Analysis

  • max time kernel
    144s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:12

General

  • Target

    1c9c16bfb83e5f2346fbd8c5e56ef2ad.exe

  • Size

    319KB

  • MD5

    1c9c16bfb83e5f2346fbd8c5e56ef2ad

  • SHA1

    6e8db589970013b61f04db8e225a5f59b6de0fef

  • SHA256

    7ed008eda9b93d362a3e58a3749e57b56bc9ee1fb453a52e0f9b3544929c188d

  • SHA512

    a25f02203975c958c569cc72094af30228f28c4745ba5e65e465fe11b7f098a3ed50b1412dfd09189484e0821ab2571a85500d598c403f6102f1f8956f7adb21

  • SSDEEP

    1536:txft5rxft5rxft5rxft5rxft5rxft5rxft5rxft5rxft5o83PoSQm5fRyB:v15915915915915915915915915pQqy

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\exc.exe
    "C:\exc.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:544 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:380
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:544 CREDAT:1192971 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1492
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:544 CREDAT:1127430 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1240
  • C:\Users\Admin\AppData\Local\Temp\1c9c16bfb83e5f2346fbd8c5e56ef2ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1c9c16bfb83e5f2346fbd8c5e56ef2ad.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:384
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:384 CREDAT:275457 /prefetch:2
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae0dae646eb7dcd01e9f799d4cc30712

    SHA1

    f2fa6cf8801a00bd147fd562e9f0da4ebe449c9e

    SHA256

    b042d50a7fc87419a299b137b5fee4162d061515b8cb8f2c2c7b3d545d0594e3

    SHA512

    a74b6d5f028ee684c8ab77a1e5998e8cff20b3d502277e4394ed36bced5e186497e16e503fdb3fa0a253a180bea618d5de856370f9d6c382e6d1df3f6e38dee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c99d30b364de79d354f4cd22df955397

    SHA1

    634b20664f4cf355e07d6db36e2380b6a893a72b

    SHA256

    5232723281650007a74df01f225565650736dd9c2aff3e8ec037d9f2268f52a5

    SHA512

    5fbd558eb0b984bf62de37c5dda004ef19df99767d40d9e5ac14b6192b1c94f87277627048fbcf62d73498f591fd259194cb60394f0e6099e1f9d15af6a661dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8097deea314ec52a2bea632bca5ec31f

    SHA1

    93ba421a6fc96d9cf684600a552d66de5662f82a

    SHA256

    53a89b9871e83ab9bf765a9ae19b7557e392eea10ffddc693271996e4e671241

    SHA512

    f337c4deb6726d0547386493aea9325994cbab5edb1d0664e9222f7253c1d4e0278985a03190d537108f61b54782cced64748d59d66aa5fa79f538b2142565f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1501c456268642fc30271b4de73e13b

    SHA1

    cc74fccdd3e0bc9ed335c0717b560c058a33d0ee

    SHA256

    492c401cdf66183ab65b7618714e2a567faf7d9872eda47e29214ac094dd09ef

    SHA512

    d356120edaa78e9fa8fe378a6f97afcceb475ac500d1f3110944c8269e91550c754fe25d77fb96c1b40b584a4aea7df3da9a1a9099d733200bda471f247820d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    76a387824e6d413c8e16b457ebe4364d

    SHA1

    e8d34d9f40eb9d1a7d802742f3bd372c26b5f5c7

    SHA256

    01741409e6ad4e893e6571f6bad52be77a56f90a460b20b5ed98705796aba900

    SHA512

    954abce5e0999dd2bd0b797e15388311b2b8b1d6b31bf619b8edce41c54e276a195dd08d9205cbddaf3c78e25a20ab9cc05142e1511888fc73bc515606500cde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56edf3cbcb2843fe381f471887424a3a

