Analysis

  • max time kernel
    108s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2024 00:02

General

  • Target

    4241a9d1c5c43ec5db4c6fe23935db29.exe

  • Size

    920KB

  • MD5

    4241a9d1c5c43ec5db4c6fe23935db29

  • SHA1

    9da6d0a308f3fb35e5b4addedf1682cc3c4db758

  • SHA256

    e42b38f6ff18a062ec1311226207cb52c72055325bc8d38459a8ab08c5246991

  • SHA512

    5160cbdbd2109f7efd4da0936e9077eb14f0399f505d14e15c12f67e9ff5404f381a309a48b644d69d1f033858d3663319a68210e032496da228c62b1b939d31

  • SSDEEP

    24576:DeFDHYvmR3wIJS7kF6lDJqLGT4RSskAUFOJwYAbkybo6S:yFbR147kQlDJqDdUhYAgyboT

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 8 IoCs
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 24 IoCs
  • Drops file in System32 directory 32 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4241a9d1c5c43ec5db4c6fe23935db29.exe
    "C:\Users\Admin\AppData\Local\Temp\4241a9d1c5c43ec5db4c6fe23935db29.exe"
    1⤵
    • Drops file in Drivers directory
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Windows\SysWOW64\svehost.exe
      C:\Windows\system32\svehost.exe 1472 "C:\Users\Admin\AppData\Local\Temp\4241a9d1c5c43ec5db4c6fe23935db29.exe"
      2⤵
      • Drops file in Drivers directory
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Windows\SysWOW64\svehost.exe
        C:\Windows\system32\svehost.exe 1448 "C:\Windows\SysWOW64\svehost.exe"
        3⤵
        • Drops file in Drivers directory
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • NTFS ADS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3156
        • C:\Windows\SysWOW64\svehost.exe
          C:\Windows\system32\svehost.exe 1460 "C:\Windows\SysWOW64\svehost.exe"
          4⤵
          • Drops file in Drivers directory
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\svehost.exe
            C:\Windows\system32\svehost.exe 1440 "C:\Windows\SysWOW64\svehost.exe"
            5⤵
            • Drops file in Drivers directory
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4924
            • C:\Windows\SysWOW64\svehost.exe
              C:\Windows\system32\svehost.exe 1416 "C:\Windows\SysWOW64\svehost.exe"
              6⤵
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • NTFS ADS
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\SysWOW64\svehost.exe
                C:\Windows\system32\svehost.exe 1464 "C:\Windows\SysWOW64\svehost.exe"
                7⤵
                • Drops file in Drivers directory
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • NTFS ADS
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4108
                • C:\Windows\SysWOW64\svehost.exe
                  C:\Windows\system32\svehost.exe 1476 "C:\Windows\SysWOW64\svehost.exe"
                  8⤵
                  • Drops file in Drivers directory
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • NTFS ADS
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2800
                  • C:\Windows\SysWOW64\svehost.exe
                    C:\Windows\system32\svehost.exe 1488 "C:\Windows\SysWOW64\svehost.exe"
                    9⤵
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Modifies registry class
                    • NTFS ADS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1916
                    • C:\Windows\SysWOW64\svehost.exe
                      C:\Windows\system32\svehost.exe 1468 "C:\Windows\SysWOW64\svehost.exe"
                      10⤵
                        PID:2212
                        • C:\Windows\SysWOW64\svehost.exe
                          C:\Windows\system32\svehost.exe 1480 "C:\Windows\SysWOW64\svehost.exe"
                          11⤵
                            PID:4496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        887ba08985c20a4c2cc5750efb94fc8c

        SHA1

        94eb1f4ab0412760bd2083531b4b06a3a32f6c01

        SHA256

        f1e17aa3be94f82b156c4d1cccd6d65a88654d9e967df7b648445c0a24578706

        SHA512

        713f68e53498540f0d886e9b894a2b464f5c7db9da5b7601af39bf3e64ce04d72ad00e93d9271cb60a1907f29f2490d836a5bbbd4f195bc8d3039f0310e2bd7d

