Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
1e2f264dcb18c99efde72203397b4bb1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e2f264dcb18c99efde72203397b4bb1.exe
Resource
win10v2004-20231215-en
General
-
Target
1e2f264dcb18c99efde72203397b4bb1.exe
-
Size
572KB
-
MD5
1e2f264dcb18c99efde72203397b4bb1
-
SHA1
aa2806ae043909d97bb758b42023429347439ea6
-
SHA256
84687c1731cad90d812aba959aaff093d528df05b10f7836e867425d3457bc5c
-
SHA512
89c22072335824a7848374f2da0ddf100b5ef0e3285cde6cd8e23958d14e1c73b6ca67ed6ec72eece9e269fd0242a3a9790f0dc5872a13834817895247f31d91
-
SSDEEP
12288:beZiUXh6yIzAoSDPgCF8jDByjm4SGo435a7:beiUXh6ynTDoiwVvbGo435K
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
Processes:
reg.exereg.exereg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1e2f264dcb18c99efde72203397b4bb1.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\local.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 1e2f264dcb18c99efde72203397b4bb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 1e2f264dcb18c99efde72203397b4bb1.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6CE9E7B3-E0EF-E37D-DDBC-CBFBFCBDA4BA} 1e2f264dcb18c99efde72203397b4bb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6CE9E7B3-E0EF-E37D-DDBC-CBFBFCBDA4BA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 1e2f264dcb18c99efde72203397b4bb1.exe Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{6CE9E7B3-E0EF-E37D-DDBC-CBFBFCBDA4BA} 1e2f264dcb18c99efde72203397b4bb1.exe Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{6CE9E7B3-E0EF-E37D-DDBC-CBFBFCBDA4BA}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 1e2f264dcb18c99efde72203397b4bb1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 1e2f264dcb18c99efde72203397b4bb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows.exe = "C:\\Users\\Admin\\AppData\\Roaming\\local.exe" 1e2f264dcb18c99efde72203397b4bb1.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
1e2f264dcb18c99efde72203397b4bb1.exedescription ioc process File opened for modification \??\PhysicalDrive0 1e2f264dcb18c99efde72203397b4bb1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exe1e2f264dcb18c99efde72203397b4bb1.exedescription pid process target process PID 2624 set thread context of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 set thread context of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe -
Modifies registry key 1 TTPs 4 IoCs
Processes:
reg.exereg.exereg.exereg.exepid process 3896 reg.exe 1552 reg.exe 1780 reg.exe 4444 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exedescription pid process Token: 1 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeCreateTokenPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeAssignPrimaryTokenPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeLockMemoryPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeIncreaseQuotaPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeMachineAccountPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeTcbPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeSecurityPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeTakeOwnershipPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeLoadDriverPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeSystemProfilePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeSystemtimePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeProfSingleProcessPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeIncBasePriorityPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeCreatePagefilePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeCreatePermanentPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeBackupPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeRestorePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeShutdownPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeDebugPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeAuditPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeSystemEnvironmentPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeChangeNotifyPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeRemoteShutdownPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeUndockPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeSyncAgentPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeEnableDelegationPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeManageVolumePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeImpersonatePrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeCreateGlobalPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: 31 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: 32 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: 33 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: 34 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: 35 4804 1e2f264dcb18c99efde72203397b4bb1.exe Token: SeDebugPrivilege 4804 1e2f264dcb18c99efde72203397b4bb1.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exe1e2f264dcb18c99efde72203397b4bb1.exe1e2f264dcb18c99efde72203397b4bb1.exepid process 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1372 1e2f264dcb18c99efde72203397b4bb1.exe 4804 1e2f264dcb18c99efde72203397b4bb1.exe 4804 1e2f264dcb18c99efde72203397b4bb1.exe 4804 1e2f264dcb18c99efde72203397b4bb1.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
1e2f264dcb18c99efde72203397b4bb1.exe1e2f264dcb18c99efde72203397b4bb1.exe1e2f264dcb18c99efde72203397b4bb1.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 2624 wrote to memory of 1372 2624 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 1372 wrote to memory of 4804 1372 1e2f264dcb18c99efde72203397b4bb1.exe 1e2f264dcb18c99efde72203397b4bb1.exe PID 4804 wrote to memory of 4764 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 4764 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 4764 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2996 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2996 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2996 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2360 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2360 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 2360 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 1632 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 1632 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4804 wrote to memory of 1632 4804 1e2f264dcb18c99efde72203397b4bb1.exe cmd.exe PID 4764 wrote to memory of 1552 4764 cmd.exe reg.exe PID 4764 wrote to memory of 1552 4764 cmd.exe reg.exe PID 4764 wrote to memory of 1552 4764 cmd.exe reg.exe PID 2996 wrote to memory of 1780 2996 cmd.exe reg.exe PID 2996 wrote to memory of 1780 2996 cmd.exe reg.exe PID 2996 wrote to memory of 1780 2996 cmd.exe reg.exe PID 1632 wrote to memory of 4444 1632 cmd.exe reg.exe PID 1632 wrote to memory of 4444 1632 cmd.exe reg.exe PID 1632 wrote to memory of 4444 1632 cmd.exe reg.exe PID 2360 wrote to memory of 3896 2360 cmd.exe reg.exe PID 2360 wrote to memory of 3896 2360 cmd.exe reg.exe PID 2360 wrote to memory of 3896 2360 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe"3⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\local.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\local.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\1e2f264dcb18c99efde72203397b4bb1.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1372-7-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1372-2-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1372-4-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/1372-10-0x0000000000400000-0x0000000000475000-memory.dmpFilesize
468KB
-
memory/4804-29-0x0000000077240000-0x00000000772BA000-memory.dmpFilesize
488KB
-
memory/4804-34-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-20-0x0000000077436000-0x0000000077437000-memory.dmpFilesize
4KB
-
memory/4804-19-0x0000000077240000-0x00000000772BA000-memory.dmpFilesize
488KB
-
memory/4804-11-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-21-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-25-0x0000000076940000-0x0000000076A30000-memory.dmpFilesize
960KB
-
memory/4804-24-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-8-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-26-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-31-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-18-0x0000000076940000-0x0000000076A30000-memory.dmpFilesize
960KB
-
memory/4804-37-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-41-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-44-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-51-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-54-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-57-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-61-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-64-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB
-
memory/4804-67-0x0000000000400000-0x0000000000470000-memory.dmpFilesize
448KB