    SHA1

    274713f069444d869a7c5b8d8dbda252c089236c

    SHA256

    7316aebceadd9f1b93a38ee04e9dccbcac384f14b7155244b3f2ac6e0fe93431

    SHA512

    c34422557510e3220e7b287297a364fc7805c4de0261ac37691bcdd88f992312356ce2344107251df18b3d10353e2f2907f1f8605803e3018dc7671f53d8d50c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    443e343960789aff85027f3f2467cbd9

    SHA1

    68c429e0a03e29f67f35c7e43c9f98dc07916bce

    SHA256

    92d74566f485e02b3581e2d473b90ef8c5406c0f4d1fda3fb0dac98f8c091ec5

    SHA512

    8f0729c255fd8dde7cc56863dfc518fd09daae5771781f2548147db06ed9e49094d7fed699f3b449b64f18a8c5664ec57f7fc11e7be74a535165d842161775e9

  • C:\WINDOWS\SysWOW64\NOISE.THA

    Filesize

    28KB

    MD5

    9857f7057458cec9e16804db8298d2ac

    SHA1

    b8902a0c72d1083b3752217d9ebb832569449a8b

    SHA256

    d55ff2f173b11119d602e5801bfad9bd50f3f236ee1b466a78e6061404ac7e34

    SHA512

    6bc375f11d7a28943006c16a2703abe57e8372def7f8180b164045b81c930b876828b136bf101858f6620767c4ae6735fe570270ad042f2405c73517a810f28e

  • C:\WINDOWS\SysWOW64\korwbrkr.lex

    Filesize

    1.1MB

    MD5

    30a282f48823aa86387c0334a0aab5e5

    SHA1

    1abb6d7cd48817cb048ceb7a90720b0880bb31ae

    SHA256

    6d134db241495aea3e990bddd3c7bd34de4f29608df0dbcbe3afdb840eca430f

    SHA512

    e38df107759d2fd0e2ae3c5f8ba065eef4c4c4e967f6056d417f570db7aab5be81315f5446ff752d94de1840f51521c2d4c8ea9fb61cc59fa089221eea564734

  • C:\WINDOWS\SysWOW64\mapisvc.inf

    Filesize

    28KB

    MD5

    53018231c87ce4e2b7540e8dc5699d46

    SHA1

    58641e11d4f8c78cd08f029d2e2a4a7784132ee0

    SHA256

    98ba05979938ad1c61f9fa84c8f685845f6b175f2949935f9e35253d38fe9e64

    SHA512

    f934f1bc2eef3acd6fad5d6e3f73b7edae331ea8104ca3025d17e4548027b96b57bfd971a020df2e52a08cd9c75bfc5349c633a7a37ea7c0aaabaad65d59cf2c

  • C:\WINDOWS\SysWOW64\mfc100chs.dll

    Filesize

    62KB

    MD5

    4891edaf1a1184e07e77e04eeab96d6b

    SHA1

    70761634a3e5672f7b00d1e017f7e2434c024d6b

    SHA256

    44eb96c269c83fc3bfb5e80061e7e651516e413d1312d72a345e63c1e5f3be05

    SHA512

    67d6fb29670e842f0802bea1c68df992d250f44ba2266061b121f7d55c6579db14654880270fe40bb71a39caea1f46d9ade239f991e61757f4d7eb7a63b27922

  • C:\WINDOWS\SysWOW64\mfc100esn.dll

    Filesize

    89KB

    MD5

    52da1a6f967d0971269dd3848d09fccd

    SHA1

    70f5bec4ccd53cfa9a20bbb61d148fdc2d16b73b

    SHA256

    eb61d91a750c0a11263a9f48cd5578e397dde892e179468e0aa0e61ef590ea74

    SHA512

    4af1ff5803b6175fafd6f6f2b7c047ffd002338e480bae530897133a1b128aaccad9edc339f6abc1dc8b1906379ec850ae4a198dbbbee2d353337fff87f0d1b2