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        c666a7f6b6323f8e43abdab2eabb1fab

        SHA1

        fb181b0d0a20b84369c65ed2910b341e0a70d3a5

        SHA256

        023f84f78f447230413eb5d9a7ef8ff1f877163280363f78231da301538a8feb

        SHA512

        9220461fc3136c6cfab96d507f22eb3f1c36db78fd69d83f935dcb7dd75f76c646fc2f739e6621bc7b989f065898bd5e55f0f1254abe9f2d7b2cbb51cf44a94e

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        d5b59bac130bcc99864a9bd6639ef6a5

        SHA1

        38ba861519b123f1001a736b5a6341853f23acbe

        SHA256

        3017976c8dee8096364f26ac9c3e4d62187a18c0493df9bfc71017c42297a199

        SHA512

        444d914cc814b7e0e72204d10bff0477e2c4d4586cbf44ad5d80e57c5b1c7ed52fc2eff33993694d24ef7c479529c7093274c3a728cee6c8e42d259ddceae07d

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        bda271294727f4746772b6ac1a867728

        SHA1

        1a9071e19f0ac2dc5d3c2a19439a0f563edd3b9e

        SHA256

        441780e964f490b2636502f00684195f5a111bdbc6a8e31d2ae0fbcc99db5288

        SHA512

        1d8487ee9e53399f9f005fad9fec3dfa2d65b5fe4e9ab370e3cfb7a5ca0ebf2c4472137c69eef4f2ec28d583a6e16da74ae61cd7428885356c745e0c3249dc4d

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        fd5f2f78464523f79653dde2df8bb20e

        SHA1

        bd355e55408abe0b64db3751ec5563f7753affe5

        SHA256

        ab9e8178e70151b07e4618817f8a876bf2f74fcbeaea620c31b2386d6beafd4c

        SHA512

        f68eff358c65058fe631d86028af6862dca14c299551f0a8c9ac9538bdefcd704ff79818e06ad84c56d010389ccf5465fb05f7c84180009193538a7d275fbd11

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        f2dbcbfe40da8da0143cdbb79a67b2d1

        SHA1

        4826dfa491157ecfb5b8a4a5fd168a77155e6ec3

        SHA256

        0e6a92066c7a43580265312fc0603cdd3b8abb2c6158bb3f9898f0eebb795cb4

        SHA512

        be51368db11a4338349da96cbdbae4ccf99f65b155715701b97489c4e03fc9eebf21fcaeafb889a1c8de3f8ea6edbc8c502c995884b101330d231084f3a3e94e

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        4cb889dda0994814b6598ec33f62256d

        SHA1

        d8089f940f5931445b276e8a09a16680f0b69e4c

        SHA256

        2a0b888700d058cb537c405ca88d500ebc7841948909701589ad09d56ed58720

        SHA512

        161bc54cdc7545f8aed70a92fc021d4a363b171a268f6b3509b42654be141099cd706f5a983b1c038389b7cc7b01db6638abff126bb668c38296f451afb32b85

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        210622eec7cb03f268969303cde30083

        SHA1

        3c3c54cfbb8c057a8c33e1ee8bf8a99a65d1c19f

        SHA256

        4130f9108b6337e464377d66353a31608a83e06ebdf19c88de3fb47ec73f6f7f

        SHA512

        81490552471cbd96583c6ce187041d4356006ced74919446583e770d55fae26f997787fc2f4ef11f65c1c8f90a72fde1a069a2924e5a399259be82bcc30f2f48

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        4b2d8e96ee7b61662d13bcc691516949

        SHA1

        f0c15fffd6b5f8a97f72fc1ce0ff0bcaf56c151d

        SHA256

        b386127f42e0b2a0cafa790358dcbcc8527286ec4d6e8b7b9b45cab399e1a702

        SHA512

        1611aa59e72fa0118c763513a8e54de3496c15fc2bf9133b3794e25b19e122a7a5353bd42dfa004120ae21470d93a8ba0d2a7ce74fcf203cd2f03dc05507d05b

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        2a3e988f7e70de7f74f33e7dea0d0426

