678875d460a8ef30ed89d2666

    SHA256

    6c83c92dbdb94b053ead64ba5320f7ae7f3aa672bc5c02190f3d27de77325399

    SHA512

    a9eb169372f4bea53d8849e086f7c00b87dc006d7c29f730b96a46b167644359d95cd1254c0cafcad7a6215b9d1488552462ded94f106cfc6d2ce83ecbc730eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
    Filesize

    789KB

    MD5

    aaf9b677f97bbff4bcddaf0e9457f6f0

    SHA1

    9f1ed41baa5d799678875d460a8ef30ed89d2666

    SHA256

    6c83c92dbdb94b053ead64ba5320f7ae7f3aa672bc5c02190f3d27de77325399

    SHA512

    a9eb169372f4bea53d8849e086f7c00b87dc006d7c29f730b96a46b167644359d95cd1254c0cafcad7a6215b9d1488552462ded94f106cfc6d2ce83ecbc730eb

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
    Filesize

    606KB

    MD5

    995e012d6c218fc952242450ab18298b

    SHA1

    94d284ed5e1f716c4777d657e640bad379df25a7

    SHA256

    23c007347049e9a9e7fcc57be1494d0a459151289e74f862148a3f6fea1123a3

    SHA512

    2dfeb50a913f7458ad94290542a83b029cd1228998dab92b81056868383dd7e42058652efe1534c922d9453f6287792d48cfebfed2f202808c44a4696796fe15

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
    Filesize

    606KB

    MD5

    995e012d6c218fc952242450ab18298b

    SHA1

    94d284ed5e1f716c4777d657e640bad379df25a7

    SHA256

    23c007347049e9a9e7fcc57be1494d0a459151289e74f862148a3f6fea1123a3

    SHA512

    2dfeb50a913f7458ad94290542a83b029cd1228998dab92b81056868383dd7e42058652efe1534c922d9453f6287792d48cfebfed2f202808c44a4696796fe15

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
    Filesize

    335KB

    MD5

    2fee5dec8bfecff82772d78002828e9d

    SHA1

    2662180e231420c8fb7f22d5d5522d31e789d82f

    SHA256

    79a5a2780d2f1325957aa1fa75ab6e1aecde9a50ea2b6534b48f48d9feccc840

    SHA512

    79af1da3cdd05942a99a0608a4870749698d350d7d86b771a53ea8f11effd0543a431389ece737e46cec48395c08c3343c625507e33e5edc5217951fcac0c89c

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
    Filesize

    335KB

    MD5

    2fee5dec8bfecff82772d78002828e9d

    SHA1

    2662180e231420c8fb7f22d5d5522d31e789d82f

    SHA256

    79a5a2780d2f1325957aa1fa75ab6e1aecde9a50ea2b6534b48f48d9feccc840

    SHA512

    79af1da3cdd05942a99a0608a4870749698d350d7d86b771a53ea8f11effd0543a431389ece737e46cec48395c08c3343c625507e33e5edc5217951fcac0c89c

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5701320.exe
    Filesize

    11KB

    MD5

    615810407dc112e860fea1ea461d0374

    SHA1

    49c57e14e4ae44e69f3d9324b982df3de4aea2ba

    SHA256

    7bc5a078b412273d275ff9280228e3dc1379b8a6880f2cf2aa8ba1e4da2ffb31

    SHA512

    5f4c1db527cbeb4b846677202f0cb014909bb9919025777c949e9658771c2ea0f37a4d6251e393db8964f994580003ce8bcca5fe4adb4be8b67d23982b9f2790

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q5701320.exe
    Filesize

    11KB

    MD5

    615810407dc112e860fea1ea461d0374

    SHA1

    49c57e14e4ae44e69f3d9324b982df3de4aea2ba

    SHA256

    7bc5a078b412273d275ff9280228e3dc1379b8a6880f2cf2aa8ba1e4da2ffb31

    SHA512

    5f4c1db527cbeb4b846677202f0cb014909bb9919025777c949e9658771c2ea0f37a4d6251e393db8964f994580003ce8bcca5fe4adb4be8b67d23982b9f2790

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
    Filesize

    971KB

    MD5

    f223a28b1f313f619b81151202bddcbc

    SHA1

    7d9a4dcd7ce5ab8d7944e99e62b1df3956fcd5bc

    SHA256

    38d95f69b7862526448a4e0773b678b18f312523598f21a941849891ccec8741

    SHA512

    8b53042558b174a6fc5d2c270dbe2164553bf66cc73046324e7519cda202451e7c9c3611739977bb200a244438d2299bfc79d5cfb083eaab30e327757c216ccc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\z3790340.exe
    Filesize

    971KB

    MD5

    f223a28b1f313f619b81151202bddcbc

    SHA1

    7d9a4dcd7ce5ab8d7944e99e62b1df3956fcd5bc

    SHA256

    38d95f69b7862526448a4e0773b678b18f312523598f21a941849891ccec8741

    SHA512

    8b53042558b174a6fc5d2c270dbe2164553bf66cc73046324e7519cda202451e7c9c3611739977bb200a244438d2299bfc79d5cfb083eaab30e327757c216ccc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
    Filesize