  • C:\WINDOWS\SysWOW64\mfc100fra.dll

    Filesize

    338KB

    MD5

    eb2004b23008543b96f1cb5e2cdd29e7

    SHA1

    e445c56c3a871823b255c7427db65a32767510bc

    SHA256

    8b38cfa0924a0916a8792becff756a7dfed652a1347440dc206762933d16caa6

    SHA512

    141a4451a0a9a0e9d851bef6a83165179dc7a5d468c4eef14f32ab82f27a25ccd2a56babe5b13505ad3e3e8dfa61dcdcdd57958cdf1544b971f7db95f7c1baa8

  • C:\WINDOWS\SysWOW64\mfc100fra.dll

    Filesize

    338KB

    MD5

    c2b1ee569e7f02dbebd77102efe2cebc

    SHA1

    735484c5724bf20950d9d8b0566a89b548a094e6

    SHA256

    7712d23adbca446525fe93e4c76739738c19e57c7a18384a28f25c51a3d27886

    SHA512

    9f7d4c6c338fa21cab65de91c0dcc5f3203304fe1626df8fdee50d28f5f87c807cafcd8f2c41987619bd125c98395c765eb6e0ba4e26b439bc75afd8d1f5bf80

  • C:\WINDOWS\SysWOW64\mfc100ita.dll

    Filesize

    51KB

    MD5

    48d851ed0954bec1d4cd4eb3c6dd9aef

    SHA1

    902989ce6370d5d00a6141ee9f4672e780d8e4e6

    SHA256

    b1b32f66f5aa8f50a90690c22f96cce3ab9bf474486a35b19e2c6a090980fa66

    SHA512

    511d8a18b76fcd8d7088253cfb8105e1a11b1717a85c98160322d8ccbb4eefde578bf5ad21d89ba05eec00afe01b1a37f8afb07b6654f71c0335ff372190c84b

  • C:\WINDOWS\SysWOW64\mfc100jpn.dll

    Filesize

    316KB

    MD5

    87cf825930db32975ccc898fcf3100d5

    SHA1

    572ca8c89e955e207b1aa8116b14bfe6bf6a9117

    SHA256

    ee5131fd71caba5c98a00a0e9b4028fa81c0f467ad56d8491a4ea4f21cd0722f

    SHA512

    38095b049211f2a6936d72b12ed05be284d83a37fa320816384ce8dde869875f8e6f62cbb439a30cf57cd4d4661cee14738e2d11ae31b75c945edf85e6d6025b

  • C:\WINDOWS\SysWOW64\mfc100jpn.dll

    Filesize

    316KB

    MD5

    ce92c74b82d116a23383d5b4292ca9c9

    SHA1

    f62b4cab2175a9bc1b5dd92bb12cdd09ed6c3b14

    SHA256

    cad7f87f731f2eb373fdf5ec22fb9206146705cc72a5952abeb50814dbb85d8e

    SHA512

    232f9dca18677ec3f145554c7637bfa653979d64bf4f188825efa98b26a8e8821604d0f506de9af047af71c5c402d8923e6117bedafc38ecb6307065778db270

  • C:\WINDOWS\SysWOW64\mfc100kor.dll

    Filesize

    318KB

    MD5

    646ea628ff47b8cc1527d57709191fd9

    SHA1

    20d3acbfc570ff200931a92cf6a74b3a0a7ed8a4

    SHA256

    2b89ad76a3b1a64dc94ceae062298e232d3d50099bdf98080aaa3ed04b95b4e6

    SHA512

    41c9ef2d919f2e8b071fac51f36ec3bd28136b62629be53aa9175ce203d8e3a65a8ce3b5f856b83add043dcb7c815fb70ce0f538d3652a8d3d9521a22455657a