        SHA1

        aa86cc8f4424fba84543e00fd2caeebdb12b029b

        SHA256

        2b00c42c2440e4dc248dfee12a4cc97f0d8c0c46f0197fb8d257ec845c493f60

        SHA512

        c2f96fe2b5d04c95c7e21cc78e5c580986d5a5551e34f01242e9f18a8693f9feeaf3c7954cccf79a6d348f6959ad737b3b3b1ade05f8aa64b31f58234d0232ce

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        0f0ea86711cb25989d07dd2b5e585b80

        SHA1

        08c9610967f7d9738edeb5cd50fe210930a38bbe

        SHA256

        c89ac97b1e97ba9f7ea8e0691526c27018fb5a49b8d94c0633aa06350d987bf4

        SHA512

        86a421f03a379cc04202811ca7f360e4a92e1d9d7952718d807363f83da6e7546e099da8441bb5df809a7c9dec3f2955d1d255bb8ce2e2aa29cacd6d3840b1cf

      • C:\ProgramData\TEMP:5D10C173

        Filesize

        111B

        MD5

        980719e39f7bdb32a9893b303b117687

        SHA1

        445d78cf0ea8ce6c4550fba368f4f1ec0a2805ef

        SHA256

        3578b74eb370efbb8286f6d1bdb3c77044c2f2bf67b96d775300ad6029911c94

        SHA512

        c457258bd7fbe76d79d55ce3394b095f7ed25ac512c37a26aa2154afa625405d703048152d58bebe7d808cd8d744432c3305d3bc5811e66bb5cd2fa916eb3b15

      • C:\Windows\SysWOW64\packet.dll

        Filesize

        86KB

        MD5

        3eb0beb8e318646104362537570fc6bc

        SHA1

        3cb48ea9073fcca5835adad307e14ebf0cfe7279

        SHA256

        ab3f8c80b85aae70f89c8e7919d7dd147c2bc3ec68769e0bdb05fcc4083e3643

        SHA512

        db5fd16749641de6282d36af7b1921f908850ece3429ffe5ad33d990431bf4990f0314d28af082394af1f4d66516d9d89806a38e2801c34b4dd1ccb69bfafe47

      • C:\Windows\SysWOW64\svehost.exe

        Filesize

        125KB

        MD5

        41ba2f484f612f8f2b7402ac59fdc183

        SHA1

        e19fe64d42ec858b8180453b27186844f9149859

        SHA256

        70da6f5256c09d9dcce84cfd2f3964f7dab176fd4e6b48ffdab4ef60624e7ddf

        SHA512

        5ab934d0f408ff0023d14895c57a13847973a9f542f5130e95a28bbeb6cb42bcc49424fbb7a0efb383b1da3c7f7a3d3065608403bb0b364e7fe1ec592a24d198

      • C:\Windows\SysWOW64\svehost.exe

        Filesize

        920KB

        MD5

        4241a9d1c5c43ec5db4c6fe23935db29

        SHA1

        9da6d0a308f3fb35e5b4addedf1682cc3c4db758

        SHA256

        e42b38f6ff18a062ec1311226207cb52c72055325bc8d38459a8ab08c5246991

        SHA512

        5160cbdbd2109f7efd4da0936e9077eb14f0399f505d14e15c12f67e9ff5404f381a309a48b644d69d1f033858d3663319a68210e032496da228c62b1b939d31

      • C:\Windows\SysWOW64\wpcap.dll

        Filesize

        234KB

        MD5

        cb0afba4f0fb6ca2b2ea0d2c3e86b588

        SHA1

        2459367892e012314b451e05de1f1162448a05fa

        SHA256

        1b0fe60175c88f7cd3f3765b2f0f3eb1530b2e5e5b51f89a83e0322de32bdcf7

        SHA512

        a4e2d66af68dee67be5883c4770c1339b6be4847a993619389404af6a7ec9763361d9a14c632ca6704f63d84b05483f4bea2ec035b466fdaf03ce68c5cbca128