    789KB

    MD5

    aaf9b677f97bbff4bcddaf0e9457f6f0

    SHA1

    9f1ed41baa5d799678875d460a8ef30ed89d2666

    SHA256

    6c83c92dbdb94b053ead64ba5320f7ae7f3aa672bc5c02190f3d27de77325399

    SHA512

    a9eb169372f4bea53d8849e086f7c00b87dc006d7c29f730b96a46b167644359d95cd1254c0cafcad7a6215b9d1488552462ded94f106cfc6d2ce83ecbc730eb

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\z9845076.exe
    Filesize

    789KB

    MD5

    aaf9b677f97bbff4bcddaf0e9457f6f0

    SHA1

    9f1ed41baa5d799678875d460a8ef30ed89d2666

    SHA256

    6c83c92dbdb94b053ead64ba5320f7ae7f3aa672bc5c02190f3d27de77325399

    SHA512

    a9eb169372f4bea53d8849e086f7c00b87dc006d7c29f730b96a46b167644359d95cd1254c0cafcad7a6215b9d1488552462ded94f106cfc6d2ce83ecbc730eb

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
    Filesize

    606KB

    MD5

    995e012d6c218fc952242450ab18298b

    SHA1

    94d284ed5e1f716c4777d657e640bad379df25a7

    SHA256

    23c007347049e9a9e7fcc57be1494d0a459151289e74f862148a3f6fea1123a3

    SHA512

    2dfeb50a913f7458ad94290542a83b029cd1228998dab92b81056868383dd7e42058652efe1534c922d9453f6287792d48cfebfed2f202808c44a4696796fe15

  • \Users\Admin\AppData\Local\Temp\IXP002.TMP\z9112289.exe
    Filesize

    606KB

    MD5

    995e012d6c218fc952242450ab18298b

    SHA1

    94d284ed5e1f716c4777d657e640bad379df25a7

    SHA256

    23c007347049e9a9e7fcc57be1494d0a459151289e74f862148a3f6fea1123a3

    SHA512

    2dfeb50a913f7458ad94290542a83b029cd1228998dab92b81056868383dd7e42058652efe1534c922d9453f6287792d48cfebfed2f202808c44a4696796fe15

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
    Filesize

    335KB

    MD5

    2fee5dec8bfecff82772d78002828e9d

    SHA1

    2662180e231420c8fb7f22d5d5522d31e789d82f

    SHA256

    79a5a2780d2f1325957aa1fa75ab6e1aecde9a50ea2b6534b48f48d9feccc840

    SHA512

    79af1da3cdd05942a99a0608a4870749698d350d7d86b771a53ea8f11effd0543a431389ece737e46cec48395c08c3343c625507e33e5edc5217951fcac0c89c

  • \Users\Admin\AppData\Local\Temp\IXP003.TMP\z2427639.exe
    Filesize

    335KB

    MD5

    2fee5dec8bfecff82772d78002828e9d

    SHA1

    2662180e231420c8fb7f22d5d5522d31e789d82f

    SHA256

    79a5a2780d2f1325957aa1fa75ab6e1aecde9a50ea2b6534b48f48d9feccc840

    SHA512

    79af1da3cdd05942a99a0608a4870749698d350d7d86b771a53ea8f11effd0543a431389ece737e46cec48395c08c3343c625507e33e5edc5217951fcac0c89c

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\q5701320.exe
    Filesize

    11KB

    MD5

    615810407dc112e860fea1ea461d0374

    SHA1

    49c57e14e4ae44e69f3d9324b982df3de4aea2ba

    SHA256

    7bc5a078b412273d275ff9280228e3dc1379b8a6880f2cf2aa8ba1e4da2ffb31

    SHA512

    5f4c1db527cbeb4b846677202f0cb014909bb9919025777c949e9658771c2ea0f37a4d6251e393db8964f994580003ce8bcca5fe4adb4be8b67d23982b9f2790

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • \Users\Admin\AppData\Local\Temp\IXP004.TMP\r3319610.exe
    Filesize

    356KB

    MD5

    edcc57cb979a3dbf1bb5e46bda33bc03

    SHA1

    b4c71d67c1eaeceb0b35e020dddb9fb0e82e7ec5

    SHA256

    b936753a75a474181d39d7588d66e5c15d03f18aed23ab878ec5ae35331c9b0d

    SHA512

    dcbb5e0b98d002ab69c576233f8911860d8080973261dcd5e2e642f181dc5d97e7ef8db41a6cf8a73cef8a4dd5492e24f77f8dec6b2f1bd52f1e922134e5ad5b

  • memory/2076-48-0x0000000000C80000-0x0000000000C8A000-memory.dmp
    Filesize

    40KB

  • memory/2076-51-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmp
    Filesize

    9.9MB

  • memory/2076-49-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmp
    Filesize

    9.9MB

  • memory/2076-50-0x000007FEF57F0000-0x000007FEF61DC000-memory.dmp
    Filesize

    9.9MB

  • memory/2496-61-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-65-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-64-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-70-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-72-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-62-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-68-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-66-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/2496-67-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp
    Filesize

    4KB