  • C:\WINDOWS\SysWOW64\mfc100rus.dll

    Filesize

    335KB

    MD5

    ea710c033aa06c6d0f37513fe285f09c

    SHA1

    f9925777cc7990f989437d774eaba472449e2cc7

    SHA256

    e593fdc366b94a5b7f6f86f80695b6b3af4bb58e3b744bf190fa921abeda67f2

    SHA512

    0eee154e9d04c725674cffee238a00b31f08ebd35acf7c2fab9ca0ed20b7449a685a40a49ddb871a11bf06f1d86b26b43c97942d285a151c12e04bb9c3b6fc0a

  • C:\WINDOWS\SysWOW64\mfc120.dll

    Filesize

    894KB

    MD5

    ca6ec6199bffe81d15b19a9fc1f2d8da

    SHA1

    131af99d6c537fb78adfba02c393393e40244fc8

    SHA256

    f30abb1704d8f85bd402042b47dcaa968c6bf258d98c74741b8f39257944e7a1

    SHA512

    fafa8edbf66d782c67f8dd93791f7ac46fc48fb7d60247781d2cf3bff0582285168d6af95799017cb8ff2c0e8b1c21a4ff430bf3bf525867e665f9939b890e5f

  • C:\WINDOWS\SysWOW64\mfc120chs.dll

    Filesize

    162KB

    MD5

    34c56a188a527df18fb1fbfeff8676c0

    SHA1

    c1c8a3d3704d18b7001158ab6062ad6d44620594

    SHA256

    a48b58275787883be4e1d4258913c4cda70a29def3409728aa4a73bfcd4a8cb5

    SHA512

    d16e5e4fcb6baa06a746bb01e99ccb78efa976899f3bf69cabc488d51c368c7d5918fe2d10bf244215507b157fccdc770c404ae5ba77dccddb91619394b8c45f

  • C:\WINDOWS\SysWOW64\mfc120cht.dll

    Filesize

    100KB

    MD5

    85e85189ff1316d8a00e2db2ebf23f61

    SHA1

    d9bb855f4ee02992f128a7d64db94dffc2e77916

    SHA256

    6878cb351dca5b00099219aff09c5221e72e9f6cdb0b08d216a1fb3c9d40ea6f

    SHA512

    0343110f60f933f1376205a4551c5784e168369ea317481c8072cfaab81f3ced010ffff110840c4b9c1b9997c48c69dadff1ca9cd20d9f4e16bb0281e9b2f0c0

  • C:\WINDOWS\SysWOW64\mfcm120u.dll

    Filesize

    92KB

    MD5

    30c6c188dddffbf3cd24df6469229ee4

    SHA1

    0aea4c6c313904f55945e320b2fafd84372456c3

    SHA256

    7655ede46d05c8f94f828ba611cecee6c1aa4282a3708ee403cf79d56716cbcc

    SHA512

    cf6b059ea3cdad93c731af33c358aea07f71a3200b2b139bda078fcce13245931eabba5367e9fa2dd73eb111d85644dcf3a339cd6cd90712423e25aef7f2c721

  • C:\WINDOWS\SysWOW64\mfcm140.dll

    Filesize

    92KB

    MD5

    c4f86c654bdd16347cacdd1cda8a0daa

    SHA1

    50a13e65769969b3558ada76acdcec78155d056f

    SHA256

    9d3c75e7b4e152b1367a7ff661daafed91a4a2adab49b481f6a890e7128b2d9d

    SHA512

    9ebce843f079d5c6d0aede30b0da3f739a02746788f514b199eb993ed8611fa84d8c4e987a742df6262b00f437551b1334f56a52191bbc17d626f1a05022c4fb

  • C:\WINDOWS\SysWOW64\noise.kor

    Filesize

    29KB

    MD5

    e8e606c0180898f7ec0a45be96d04ae7

    SHA1

    a9f543b4a87bea0cb936c984ea03a1f265bfcd1c

    SHA256

    c92214f2c100d660bfc6c1ce905cb7c65b535ccf1f76d93ba99a723385f0d11e

    SHA512

    1589fea7bb049c0caeb1fc751415e6fb60deb715e27e29c1995f40ebd19804ec8c98cecbe296024df51f180c3cc06b74d2315b3dad1631b2b6b2de7d4208f48a