      • C:\Windows\SysWOW64\wpcap.dll

        Filesize

        226KB

        MD5

        aeefd6f812b9e066ec6f5992f27f4d2b

        SHA1

        b882774181461a3db8437a414eb662c81692dc39

        SHA256

        752e534c87d086683ba0803510000e49894544e7bafaa9ee0686e4be4f589048

        SHA512

        924d0e5da43a4e2f7d7c736b71dc818c42abd5ff9a8c554f7280aa4bd33ecb3276f91588348db65fb38e53b4bdd3bf794f03189f870dbd9976fe9621eb901f18

      • C:\Windows\SysWOW64\wpcap.dll

        Filesize

        92KB

        MD5

        a0309cc3200ee696aee435927e5d15a3

        SHA1

        b29540691abadce398956a6fd195684d23f2a213

        SHA256

        ac37c11f51d39d5eba5dde8f9e16f624c5c26d7ce923f8448fc9252dc844e488

        SHA512

        5722b634a159b172b7fab7db15ce54579b4064b93e9ae68e78f8a1ef71466d2b9ae6e55c48b91bf9f7074ad161516dd3f3f19fe9ed73cf8504d41e0940a958da

      • memory/1916-322-0x00000000021A0000-0x0000000002235000-memory.dmp

        Filesize

        596KB

      • memory/1916-321-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1916-267-0x00000000021A0000-0x0000000002235000-memory.dmp

        Filesize

        596KB

      • memory/2212-354-0x00000000021D0000-0x0000000002265000-memory.dmp

        Filesize

        596KB

      • memory/2212-353-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2212-300-0x00000000021D0000-0x0000000002265000-memory.dmp

        Filesize

        596KB

      • memory/2636-98-0x0000000002200000-0x0000000002295000-memory.dmp

        Filesize

        596KB

      • memory/2636-157-0x0000000002200000-0x0000000002295000-memory.dmp

        Filesize

        596KB

      • memory/2636-110-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2636-112-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2636-103-0x0000000002200000-0x0000000002295000-memory.dmp

        Filesize

        596KB

      • memory/2636-111-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2636-108-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2636-107-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2636-156-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2800-234-0x00000000021D0000-0x0000000002265000-memory.dmp

        Filesize

        596KB

      • memory/2800-289-0x00000000021D0000-0x0000000002265000-memory.dmp

        Filesize

        596KB

      • memory/2800-288-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2808-168-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/2808-218-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2808-219-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/3156-93-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/3156-82-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-95-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-80-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-83-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/3156-94-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/3156-87-0x00000000032B0000-0x00000000032C5000-memory.dmp

        Filesize

        84KB

      • memory/3156-76-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-116-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/3156-120-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-73-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/3156-77-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-79-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3156-81-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-9-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-55-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-8-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-2-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/3668-15-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/3668-14-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-13-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-12-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-54-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/3668-7-0x0000000002220000-0x00000000022B5000-memory.dmp

        Filesize

        596KB

      • memory/3668-11-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3668-24-0x00000000033E0000-0x00000000033F5000-memory.dmp

        Filesize

        84KB

      • memory/3668-0-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4108-201-0x00000000007D0000-0x0000000000865000-memory.dmp

        Filesize

        596KB

      • memory/4108-251-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4108-252-0x00000000007D0000-0x0000000000865000-memory.dmp

        Filesize

        596KB

      • memory/4496-333-0x0000000002260000-0x00000000022F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-65-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-91-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-42-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-52-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-61-0x00000000032A0000-0x00000000032B5000-memory.dmp

        Filesize

        84KB

      • memory/4608-37-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-64-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-63-0x0000000002160000-0x00000000021F5000-memory.dmp

        Filesize

        596KB

      • memory/4608-45-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-46-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-92-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-51-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-50-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-48-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4608-49-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4924-135-0x00000000020B0000-0x0000000002145000-memory.dmp

        Filesize

        596KB

      • memory/4924-185-0x0000000000400000-0x00000000005D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4924-186-0x00000000020B0000-0x0000000002145000-memory.dmp

        Filesize

        596KB