  • C:\WINDOWS\TSSysprep.log

    Filesize

    56KB

    MD5

    22759430acf2aaa95c24ad9488682c63

    SHA1

    c67be379bd2baaf6cd59a365c68518675490b580

    SHA256

    5a5d435f2a799ded1f69f616222a94d63a60f0dc4203a54f08ea5e60cf3b98d4

    SHA512

    b8f9ccb37524d509333d1bcffdda03db9cf8c60cffd40a2a142104812408899a41e89c9ca1147a9aed2d4042e808eac1b31ec1acb33eb7d53e7e1d197443d468

  • C:\WINDOWS\WindowsUpdate.log

    Filesize

    71KB

    MD5

    0707815f8ee98cc04a73aa2e76d9bbcd

    SHA1

    405cc7b8971446225a188a94be515191ae11fd08

    SHA256

    cea8111602d59a70bb8bfc473459a5df82384c5e7d9593044dc28d38e66dfecb

    SHA512

    970625158b792f6120faf6a6ffc8f8be6f9a3070e78493967b4ae83b108442054e6caa6fd805b79b155359518a49a861c353cf65827c09a7c287c1e36ea57d90

  • C:\WINDOWS\WindowsUpdate.log

    Filesize

    71KB

    MD5

    08a56efe11d7efa9347d472cf65b3ec3

    SHA1

    57f06d3e2f3883f58e7f43396d0a67f24a63c456

    SHA256

    7a6955ade19dc0e28f74fee5e314f4965e406048907715e963a8325453434565

    SHA512

    220b033808b7e8a2502f2be900ad23c5f0cca18c0f4f6afddee562069fac0a345a444f119f745dea1ccb7dcfc19d7a1ab111f6855839f18c6e814a50ab0ca9d8

  • C:\WINDOWS\system.ini

    Filesize

    55KB

    MD5

    7b39f54a5b71e6fbb360e76f6d0426f4

    SHA1

    27ca701f859a3d84954f38d74b98a28a4999c36d

    SHA256

    a26dab60910096146308717442265bcc2e30e17392d14f697570ce97acc26d70

    SHA512

    0d066e0ac537064dd74c3bce42d30c9f360afe8e11aee1d06a5a7cf274186197402fc42438551b2e6b373224f3d8d78ba7600c5f68ab71973cfcfccd14e46c4c

  • C:\WINDOWS\win.ini

    Filesize

    28KB

    MD5

    71c19c75ba45a03d84f42285f91655aa

    SHA1

    5d53dd9b2b5da41f0f14e598f2e2d86adbccd515

    SHA256

    f92ec82b9b14b4eab8ab4d28c2ba7dafa489136e1ff85ec19165143562f223a3

    SHA512

    228aa95130fd61532066a048bc82b3d36d1cde2e17b11b96479bd8843919ece50b2547494f5005d075ec32471686a6cc97680cc4477e4c11750829f7a6a1bc67

  • C:\exc.exe

    Filesize

    291KB

    MD5

    7b91ca967f172fa4d61055969eb48699

    SHA1

    8c7314cef55ec29ccdd94376c123f4b7181b986e

    SHA256

    15b473396404c7f3848fb8c651c92758533c802e680433745de5364efab6cf76

    SHA512

    e3dfe89800ab1b1ac229f7597df90d481c4b00bf7976a47fbdf2a4baaade4fd7a1075cce2ce608a2d0d2cb0c487192721beb8a10da235a0af3a1e79c0f9368ab

  • memory/2940-1878-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2940-1236-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2940-287-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/2940-288-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/2940-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2940-11-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2940-285-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2940-9-0x00000000021F0000-0x00000000021FA000-memory.dmp

    Filesize

    40KB

  • memory/3008-1237-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3008-286-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3008-10-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3008-3835-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB